Watch Now

Show Notes

In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris introduce the podcast’s new series: Hacker Valley Red.  After the previous season highlighted the defensive side of cyber security, this season will focus on the other side of the coin - the offensive side.  Ron and Chris spend this initial episode talking about their experience with the offensive side of cyber security, what listeners can look forward to hearing in the episodes ahead, and what sorts of questions experts will field throughout the season.

 

As the conversation gets underway, Ron and Chris introduce the season, which will cover such topics as the background and personas of red teamers, information about red teaming technology, misconceptions from the blue side, and what red teaming really looks like.  The hosts then share their own backgrounds in red teaming.  While they both had some prior experience with red teaming, they learned a lot through hosting the episodes in the season.  As they introduce the series ahead, Ron and Chris touch on the social side of red teaming, analogies by which red teaming can be explained, Ron’s exploitation video, the value and use of red teaming within organizations, the shared community of red and blue teaming, purple team engagement, the concept of unhackability, and more. 

 

In the episodes ahead, Ron and Chris will ask guests what other aspects of life and technology help them with red teaming, and there are particular topics from the episodes that they are most excited to consider with listeners.  These topics include the issue between blue and red teams, the concept of a hacker, the idea of unhackability, and different perspectives of paths into the field of red teaming and to mastery within it.  Ron and Chris conclude their introductory conversation with two lessons they hope listeners will take from the season: the lesson that creation is a process and that the best red teamers learn to love the process, and the lesson that both red and blue team members are on the same team.

 

0:48 - The podcast is now moving to the other side of the coin: the offensive side of cyber security.

2:48 - Ron and Chris share their respective backgrounds in red teaming.

7:25 - What other aspects of life and technology help guests with red teaming?

10:50 - Chris asks about Ron’s exploitation video.

12:52 - The hosts address the iterative improvement of an organization’s security posture.

18:14 - Ron and Chris talk about purple team engagement.

21:12 - Is unhackability real or possible?

24:53 - Hacking can have to deal with a human, rather than a device or application.

26:34 - What key takeaways do the hosts want listeners to take from the season?

28:10 - What do Ron and Chris want listeners to learn?

 

Links:

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ronald Eddings on Twitter

Follow Chris Cochran on Twitter

Learn more about the season sponsor, RiskIQ

Recent Episodes

Jan 25, 2026

When Cybercrime Learned How to Make Money and Never Looked Back ...

Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today. Ron sits down with ...

Jan 22, 2026

Defending Dignity in the Messiest Data on Earth with George ...

The most dangerous attack surface isn’t your infrastructure, it’s desire under pressure. When people are emotional, impulsive, and hoping for connection, security controls don’t fail… judgment ...

Jan 18, 2026

When Automation Outruns Control with Joshua Bregler

AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and ...

Jan 15, 2026

The Day AI Stopped Asking for Permission with Marcus J. Carey

AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and ...

Jan 8, 2026

When AI Ships the Code, Who Owns the Risk with Varun Badhwar and ...

AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t ...

Jan 1, 2026

Think Like a Hacker Before the Hack Happens with John Hammond

What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before ...

Dec 18, 2025

Breaking Into Banks and Bypassing Modern Security with Greg ...

Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled ...

Dec 11, 2025

Defending Your Cyber Systems and Your Mental Attack Surface with ...

When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots. In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder ...

Dec 4, 2025

Thriving Beyond Human Labor with Context-Powered AI with Daniel ...

The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along. In this episode, Ron Eddings sits down with Daniel Miessler, ...

Dec 2, 2025

Building EDR for AI: Controlling Autonomous Agents Before They Go ...

AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.