{"version":"1.1.0","author":"Deviant Airwaves","title":"409: Hacking the Hackers: Interview with Cybersecurity Expert about Linux Tower Defense","podcastName":"Destination Linux","chapters":[{"startTime":0,"title":"Intro"},{"startTime":116,"title":"TWIL 300 Celebration"},{"startTime":311,"title":"Community Feedback"},{"startTime":1276,"title":"Agentless Linux Security: A Chat with Craig Rowland"},{"startTime":1306,"title":"Cybersecurity in the Military: Craig’s Wildest Lessons"},{"startTime":1611,"title":"Scaling Startups \u0026 Catching the Eye of Tech Giants"},{"startTime":1767,"title":"Old-School Hacking: BBS and Salvaged Tech"},{"startTime":1972,"title":"From Small Rooms to Global Stages: The Rise of Defcon"},{"startTime":2121,"title":"Protecting Linux: The Sandfly Security Story"},{"startTime":2401,"title":"The Magic Behind Sandfly’s Agentless Security"},{"startTime":2601,"title":"Assuming Linux Is Secure? Think Again!"},{"startTime":2836,"title":"Should You Run Antivirus on Linux?"},{"startTime":3255,"title":"Breaking Into Cybersecurity: Advice for Linux Enthusiasts"},{"startTime":3521,"title":"Distro Talk: What’s on Craig’s Machine?"},{"startTime":3598,"title":"Sandfly for the Desktop: Home Edition Arrives!"},{"startTime":3915,"title":"How AI is Changing the Cybersecurity Game"},{"startTime":4391,"title":"Linux is Everywhere—How Does Sandfly Keep Up?"},{"startTime":4559,"title":"The Most Clever Linux Attack We've Seen"},{"startTime":4851,"title":"Catching Hackers in the Act: A Sandfly Success Story"},{"startTime":4983,"title":"Drift Detection: Now with More Horsepower!"},{"startTime":5022,"title":"Think Fast! It’s Lightning Round Time"},{"startTime":5318,"title":"SCALE 22x is coming"},{"startTime":5403,"title":"Red Hat Summit 2025"},{"startTime":5447,"title":"Support the Show"},{"startTime":5556,"title":"Outro"}]}