She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca

She Hacks Purple: An Interview With Cybersecurity Expert Tanya Janca

Author: Jim Love January 17, 2026 Duration: 43:03

Building Secure Software with Tanya Janca: From Coding to Cybersecurity Advocacy

In this episode of Cybersecurity Today, host Jim Love interviews Tanya Janca, also known as She Hacks Purple, a renowned Canadian application security expert and author. Tanya shares her journey from a software developer and musician to becoming a penetration tester and cybersecurity advocate. She discusses her work in training developers on secure coding practices and application security, emphasizing the need for integrated security training in academic programs and the software development lifecycle. Tanya also talks about the challenges women face in the cybersecurity field and her efforts to empower underrepresented groups through initiatives like WOsec and We Hack Purple. Sponsored by Meter, this episode dives deep into the importance of building security into software development and the potential role of AI in improving code security.

00:00 Introduction and Sponsor Message
00:18 Meet Tanya Janca: The Journey Begins
01:05 From Developer to Pen Tester
03:14 Empowering Women in Cybersecurity
13:11 Challenges in Academia and Training
19:18 The Need for Secure Coding
21:22 Challenges in Medical Device Security
22:18 The Economics of Open Source
24:43 Building Security into Development
26:14 Training and Cultural Shifts
32:33 AI and Secure Coding
39:03 Incident Response and Preparedness
39:54 Final Thoughts and Future Directions


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
Cisco Breached: Source Code Stolen - Cybersecurity Today [not-audio_url] [/not-audio_url]

Duration: 15:03
Cisco Source Code Stolen in Trivy Fallout, Axios Supply Chain Attack, and Active Exploitation of Fortinet and Citrix Flaws David Shipley reports multiple major security incidents: attackers used credentials stolen in the…
Russian State Hackers Go After IoS Devices [not-audio_url] [/not-audio_url]

Duration: 19:42
Mac Malware 'Infinity Stealer,' DarkSword iOS Exploits, China Telecom Espionage & TeamTNT Supply Chain Hits Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a c…
Anonymous Tip System Breach May Expose Tipsters [not-audio_url] [/not-audio_url]

Duration: 11:28
Anonymous Tip System Breach Exposes Millions of Records, Google Warns Q-Day by 2029, and New AI Documentation Supply-Chain Risks Cybersecurity Today would like to thank Meter for their support in bringing you this podcas…
Startup Accused Of Helping Fake Privacy and Security Audits [not-audio_url] [/not-audio_url]

Duration: 12:41
Compliance Startup Audit-Faking Claims, Trivy Supply-Chain Backdoor, Russia Targets Signal/WhatsApp, and Iran-Linked Stryker Disruption Cybersecurity Today would like to thank Meter for their support in bringing you this…
The Fundamental Mistake in Cybersecurity Risk Management [not-audio_url] [/not-audio_url]

Duration: 49:39
Cybersecurity Isn't Managing Risk—It's Managing Threats... And That's the Problem Host David Shipley speaks with Jeff Gardiner, a former university CISO and now at Morgan Stanley, about Gardiner's doctoral research argui…
Another Medical Device Firm Hit [not-audio_url] [/not-audio_url]

Duration: 14:24
Medical Device Breaches, Anti-Scam Pledge Scrutiny, AI Font Trick, and Iran-Linked Cyber Updates. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete ne…