Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
| Episode | Date |
|---|---|
|
Present and Future of MDR
|
Dec 01, 2025 |
|
Agentic Browsers
|
Nov 24, 2025 |
|
Dark Web Roast
|
Nov 10, 2025 |
|
The Quiet Conflict
|
Oct 27, 2025 |
|
Prompt Engineering
|
Oct 06, 2025 |
|
State of the Union: Agentic AI
|
Sep 29, 2025 |
|
Autonomous cyberattacks
|
Sep 15, 2025 |
|
Pig Butchering
|
Sep 01, 2025 |
|
The Economy for Phish
|
Aug 18, 2025 |
|
Agentic
|
Aug 04, 2025 |
|
Proofing for Quantum
|
Jun 18, 2025 |
|
Magic Cat (Part 1)
|
Jun 02, 2025 |
|
Magic Cat (Part 2)
|
Jun 02, 2025 |
|
Negotiation
|
May 19, 2025 |
|
Personal Leadership
|
May 05, 2025 |
|
LLMs in Security Products
|
Apr 21, 2025 |
|
Storebrand Success Story (Part 2)
|
Apr 01, 2025 |
|
Policy as Code (Part 1)
|
Mar 31, 2025 |
|
Exposure Management
|
Mar 17, 2025 |
|
AV and IoT
|
Mar 03, 2025 |
|
FINN.no
|
Feb 17, 2025 |
|
n-days
|
Feb 03, 2025 |
|
CTFs
|
Jan 20, 2025 |
|
Reverse Engineering
|
Jan 06, 2025 |
|
Risk Hunting
|
Dec 16, 2024 |
|
CNAPP
|
Dec 02, 2024 |
|
Deviation Detection
|
Nov 18, 2024 |
|
Infostealers
|
Nov 04, 2024 |
|
Prioritisation & Decision Making in Critical Infrastructure Defence
|
Oct 14, 2024 |
|
KraftCERT Threat Assessment 2024
|
Sep 30, 2024 |
|
Risk Forecast: Windy
|
Sep 16, 2024 |
|
Email and Human Centric Security
|
Sep 09, 2024 |
|
Episode 100*!
|
Aug 26, 2024 |
|
Follow the Crypto
|
Aug 19, 2024 |
|
Black Teaming
|
Aug 05, 2024 |
|
ML Engineers these days
|
Jul 01, 2024 |
|
Isolate first, Triage second, and the tools to help you do it.
|
Jun 17, 2024 |
|
Guidance for High-Risk Individuals
|
Jun 03, 2024 |
|
Models Always Lie
|
Apr 15, 2024 |
|
Data Brokers and Removal Services
|
Mar 25, 2024 |
|
The Risk Business
|
Mar 11, 2024 |
|
Ethical Social Engineering
|
Feb 26, 2024 |
|
A student/mentor’s perspective on AI
|
Feb 12, 2024 |
|
When Ransomware Hits the Ranch
|
Jan 29, 2024 |
|
Conflictual coexistence
|
Jan 15, 2024 |
|
From Russia with Ransomware
|
Dec 18, 2023 |
|
Metaverses
|
Dec 04, 2023 |
|
Defending Cyber Space (EVE Online)
|
Nov 20, 2023 |
|
Digging into State Directed Cyber
|
Nov 06, 2023 |
|
Cryptology
|
Oct 25, 2023 |
|
Physical Penetration Testing / Red Teaming
|
Oct 09, 2023 |
|
Securing AI Models
|
Sep 25, 2023 |
|
Supply Chain Attacks
|
Sep 11, 2023 |
|
Experience Sharing - Bug Bounty Programs
|
Aug 28, 2023 |
|
Influencing the board
|
Aug 14, 2023 |
|
KraftCERT
|
Jul 10, 2023 |
|
Managing stress in cybersecurity (ISACA series)
|
Jul 03, 2023 |
|
Asset Intelligence
|
Jun 26, 2023 |
|
Unit 42
|
Jun 12, 2023 |
|
Crypto Finance
|
May 22, 2023 |
|
Office IoT
|
May 08, 2023 |
|
Passwords and their managers
|
Apr 17, 2023 |
|
Darkwebs
|
Apr 03, 2023 |
|
Security Engineering - IAM
|
Mar 20, 2023 |
|
Bots
|
Mar 06, 2023 |
|
House of Pain (ISACA series)
|
Feb 28, 2023 |
|
We are Defending (ISACA series)
|
Feb 28, 2023 |
|
Insider threats to ransomware groups
|
Feb 20, 2023 |
|
Network detection and response (NDR): the value of evidence
|
Feb 06, 2023 |
|
ICS in the Cloud
|
Jan 23, 2023 |
|
Enterprise Security Architecture
|
Jan 09, 2023 |
|
Azure / Office365: monitoring & hardening
|
Dec 19, 2022 |
|
Keeping the lights on
|
Dec 05, 2022 |
|
Smartphones
|
Nov 15, 2022 |
|
More Drones
|
Oct 24, 2022 |
|
Drones
|
Oct 19, 2022 |
|
Application Programming Interfaces
|
Oct 10, 2022 |
|
Industrial Security Conference
|
Sep 26, 2022 |
|
LinkedIn
|
Sep 12, 2022 |
|
Nordic Choice
|
Aug 22, 2022 |
|
TIBER
|
Aug 08, 2022 |
|
Security Leadership Essentials for Managers
|
Jul 11, 2022 |
|
Zero Trust vs. Castle and Moat
|
Jun 27, 2022 |
|
Security of Things
|
Jun 13, 2022 |
|
The ransomware dilemma
|
May 30, 2022 |
|
Encrypted traffic management
|
May 09, 2022 |
|
Conti leaks - The inside of the dark side
|
Apr 25, 2022 |
|
The Science of SOAR
|
Apr 11, 2022 |
|
Control Validation & Cyber Insurance
|
Mar 28, 2022 |
|
Special Edition: SOCCRATES
|
Mar 14, 2022 |
|
Space Norway
|
Mar 07, 2022 |
|
Deception technology
|
Feb 21, 2022 |
|
Collecting and sharing threat intelligence
|
Feb 07, 2022 |
|
Innsiderisiko
|
Jan 25, 2022 |
|
Does your managed SOC suck?
|
Jan 10, 2022 |
|
Project 2030
|
Jan 03, 2022 |
|
CMMC
|
Dec 27, 2021 |
|
Mergers & Acquisitions
|
Dec 20, 2021 |
|
Initial Access Brokers
|
Dec 06, 2021 |
|
Communicating threat intelligence to management
|
Nov 29, 2021 |
|
Buying security products
|
Nov 15, 2021 |
|
The state of cyber insurance in 2021
|
Sep 20, 2021 |
|
Can threat intelligence be automated?
|
Aug 30, 2021 |
|
Is honesty the best policy in incident response?
|
Aug 09, 2021 |
|
Threat hunting
|
Jul 12, 2021 |
|
Chat with a CFO
|
Jun 21, 2021 |
|
Stress and security
|
May 31, 2021 |
|
Internet of Things
|
May 10, 2021 |
|
Honeypots
|
Apr 26, 2021 |
|
The World of Open Source
|
Apr 12, 2021 |
|
The future of privacy | Privacy miniseries
|
Mar 29, 2021 |
|
Business Email Compromise
|
Mar 15, 2021 |
|
Cyber espionage | Privacy miniseries
|
Mar 01, 2021 |
|
Your phone is spying on you | Privacy miniseries
|
Feb 15, 2021 |
|
DNS security with Quad9
|
Feb 02, 2021 |
|
Nuclear Cyber Security | OT miniseries
|
Jan 18, 2021 |
|
IT Security Is From Mars, Software Security Is From Venus
|
Jan 04, 2021 |
|
Technology isn't the problem | OT miniseries
|
Dec 21, 2020 |
|
SIEM is DEAD?
|
Dec 07, 2020 |
|
Security Assurance
|
Nov 23, 2020 |
|
When security hits the fan
|
Nov 16, 2020 |
|
Financial Cyber Crime
|
Nov 09, 2020 |
|
Feature velocity > software security?
|
Oct 26, 2020 |
|
Forensic Readiness | OT miniseries
|
Oct 12, 2020 |
|
Misconceptions of Threat Intelligence
|
Oct 05, 2020 |
|
OODA Loops with Open Source
|
Sep 21, 2020 |
|
Security Validation
|
Sep 07, 2020 |
|
A shared responsibility
|
Aug 31, 2020 |
|
Data science and security visibility
|
Aug 17, 2020 |
|
KPIs vs. Empowerment
|
Aug 03, 2020 |
|
A chat with KraftCERT | OT miniseries
|
Jul 20, 2020 |
|
Why should we care about PAM?
|
Jul 06, 2020 |
|
You can't protect what you don't know you have | OT miniseries
|
Jun 22, 2020 |
|
Turning users from targets to defenders
|
Jun 08, 2020 |
|
OT's role in a CISO's world | OT miniseries
|
May 25, 2020 |
|
Microservices, in theory and practice
|
May 11, 2020 |
|
To SOAR, or not to SOAR? (Part 2)
|
Apr 28, 2020 |
|
To SOAR, or not to SOAR? (Part 1)
|
Apr 21, 2020 |
|
Securing healthcare data while studying COVID-19
|
Apr 15, 2020 |
|
IAM these days
|
Apr 06, 2020 |
|
Bug Bounties and Unicorns
|
Mar 23, 2020 |
|
Hack my (hard-coded) heart
|
Mar 09, 2020 |
|
Super CISO! With 300 brands to secure
|
Feb 24, 2020 |
|
Securing our financial future
|
Feb 10, 2020 |
|
Out of Control
|
Feb 03, 2020 |
|
Cyber Insurance for Y2K
|
Jan 27, 2020 |
|
Pentesting these days - Crowdsourcing
|
Jan 08, 2020 |
|
Special Edition: Under the hood of Argus
|
Jan 08, 2020 |
|
Cloud security with an Angel
|
Jan 08, 2020 |
|
Boss of the SOC
|
Jan 08, 2020 |
|
Sharing is caring - Threat Intelligence with ACT
|
Jan 08, 2020 |