Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
You Think You Know Me
|
Jul 02, 2025 |
Avoiding the Ostrich Approach
|
Jun 20, 2025 |
'We've Made Our Own Prison'
|
Jun 02, 2025 |
Dark AI Speeding Hacker Evolution
|
May 16, 2025 |
Why Ransomware, Credential Theft and Phishing Schemes Persist
|
Apr 25, 2025 |
Unsecure Webcam Was All a Ransomware Group Needed
|
Apr 16, 2025 |
IABs, Dark Web Fueling Ransomware Surge
|
Mar 31, 2025 |
Manufacturing’s Internal Cyber Struggles
|
Mar 13, 2025 |
Observations of an Ethical Hacking Researcher
|
Feb 28, 2025 |
The Evolution of OT Vulnerabilities
|
Feb 13, 2025 |
The Legacy of AI in Cybersecurity
|
Jan 30, 2025 |
A Happy Ending to the Latest ICS Hack
|
Jan 16, 2025 |
The Biggest Hacks of 2024
|
Dec 27, 2024 |
Looking Back to Move Forward
|
Dec 12, 2024 |
AI Is Exposing Your Most Vulnerable Attack Surface
|
Dec 09, 2024 |
Minimizing Hacks by Focusing on Uptime
|
Nov 21, 2024 |
What Cybersecurity Can Learn from Tom Brady
|
Nov 15, 2024 |
Threat Landscape Update
|
Nov 08, 2024 |
The Little Things That Kill
|
Oct 31, 2024 |
Phishing Attack Defense 'Not Rocket Science'
|
Oct 24, 2024 |
Legacy Mindsets Are Helping Hackers Weaponize Networks
|
Oct 18, 2024 |
Using Force Multipliers to Protect Against Next-Gen Stuxnet
|
Oct 10, 2024 |
Never Let a Good Hack Go to Waste
|
Oct 03, 2024 |
Finding Your 'Creative Maliciousness'
|
Sep 26, 2024 |
Getting Past the Whack-A-Mole Approach
|
Sep 20, 2024 |
Inside the Growing Complexity of Ransomware Hacking Groups
|
Sep 11, 2024 |
Time to 'Rip off the Band-Aid' to Ensure Security
|
Sep 05, 2024 |
Combating the 20th Century Mafia with a Stronger Human Firewall
|
Aug 28, 2024 |
Tearing Down the 'Set It and Forget It' Mindset
|
Aug 22, 2024 |
Bridging the IT-OT Divide
|
Aug 15, 2024 |
'There's No Bulletproof Vest' in Cybersecurity
|
Aug 08, 2024 |
Are We Over-Connected?
|
Aug 02, 2024 |
The $25M 'Wake-Up Call' Supply Chain Hack
|
Jul 24, 2024 |
The Dollars and Sense of Cybersecurity
|
Jul 19, 2024 |
There's No 'Plant the Flag' Moment in Cybersecurity
|
Jul 11, 2024 |
'Nobody Should Get Ransomwared'
|
Jun 27, 2024 |
The Protection and Productivity of Zero Trust
|
Jun 20, 2024 |
OT's Legacy Tech Challenges
|
Jun 12, 2024 |
Shutting Down 'Spy Board' Threats
|
Jun 05, 2024 |
The OT Threat Landscape's Infectious Nature
|
May 30, 2024 |
Knowing How to Arm Yourself for Battle
|
May 20, 2024 |
Supply Chains Are a Hacker's Gateway
|
May 16, 2024 |
The Hacks!
|
May 08, 2024 |
Security Breach: Predictions That Landed
|
May 01, 2024 |
DMZs, Alarm Floods and Prepping for 'What If?'
|
Apr 24, 2024 |
Weaponizing Secure-By-Design
|
Apr 17, 2024 |
The Impacts of Over-Connectivity and Mobile Defeatism
|
Apr 10, 2024 |
Hackers Learn How to Attack You, From You
|
Apr 03, 2024 |
The Largest Attack Surface - People
|
Mar 28, 2024 |
Avoiding a 'Chicken Little' Cybersecurity Strategy
|
Mar 21, 2024 |
Cybersecurity's Greatest Weapon - Awareness
|
Mar 13, 2024 |
Chasing Cyber Ghosts
|
Mar 06, 2024 |
Missteps Creating 'An Internal Collection of Hackers'
|
Feb 28, 2024 |
Leveraging Threat Intelligence Data
|
Feb 22, 2024 |
The Hacker's Most Lucrative Attack
|
Feb 15, 2024 |
SBOMs, AI and the Crown Jewels
|
Feb 07, 2024 |
Tech Debt and the Unsexy Side of Cybersecurity
|
Jan 31, 2024 |
What Happens When a Torque Wrench Gets Hacked
|
Jan 25, 2024 |
AI, ChatGPT Fueling Surge in Ransomware
|
Jan 09, 2024 |
New Strategies for Old-School Hacks
|
Jan 09, 2024 |
Learning from the Dark Side
|
Dec 20, 2023 |
The Growing Impact of Hacktivists and State-Sponsored Groups
|
Dec 13, 2023 |
Vulnerability Data from 'The Wild'
|
Dec 07, 2023 |
Walking the Line
|
Dec 01, 2023 |
Breaking Down the Boeing Hack
|
Nov 21, 2023 |
Turning Up the Cat & Mouse Game
|
Nov 16, 2023 |
This is the Way ... to Beat Hackers
|
Nov 10, 2023 |
Criminal Organizations Know You
|
Nov 02, 2023 |
Patches, PLCs and Making it Harder for Hackers
|
Oct 26, 2023 |
Why AI is Your Biggest Threat and Most Powerful Ally
|
Oct 19, 2023 |
The Ransomware Roller Coaster
|
Oct 11, 2023 |
'There's A Train Wreck Coming'
|
Oct 04, 2023 |
'They're Hitting Everyone They Can'
|
Sep 29, 2023 |
How Hackers are Targeting Vehicles and Fleets
|
Sep 20, 2023 |
Doubling Down to Beat the Hackers
|
Sep 14, 2023 |
Inside the Summer's Biggest Industrial Hacks
|
Sep 07, 2023 |
Avoiding 'Shiny New Objects'
|
Aug 30, 2023 |
Knowing 'What is Good'
|
Aug 23, 2023 |
Security Breach: 'The Edge Always Goes to the Attacker'
|
Aug 18, 2023 |
Phishing Lessons and 'Shifting the Target'
|
Aug 10, 2023 |
The Growing Problem of 'Insecure by Design'
|
Aug 04, 2023 |
Cloud Apps are Elevating Malware Threats
|
Jul 25, 2023 |
AI - Use It or Lose!
|
Jul 13, 2023 |
The Best Way to Identify, Defeat Hackers
|
Jun 29, 2023 |
The Impressive and Terrifying Evolution of Ransomware Gangs
|
Jun 21, 2023 |
Humans, 'Promiscuous Devices' Creating More Threats
|
Jun 13, 2023 |
Enemies at the Gate
|
Jun 07, 2023 |
The Bad Guys Are Salivating Over Manufacturing
|
Jun 01, 2023 |
More than Security, Cyber Defense Is 'Life Safety'
|
May 25, 2023 |
Making Hackers Pay (Literally)
|
May 18, 2023 |
Hackers Want to Steal, Extort Competitive Advantages
|
May 10, 2023 |
An Unlikely Assist from Ransomware and the Looming Threats of AI
|
May 03, 2023 |
Trusting the Creative Hacker
|
Apr 24, 2023 |
The Cybercriminal's Favorite Pastime
|
Apr 07, 2023 |
Balancing The Light and Dark Forces of Technology
|
Mar 30, 2023 |
Thinking Like the Bad Guy
|
Mar 23, 2023 |
Breaking Down the Dole Foods Ransomware Attack
|
Mar 16, 2023 |
The Air Gap Lie and The Spectrum of Extortion
|
Mar 08, 2023 |
Latest Ransomware Attacks Educate, then Humiliate
|
Feb 27, 2023 |
Hiding, Not Running from Hackers
|
Feb 20, 2023 |
Hacker's Insight: 'How Can I Make Stuff Worse'
|
Feb 13, 2023 |
When Seeing the Attack Isn't Enough to Stop It
|
Feb 07, 2023 |
People Are Part of the Damage
|
Feb 01, 2023 |
Because Hackers are Working Harder
|
Jan 23, 2023 |
Our Cyber Defense Gets a D+
|
Jan 13, 2023 |
Protecting Against 'Dormant Footholds' and Knowing You're a Target
|
Dec 23, 2022 |
The Little Things Are Still Killing
|
Dec 21, 2022 |
Why the Good Guys are Losing
|
Dec 09, 2022 |
A Little Social Engineering Goes a Long Way
|
Nov 28, 2022 |
Embracing The Devil Inside to Stifle Hackers
|
Nov 22, 2022 |
No Place to Hide When You Have Money and Data
|
Nov 15, 2022 |
From Attacking ISIS to Industrial Controls - Is GhostSec a Hacktivist or Threat?
|
Nov 08, 2022 |
Darknet Diaries Host Lifts the Veil on Cyberattack Secrecy
|
Oct 27, 2022 |
The Hack You Helped Create
|
Oct 18, 2022 |
The Cloud is on Fire - Promise vs. Problem
|
Sep 20, 2022 |
When Cyber Gangs 'Get Loud' - Responding to Dynamite Panda, LockBit and Others
|
Aug 31, 2022 |
Lessons Learned from DarkSide and the Solar Winds Hack
|
Aug 30, 2022 |
The Growing (and Frightening) Complexity of Ransomware Groups
|
Jul 26, 2022 |
Breaking Down the Silos
|
Jul 19, 2022 |
Latest Tools of Choice for Hackers: Raspberry Robin and BlackCat
|
Jun 23, 2022 |
Preventing Ransomware Attacks Through Cyber Maintenance
|
May 19, 2022 |
Cyber Hygiene and Putin's Army of Criminal Hackers
|
May 19, 2022 |
Revisiting the JBS Ransomware Attack One Year Later
|
May 19, 2022 |
'The Bad Guys Are Smart, Too'
|
May 17, 2022 |
'The Industry's Attack Surface Has Exploded'
|
May 17, 2022 |
DDoS Attacks (Part 1): 'They're Super Easy and Free'
|
May 17, 2022 |
DDoS Attacks - (Part II): Preparation is Prevention
|
May 17, 2022 |
Why Phishing Schemes Continue to Flourish
|
May 16, 2022 |
'Hackers are Lazy. Scammers are Misfits.'
|
May 16, 2022 |
'Hackers Are Heartless Bastards'
|
May 16, 2022 |
Ransomware, Log4J and When — not if — You're Hacked
|
May 16, 2022 |
Don't Fear the Hacker — Drop Some S-BOMs
|
May 16, 2022 |
Know Your Enemy
|
May 16, 2022 |
There's a Lot of Reasons October Could Be Terrifying
|
May 16, 2022 |
The Dangerous Reality of Your Cybersecurity Blast Radius
|
May 16, 2022 |
Inside a Phishing Scheme
|
May 16, 2022 |