
Tom Uren
Policy and intelligence editor who provides expert analysis on cybersecurity policy, intelligence matters, and the implications of spyware and telecom security incidents.
Top 10 podcasts with Tom Uren
Ranked by the Snipd community

17 snips
Nov 20, 2025 • 21min
Srsly Risky Biz: AI-Powered espionage will favor China
Tom Uren, a policy and intelligence editor specializing in cybersecurity, joins Amberleigh Jack to explore the recent revelations about AI-driven cyber espionage campaigns. They discuss how this innovation aids opportunistic attackers, while offering little advantage to Western intelligence. The conversation shifts to Google's legal victory over the Lighthouse phishing operation, which has had unexpected success in disrupting their activities. Lastly, Uren highlights the benefits of adopting the memory-safe Rust programming language in Android, showing its impact on security and performance.

9 snips
Jan 22, 2026 • 20min
Srsly Risky Biz: You can't block space internet
Tom Uren, a policy and intelligence editor behind the Seriously Risky Business newsletter, joins Amberleigh Jack to tackle the implications of Starlink in authoritarian contexts. They explore how Starlink provides crucial connectivity during internet blackouts, especially in Iran, while discussing risks like GPS spoofing and the need for multiple satellite providers. They also analyze General Joshua Rudd's nomination to lead NSA, expressing concerns about his preparedness and responses on cyber policy, highlighting the complexities of national security in the digital age.

9 snips
Dec 17, 2025 • 19min
Srsly Risky Biz: Like Huawei, but for electricity
Tom Uren, a policy and intelligence editor, dives deep into the troubling U.S. reliance on Chinese manufacturers for electrical grid equipment. He discusses the risks posed by Chinese hacking and the alarming intent behind recent PLA research aimed at grid sabotage. The conversation takes a turn as they explore the controversial U.S. involvement in cyberattacks on Venezuela's state oil company and critique the ineffectiveness of Russian state-backed hacktivism. Uren emphasizes the need for strategic mitigations and warns about the political misuse of security concerns.

4 snips
Jan 29, 2026 • 17min
Srsly Risky Biz: Punish the wicked and reward the righteous
Tom Uren, policy and intelligence editor who analyzes cybersecurity policy and spyware impacts, joins to discuss the Pall Mall Process and international efforts to curb abusive spyware. He explores the U.S. strategy of punishing miscreants while rewarding compliant firms. They also unpack the Salt Typhoon telecom compromises against senior UK officials and what strict telco rules actually buy us.

Dec 4, 2025 • 16min
Srsly Risky Biz: When cyber campaigns cross a line
Tom Uren, a cyber policy analyst and author of the Seriously Risky Business newsletter, joins to discuss a new framework outlining seven 'red flags' for assessing cyber operations. They explore Iran's use of cyber intelligence for missile strikes and the implications of political interference in elections. The conversation dives into the significance of corporate disclosure amid evolving state cyber activities, and they express skepticism about China's claims of being a responsible cyber actor. This engaging dialogue sheds light on the complexities of modern cyber warfare.

Nov 27, 2025 • 21min
Srsly Risky Biz: DeepSeek and Musk's Grok both toe the party line
Tom Uren, a policy and intelligence editor specializing in cybersecurity, dives into the concerns around the DeepSeek-R1 AI model, revealing how it produces insecure code when prompted with topics sensitive to the Chinese Communist Party. He explains emergent misalignment in AI and emphasizes that biases are not unique to China, citing Musk's Grok as an example. Additionally, he discusses the doxxing of Iran's APT35 group, detailing their structure and operations, while predicting their resilience after the leak. Uren underscores the need for rigorous review of AI-generated outputs.

Nov 13, 2025 • 18min
Srsly Risky Biz: Meta's fraud profit scandal
Tom Uren, a policy and intelligence editor, dives into Meta's alarming $16 billion profit from scam ads, revealing the internal incentives that keep fraud thriving. He discusses how Meta's high denial threshold and algorithmic engagement create perverse incentives for scammers. The conversation shifts to restrained state-backed supply chain attacks and why some intrusions weren't weaponized. Lastly, Uren highlights the UK's pause on intelligence sharing with the US over concerns regarding legality in operations against suspected drug boats.

Oct 23, 2025 • 18min
Srsly Risky Biz: Hacking for Godot
Tom Uren, a cybersecurity analyst and policy editor, joins Amberleigh Jack to explore enhancing U.S. offensive cyber capabilities through private sector involvement. They discuss the fragmented ransomware ecosystem, illustrating how operators like Devman transition from affiliates to platform leaders. Tom proposes empowering vetted firms to target low-risk scammers, emphasizing the need for legal clarity for private disruptions. The duo also navigates the ethical dimensions of targeting and the rapid proliferation of small ransomware players.

Oct 9, 2025 • 17min
Srsly Risky Biz: Clop is a big fish, but not worth hunting
Tom Uren, a policy and intelligence editor, dives into the intriguing tactics of the Clop ransomware gang. He explains how Clop’s strategy of mass exploitation yields significant profits while being the least harmful form of ransomware. Additionally, Tom discusses the importance of the U.S. government addressing foreign influence operations, providing insights into recent activities by adversarial states. His perspective on steering ransomware behaviors towards less damaging tactics is particularly thought-provoking.

Oct 2, 2025 • 18min
Srsly Risky Biz: The cyberespionage gig economy
Tom Uren, a policy and intelligence editor known for his insights on cyberespionage, joins Amberleigh Jack to explore intriguing recruitment tactics used by foreign intelligence. They discuss Russia's strategy of enlisting locals through Telegram for espionage roles, highlighting the risks involved. Tom reveals how mapping Wi-Fi networks aids cyber operations and contrasts the cautious approaches of Western agencies with bolder strategies. They also address governance lapses observed in a DOGE report, showcasing how weak oversight can lead to vulnerabilities.


