Adventures of Alice & Bob

Merchants Media
undefined
Apr 11, 2025 • 58min

Ep. 76 - Phishing, Predictions, and Starship Troopers // Brian Kime

In this episode, James Maude chats with cyber threat intel pro Brian Kime, whose journey from the Army’s infamous “chemical guy” to security expert was partly inspired by Starship Troopers. Brian dishes on his legendary Dell SecureWorks phishing op that hit a wild 50% click rate—by predicting an IPO years ahead of time. He also unpacks why vulnerability management can stall business and how design thinking can reshape threat intel.
undefined
Mar 28, 2025 • 54min

Ep. 75 - DOS Viruses & Catching Chinese APT Hackers // Roger Grimes

James Maude chats with Roger Grimes, a 36-year cyber veteran and KnowBe4’s Defense Evangelist. From hacking DOS viruses for John McAfee to catching Chinese APT hackers red-handed, Roger’s war stories are unforgettable. But he’s not just here for the drama—he lays out a bold plan to fix Internet security and reveals why social engineering remains our biggest blind spot. Don't miss this episode—it's a masterclass in cyber warfare, deception, and the battle for a safer digital future!
undefined
Mar 14, 2025 • 54min

Ep. 74 - The Accidental Worm that Shutdown a University // Sounil Yu

In this episode, James sits down with Sounil Yu, the mind behind the Cyber Defense Matrix and DIE Triad frameworks that have transformed how organizations approach security. From his early days getting stuffed in lockers as a self-described computer geek to becoming a disruptive force at Bank of America and co-founding Gnostic, Sounil shares the mental models that have guided his three-decade journey in cybersecurity. They discuss how an accidental college worm shutdown taught valuable lessons in OpSec, and why Sounil starts with the icebreaker question: "What's the most IT damage you've caused without getting fired?"
undefined
Feb 28, 2025 • 56min

Ep. 73 - How a Magazine Article Led to a Cybersecurity Empire // Richard Stiennon

In this episode, James chats with Richard Stiennon—cybersecurity analyst, author, and former aerospace engineer—whose 20+ year journey spans from designing car seats to hacking corporate systems for giants like Dell. Hear how a 1992 magazine article led him to launch his own ISP and rise to prominence at Gartner. Richard shares his personal stories from the frontlines of cybersecurity, his crusade against risk management jargon, and bold predictions on AI’s impact on security. Plus, private jet mishaps and the unconventional wisdom behind IT Harvest. 
undefined
Feb 14, 2025 • 55min

Ep. 72 - Recreating the Hackers Movie // Keren Elazari

Step into the fascinating mind of Keren Elazari—the first Israeli woman to give a TED Talk and a trailblazing force in cybersecurity. Once rejected by her school’s D&D group, she defied expectations to become a globally recognized security analyst, reshaping the narrative around hackers.In this episode, we dive into Keren’s remarkable journey—from a curious young girl armed with an encyclopedia and inspired by the movie Hackers to a leading voice in digital security. She shares personal stories from her early hacking days, her groundbreaking work in building inclusive tech communities, and her bold vision for the future of cybersecurity.And as a special treat, get exclusive insights into a never-before-seen fan remake of Hackers featuring legendary industry figures.Here is a link to the Hackers remake - https://vimeo.com/178240969
undefined
Jan 31, 2025 • 1h 12min

Ep. 71 - From Prison to Millions: The Hacker Who Struck Yahoo Bug Bounty Gold // Tommy DeVoss

In this episode, James sits down with Tommy DeVoss (aka Doggy G), who went from a teenage hacker dodging federal prison to becoming one of the most successful ethical hackers in the world. Tommy spills raw, unfiltered stories about his wild days in IRC channels, running with the infamous World of Hell hacking group, and somehow managing to turn his life around to rake in over $4 million in bug bounties. You'll hear how a 10-year computer ban gave him enough pent-up tech energy to power a small country and how his boredom waiting for a friend led to a $180,000 Yahoo bug discovery. Yeah, some people text while waiting—Tommy casually breaks the internet.
undefined
Jan 17, 2025 • 53min

Ep. 70 - Hotmail Honeypot: Catching Cheaters through Fake E-Greeting Cards // Mishaal Khan

Join James as he sits down with Mishaal Khan, a seasoned cybersecurity expert with over 20 years of experience in outsmarting attackers. From his early days hacking PC games to his current mission of safeguarding high-profile individuals, Mishaal offers fascinating insights into the world of open-source intelligence (OSINT) and social engineering. Discover how he’s intentionally erased his digital footprint, including keeping his own photos offline, hear the intriguing story of how he exposed cheaters using fake e-greeting cards, and learn why you should proactively "stalk yourself" to secure your personal data before someone else does.
undefined
Jan 3, 2025 • 54min

Ep. 69 - When the Data Center is Literally on Fire // Evil Mog

Today, James Maude sits down with Dustin Haywood, better known as Evil Mog, Executive Managing Hacker at IBM's X-Force. Together, they talk about Evil Mog's fascinating journey from telemarketing to becoming a globally recognized expert in password security. He shares stories, including how he managed a high-stakes data center crisis, creatively navigated IBM's corporate culture through social engineering, and transformed the landscape of password cracking. The conversation also delves into the cutting-edge world of authentication security, the ever-evolving nature of cyber threats, and why a password manager could be your ultimate ally.
undefined
Dec 20, 2024 • 53min

Ep. 68 - Deep Fakes, AI Impersonation, & Predicting Security in 2025 // Morey Haber

Join hosts James Maude and Marc Maiffret as they dive into a captivating conversation with industry legend Morey Haber. With over two decades of experience—going back before CVEs were even a thing—Morey delivers a bold look at the security threats of 2025 and beyond. Is AI on the verge of bursting its hype bubble? Are hidden paths to privilege the next battleground? The group discusses how today’s identity-based attacks are reshaping cybersecurity and how Morey deep-faked himself to expose the alarming reality of AI impersonation. From the roots of early vulnerability research to the cutting edge of emerging attack vectors, this is a must-listen episode to understand how old threats are wearing new masks—and what defenders must do to keep up (and a great episode to wrap-up 2024)!
undefined
Dec 6, 2024 • 52min

Ep. 67 - When Alice Goes Rogue: Cryptographic Mischief // Sophie Schmieg

Join host James Maude as he talks all things cryptography with Sophie Schmieg, a Staff Information Security Engineer at Google. In this episode, Sophie shares her journey from pure mathematics to applied cryptography, revealing how her background in algebraic geometry provides a distinctive approach to modern security challenges. From discovering major vulnerabilities in AWS to creating solutions that will last until the year 909,000, Sophie breaks down complex cryptographic concepts with clarity and humor. She offers invaluable insights into post-quantum cryptography, the real-world implications of quantum computing, and why you probably don't need that quantum random number generator.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app