DrZeroTrust

Dr. Chase Cunningham
undefined
May 28, 2025 • 20min

Legit Security researcher finds vulnerability in AI assistant GitLab Duo

In this conversation, Dr. Chase Cunningham and Omer from Legit Security discuss a significant vulnerability discovered in GitLab Duo, an AI assistant integrated into GitLab. They explore how prompt injection techniques can be exploited to manipulate the AI into leaking sensitive source code and other confidential information. The discussion highlights the implications of AI context in security, the responsibility of companies to manage these risks, and the evolving landscape of AI-related attacks. Omer emphasizes the need for vigilance as new attack vectors emerge, making it clear that while GitLab has patched the vulnerability, the potential for future exploits remains.TakeawaysGitLab Duo is an AI assistant that helps manage code and projects.A vulnerability was found that allows for prompt injection attacks.Prompt injections can manipulate AI to leak sensitive information.The context used by AI can be exploited against it.Companies must take responsibility for AI outputs.GitLab has patched the vulnerability but risks remain.New prompt injection techniques are constantly emerging.AI systems are not truly intelligent; they follow programmed responses.The relationship between AI and security is evolving rapidly.Future attacks will likely focus on contextual vulnerabilities.
undefined
May 15, 2025 • 24min

The Dr Zero Trust Show (8K-s Everywhere!)

In this conversation, Dr. Chase Cunningham, also known as Dr. Zero Trust, discusses various aspects of cybersecurity, including the impact of ransomware attacks on businesses, the importance of strong password practices, and the emerging threats posed by ransomware as a service operations like Dragon Force. He highlights recent data breaches in retail, the significance of red teaming in cybersecurity, and the security risks associated with Chinese-made solar inverters. The conversation also touches on legislative responses to cybersecurity threats and a recent ransomware attack on Coinbase.TakeawaysLive streaming can be frustrating and often isn't truly live.Ransomware attacks can significantly impact stock prices.Investors can find opportunities in companies affected by breaches.Ransomware as a service is a growing threat in cybersecurity.Weak passwords are a common vulnerability in many organizations.Data breaches often lead to stolen customer information.Red teaming can help organizations identify vulnerabilities before they are exploited.Chinese-made devices pose potential security risks to critical infrastructure.Legislative measures are being considered to address cybersecurity threats.Companies like Coinbase are exploring alternative responses to ransomware demands.
undefined
May 9, 2025 • 25min

The Dr Zero Trust Show (Post RSA Edition)

In this conversation, Dr. Zero Trust shares his experiences from the RSA show, discussing the overall atmosphere, vendor interactions, and the introduction of the 10 Ring app for vendor reviews. He highlights certain vendors' threats and emphasizes the importance of data-driven analysis. The discussion also covers insights from a recent Gartner report on security controls and various cybersecurity incidents, concluding with reflections on the industry's future.TakeawaysRSA was interesting but had minimal value overall.The atmosphere at RSA included unusual elements like robot dogs and puppies.Some vendors are willing to threaten analysts for their opinions.Data-driven analysis is crucial in evaluating vendor performance.The 10 Ring app received positive feedback for vendor reviews.Gartner's report highlights misconfiguration as a major security issue.Organizations need to focus on continuous optimization of security controls.Recent cybersecurity incidents show the ongoing vulnerabilities in the industry.CrowdStrike is cutting jobs to scale its business amid market pressures.Basic cybersecurity hygiene is still not being followed by many organizations.
undefined
May 7, 2025 • 12min

The Dr Zero Trust Show

In this conversation, Derek Maki, head of product at Veracode, discusses the evolving landscape of application security, the impact of AI on code security, and the importance of prevention in the future of security practices. He shares insights from the RSA Conference and highlights Veracode's innovations in securing applications and managing risks in the software development lifecycle.TakeawaysVeracode has been a leader in application security since 2006.The rise of AI has not improved the security of code.Veracode's AI fix engine automates remediation of code weaknesses.Preventing malicious packages is a key focus for Veracode.Consumer security is becoming increasingly important.The RSA Conference showcases both noise and innovation in security.Seamless integration of security into developer tools is essential.Open source security is a growing area of concern.Threat intelligence can enhance security measures beyond application security.The future of security will emphasize prevention over detection.
undefined
Apr 24, 2025 • 12min

The 10ring App!

🚨 RSA Attendees, Let's Shake Things Up! 🚨Ever been frustrated that your voice isn't heard at big tech events? Me too. That's why I built 10ring—the app where YOU rate vendors, anonymously if you prefer, and help drive real transparency and accountability.No fluff. No selling your emails. Just honest feedback, community-driven rankings, and heck—I’ll even toss $100 cash daily to whoever reviews the most vendors.I put my own money where my mouth is because change doesn’t happen by accident—it happens when we speak up together.Ready to join the movement? Let's make RSA2025 unforgettable.#10ringApp #RSA2025 #TechTransparency #CyberSecurityTakeawaysThe Tenring app is designed to enhance vendor-user interactions.Users can choose to be anonymous or public while using the app.Dr. Cunningham funded the app entirely out of his own pocket.The app aims to democratize technology and improve vendor practices.Users can win $100 for contributing reviews and feedback.The app will be live for a limited time during the RSA conference.Users can save vendors they want to engage with later.The app features a clean and intuitive interface for easy navigation.Community feedback is crucial for improving vendor services.Dr. Cunningham encourages collaboration to change the tech landscape.
undefined
Apr 10, 2025 • 27min

Dr Zero Trust and Faction Networks

In this conversation, Chase Cunningham and Dave Rand discuss the concept of Zero Trust security and how Faction Networks is innovating in this space. They explore the challenges of securing IoT devices, the unique approach of Faction in avoiding central key repositories, and the importance of encryption. The discussion also touches on the future of cybersecurity, the integration of AI, and the user experience in implementing these security measures.TakeawaysZero Trust is essential for modern cybersecurity.Traditional VPNs are inadequate for current security needs.IoT devices pose significant security challenges.Faction Networks uses a unique approach to key management.Encryption is a core component of Faction's security model.Micro-segmentation helps in isolating critical devices.AI can enhance security through anomaly detection.Privacy is a priority in Faction's design.User experience is crucial for security implementation.The future of cybersecurity will involve hardware and software integration.
undefined
Apr 7, 2025 • 23min

Visible Ops Book Conversation

In this conversation, Dr. Chase Cunningham and Scott Aldridge discuss the principles of the Visible Ops methodology and its application in cybersecurity. Scott shares his extensive background in IT and cybersecurity, emphasizing the importance of understanding and managing IT assets through effective change and configuration management. They explore practical techniques for implementing cybersecurity best practices, the significance of leadership support, and the challenges organizations face in adopting these practices. The discussion also touches on the value of partnering with managed service providers (MSPs) and the need for a proactive approach to cybersecurity, including the adoption of a zero trust model.TakeawaysYou can't control what you can't measure.Assume breach and prepare accordingly.Progress over perfection is key in cybersecurity.Best practices often aren't implemented effectively.Building cybersecurity expertise in-house is expensive.Partnering with an MSSP can be cost-effective.Integrity management is crucial for IT security.Leadership support is essential for cybersecurity initiatives.Compliance does not guarantee a good cybersecurity posture.Understanding your IT assets is foundational for security.
undefined
Mar 27, 2025 • 17min

The Dr Zero Trust Show (the SignalGate Analysis)

In this conversation, Dr. Zero Trust analyzes a recent incident involving the leak of tactical action plans by high-ranking officials through unsecured communication channels. He discusses the implications of this leak on national security, the classification of information, and the accountability of government officials. The conversation highlights the discrepancies in how classified information is treated among different individuals and the need for integrity and accountability in leadership roles.TakeawaysThe incident involved a leak of tactical action plans.High-ranking officials should use secure communication methods.The classification of information is often misinterpreted.There is a double standard in accountability for leaks.Leadership must hold themselves accountable for their actions.The integrity of government officials is crucial for national security.Past incidents of information leaks show a pattern of behavior.The consequences for lower-ranking individuals are harsher than for officials.Public trust in government is eroded by lack of accountability.The conversation emphasizes the importance of protecting classified information.
undefined
Mar 20, 2025 • 20min

The Dr Zero Trust Show

In this conversation, Dr. Chase Cunningham, also known as Dr. Zero Trust, discusses the intersection of cybersecurity and finance, focusing on market trends, vulnerabilities, and the implications of recent cybersecurity incidents. He emphasizes the importance of understanding the financial aspects of cybersecurity, including stock performance and investment strategies, while also addressing the challenges faced by government programs and the ongoing threats from ransomware and state-sponsored attacks.TakeawaysCybersecurity is becoming increasingly intertwined with financial markets.Investors should consider buying stocks after breaches for potential rebounds.Government cybersecurity programs face significant vulnerabilities.Microsoft has not patched a critical vulnerability for eight years.Legislative bodies are scrutinizing the DHS's response to cyber threats.Ransomware operations may have connections to state actors.Investment opportunities exist in the cybersecurity sector despite volatility.Fake updates are a common tactic used by ransomware gangs.Understanding the financial impact of cybersecurity breaches is crucial.Staying informed and proactive is essential for cybersecurity.
undefined
Mar 17, 2025 • 34min

The Dr Zero Trust Show

In this conversation, Dr. Chase Cunningham and Barry Mainz, CEO of Forescout, discuss the pressing issues surrounding cybersecurity, particularly in critical infrastructure, legacy systems, and the importance of a zero trust approach. They critique the Netflix series 'Zero Day' for its portrayal of cybersecurity threats and explore the current state of security in various sectors, including healthcare and airports. The discussion emphasizes the need for compliance, business continuity, and the integration of cybersecurity into business strategies. They also touch on the future of cybersecurity investments and the importance of considering schools as critical infrastructure.TakeawaysThe portrayal of cybersecurity in media can be exaggerated.Critical infrastructure is vulnerable and requires investment in security.Zero trust principles should be applied to OT and IoT systems.Legacy systems pose significant challenges for cybersecurity.Compliance requirements for OT and IoT are lacking compared to other sectors.Business continuity is a key driver for cybersecurity investments.Cybersecurity discussions should focus on business impacts, not just technical details.Heterogeneous environments require flexible security solutions.Airports vary in their cybersecurity readiness based on age and investment.Healthcare cybersecurity often reacts to breaches rather than preventing them.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app