David Bombal

David Bombal
undefined
Dec 10, 2025 • 12min

#526: Stop Building AI Chatbots (Do This Instead)

Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Chatbots are out; AI Agents are in. But are your networks ready for the massive traffic spikes, and is your data secure? In this interview from Cisco Partner Summit, we discuss the critical security flaws in the Model Context Protocol (MCP), why 99% of these servers are exposed, and how Cisco’s new MCP Scanner and Silicon One P200 chip aim to fix the infrastructure gap. // DJ Sampath’s SOCIAL // LinkedIn: / djsampath X: https://x.com/djsampath // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:35 - The 3 trends of AI: infrastructure constraints explained 03:29 - Data gap explained 04:14 - Trust deficit explained // AI safety 05:22 - Solutions for the trends // Open source projects 08:56 - Addressing the problem with AI agents 10:22 - Reassuring the AI skeptics 12:22 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
undefined
Dec 10, 2025 • 57min

#525: Microsoft Recall: The Ultimate Privacy NIGHTMARE of 2025

A big thank you to Proton Pass for sponsoring this video. Proton Pass’ Black Friday Special is $1.99 per month on a 12 month plan https://proton.me/davidbombal Save 60%. Rob Braxman reveals the dangers of Windows Recall, Apple Intelligence, and client-side scanning. Discover why AI surveillance and TPM chips mark the end of privacy in 2025. // Rob Braxman’s SOCIAL// YouTube: / @robbraxmantech Website: https://brax.me/home/rob GitHub: https://github.com/robbraxman X: https://x.com/robbraxmantech // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:20 - Proton Pass sponsored segment 02:54 - Digital IDs and security chips on devices 05:24 - Client-side scanning 12:40 - Client-side scanning with AI 22:05 - Embedded AI for client-side scanning 27:32 - Microsoft + Windows Recall 35:51 - Microsoft vs Apple // Cloud storage 39:31 - Moving to Linux & dual boot 44:27 - TPM & EKI explained 49:28 - Restrictions with digital IDs 54:15 - Linux phones 56:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
undefined
Nov 28, 2025 • 25min

#524: Why Cisco Built This AI Device

Join Cisco executive Kevin Wollenweber, a networking expert, as he unveils the groundbreaking Unified Edge device. Discover how this innovative technology combines servers, networking, and security for a seamless edge experience. Kevin dives into the implications of Physical AI, urgent security challenges, and the game-changing Cisco–NVIDIA partnership. Learn about edge AI applications in retail and manufacturing, the complexities of managing agent identities, and the future of data centers as they evolve to meet massive networking demands.
undefined
Nov 26, 2025 • 22min

#523: Why We Are MASSIVELY Underestimating AI Infrastructure Demand

Jeetu Patel, a technology executive specializing in infrastructure and security, dives into the overlooked demand for AI infrastructure. He argues that power is the core constraint while GPUs are essential assets. Networking acts as a force multiplier, enabling massive scalability across data centers. Patel emphasizes the rising significance of edge AI with unified platforms for secure, plug-and-play solutions. He also highlights critical bottlenecks in AI adoption, including infrastructure needs, trust deficits, and data gaps, reshaping our understanding of AI's future.
undefined
Nov 26, 2025 • 15min

#522: Does Traditional Encryption End in 2027?

Join Vijoy Pandey, a quantum computing and networking expert at Cisco, as he dives into the future of cybersecurity and encryption. He reveals that distributed quantum computing is set to arrive sooner than expected, shaking the foundations of traditional encryption methods. Vijoy introduces the 'Store Now, Harvest Later' threat, highlighting how adversaries could capture encrypted data for future decryption. He discusses Cisco's pivotal role in developing quantum networking technologies and the advantages of post-quantum cryptography, setting the stage for a revolution in data security.
undefined
Nov 21, 2025 • 1h 6min

#521: Why GrapheneOS is Almost Impossible to Crack (Forensic Teams Have Tried)

Dive into the world of GrapheneOS with expert MetropleX as they debunk myths and explore its unmatched security features. Learn why it's more secure than iOS's lockdown mode and how it manages banking apps and notifications. Discover the intricacies of app compatibility, including how Play Services are sandboxed, and the innovative tracking mitigation strategies in place. Uncover the challenges forensic teams face when attempting to breach Pixel devices running GrapheneOS. A fascinating look at privacy and security in the digital age!
undefined
Nov 12, 2025 • 50min

#520: Watch Your WiFi: One Infected Phone Takes Over Your Life

Occupy The Web, a cybersecurity expert and founder of Hackers Arise, dives deep into the world of digital threats. He reveals how even Apple iPhones can harbor serious malware and discusses the infamous Pegasus spyware. The conversation explores how one compromised phone can jeopardize your entire smart home network and why existing defenses often fall short. OTW also highlights the relentless nature of spyware sales, legal limitations, and the critical need for personal vigilance in an increasingly insecure digital landscape.
undefined
13 snips
Nov 8, 2025 • 49min

#519: Build Your First OSINT Bookmarklet in 5 Minutes

Micah Hoffman and Griffin G are OSINT experts and co-founders of MyOSINT Training, specializing in investigative tools. They dive into how to extract hidden data from popular platforms using simple JavaScript bookmarklets. The duo discusses practical applications in law enforcement, helps investigators craft tools with AI, and explains the importance of operational security when utilizing these techniques. They're passionate about empowering others to build their own OSINT resources, making sophisticated investigations accessible to everyone.
undefined
Oct 17, 2025 • 28min

#518: How Cisco Links Data Centers: 64x800G at 51.2 Tbps Securely

Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters. What you’ll learn • Why GPUs are useless without massive, reliable interconnects • 51.2 Tbps with 64×800G ports and what that enables for AI training • Deep buffers vs shallow buffers and when each wins • Line-rate encryption today and post-quantum readiness tomorrow • SONiC on Cisco Silicon One, P4, and automation at hyperscale If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network. // Martin Lund’s SOCIALS // LinkedIn: / martinlundca // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:54 - Intro 0:59 - Martin's Background 02:15 - Martin's Advice 02:48 - Cisco's Announcement 06:12 - Data Center Scaling 07:02 - Data Centres Scaling Across 11:08 - New Router Speeds 13:24 - Securing the Data Center (Quantum Computing) 17:57 - Are Deep Buffers Efficient? 19:25 - New Protocols 22:50 - Data Center Infrastructure 24:07 - 8804 Router Innovations 25:33 - The Future of Data Centers 27:50 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #networking #ai
undefined
Oct 6, 2025 • 40min

#517: Have you been hacked? Advanced detection method

OTW, a digital forensics practitioner and author behind OccupyTheWeb, shares expertise on detecting hacks using OSQuery, a powerful tool that turns system data into a queryable database. He discusses real-world cases involving harassment and business disputes to illustrate key signs of compromise, including suspicious processes and registry entries. Listeners learn how to identify fileless malware and the limitations of traditional antivirus systems. OTW provides practical SQL-style commands to help users investigate potential breaches effectively.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app