CyberWire Daily

N2K Networks
undefined
7 snips
Nov 16, 2025 • 10min

Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]

In this engaging discussion, Chenxi Wang, founder of Rain Capital and a seasoned expert in cybersecurity, shares how she overcame personal fears to achieve her professional goals. She reflects on her journey from China to the U.S. and her pivotal shift from academia to the venture capital world. Chenxi emphasizes the importance of mentorship and community, detailing her work with the women's executive network. She also addresses breaking glass ceilings and how she aims to leave a legacy rooted in kindness and support for underrepresented groups.
undefined
10 snips
Nov 15, 2025 • 24min

When clicks turn criminal. [Research Saturday]

Dr. Renée Burton, Vice President of Threat Intelligence at Infoblox, dives deep into the rogue world of Vane Viper, a Cyprus-based entity entwined with one of the largest ad networks, PropellerAds. She reveals how this network operates as a criminal infrastructure, profiting from fraud and disinformation. The conversation uncovers the alarming connection between adtech and organized crime while offering practical advice for users to navigate these treacherous digital waters. Discover the dark side of the ad ecosystem and the implications for online safety.
undefined
14 snips
Nov 14, 2025 • 30min

Operation spyGPT.

Mike Arrowsmith, Chief Trust Officer at NinjaOne, discusses the pressing issues of cyber insurance, likening it to California's fire insurance crisis. He highlights how AI technology is lowering attack complexity, leading to more frequent breaches and increased insurer payouts. Arrowsmith emphasizes the shift in insurers' due diligence from simple questionnaires to thorough audits. He also advises organizations to view cyber insurance as a partnership rather than just a cost, ensuring comprehensive coverage tailored to their cybersecurity needs.
undefined
Nov 13, 2025 • 29min

404: Cybercrime not found.

In this discussion, Garrett Hoffman, Senior Manager of Cloud Security Engineering at Adobe, shares insights on cloud security strategies. He breaks down achieving security at scale, emphasizing the importance of shared standards and building trust with teams. Misconceptions about remediation and responsibility are addressed, along with how standardized practices at Adobe enhance both security and efficiency. The conversation also touches on the future of cloud security, highlighting AI's dual role as an asset and a challenge.
undefined
Nov 12, 2025 • 31min

Closing cracks before hackers do.

In a captivating conversation, Bob Maley, the Chief Security Officer at Black Kite and an expert in third-party risk management, delves into the newly proposed BKGA3 AI assessment framework. He explains its goal of synthesizing fragmented AI standards to minimize risk and discusses the importance of open standards in the AI landscape. Bob shares insights on the rapid growth of LLM capabilities and how the framework will adapt to emerging threats. Tune in for actionable insights on responsible AI risk management and the future of AI assessments!
undefined
Nov 11, 2025 • 30min

Transitioning from service to civilian life. [T-Minus Deep Space]

Lieutenant Rob Sarver, a former Navy SEAL and author dedicated to aiding veterans, joins lawyer Alex Gendzier, who has researched veteran transitions. They discuss the 'hero's journey' framework for understanding the military-to-civilian shift. Rob shares insights on identity challenges and the 'fog' of reintegration, while Alex reveals their interview research methods to guide veterans. The duo emphasizes the importance of mentorship and resource aggregation, addressing the struggles faced by military families and urging civilians to take transitions seriously.
undefined
Nov 11, 2025 • 37min

The changing face of fraud. [CISO Perspectives]

In this discussion, Mel Lanning, Executive Director of the BBB Institute for Marketplace Trust, delves into the evolving landscape of fraud. She explains the distinction between scams and fraud, highlighting the staggering growth of crypto investment scams. Mel reveals the rising prevalence of employment and romance scams, especially the emotional manipulation involved. She also underscores the importance of continual employee training in small businesses. Finally, she advocates for a national strategy to combat fraud, emphasizing empathy for victims.
undefined
5 snips
Nov 10, 2025 • 30min

Rebooting the government, one cyber law at a time.

Tim Starks, a Senior reporter at CyberScoop specializing in federal cybersecurity, joins to untangle the complexities surrounding the CyberCorps/Scholarship for Service initiative. He discusses the impact of the recent government shutdown on cybersecurity laws and the new Department of Defense model for military cyber forces. Starks raises concerns about students’ obligations amid hiring freezes and potential deferments. The conversation also touches on the long-term viability of the program and innovative ideas for recruitment.
undefined
Nov 9, 2025 • 8min

Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]

In this engaging discussion, Michael DeBolt, Chief Intelligence Officer at Intel 471 and former NCIS special agent, shares his fascinating transition from aspiring actor to cybersecurity expert. He reflects on his military service and how a pursuit of justice shaped his career decisions. Michael's insights on leading cyber initiatives at Interpol highlight his commitment to teamwork and servant leadership. His journey underscores the importance of purpose and adaptability in navigating a unique and impactful career.
undefined
Nov 8, 2025 • 24min

A fine pearl gone rusty. [Research Saturday]

Tal Peleg is a Senior Product Manager at Varonis, specializing in security research, and Coby Abrams is a cybersecurity researcher who provided essential analysis for the Rusty Pearl vulnerability. They delve into the implications of remote code execution in Postgres, discussing a specific flaw that could lead to data theft. Their exploration highlights essential security practices, including the importance of patching and managing cloud environments. They also share insights from their presentations at DEF CON, emphasizing the need for proactive data hygiene in the cloud.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app