Risky Business cover image

Risky Business

Latest episodes

undefined
23 snips
Feb 26, 2025 • 1h 3min

Risky Business #781 -- How Bybit oopsied $1.4bn

This week, a staggering $1.4 billion was stolen from the Bybit cryptocurrency exchange, sparking a deep dive into the security flaws that allowed it to happen. North Korea's sophisticated hacking methods are discussed, alongside the dangers inherent in routine cryptocurrency transfers. The podcast also tackles encryption debates, government surveillance, and the challenges companies like Meta face with account management and automation. There’s a look at advanced techniques used by hackers targeting Cisco devices and vulnerabilities within Windows security solutions.
undefined
Feb 21, 2025 • 41min

Wide World of Cyber: DeepSeek lobs an AI hand grenade

Join Alex Stamos, former CISO for Facebook and Yahoo, and Chris Krebs, ex-director of CISA, as they dive into the intriguing world of AI and its geopolitical implications. They discuss the controversial DeepSeek AI model and its potential impact on cybersecurity. The duo analyzes the skepticism surrounding AI innovations and examines the contrasting regulatory approaches in Europe and the U.S. Don't miss their insights on privacy rights, market dynamics, and the future of AI innovation amidst growing international tensions.
undefined
13 snips
Feb 19, 2025 • 1h 1min

Risky Business #780 -- ASD torched Zservers data while admins were drunk

Braden Rogers, Chief Customer Officer at Island, discusses the pressing challenges of AI data exposure. He dives into the emotional toll recent cyber incidents have had on the tech community. The conversation also highlights the complexities of managing unstructured data in enterprises and the increasing necessity of robust security measures as large language models become ubiquitous. Additionally, Braden critiques existing protections against prompt injection attacks while advocating for smarter data governance strategies.
undefined
8 snips
Feb 14, 2025 • 38min

Risky Biz Soap Box: Run your own open source IDP with Authentik

Fletcher Heisler, CEO of Authentik and a leader in open-source identity solutions, dives into the power of self-hosted identity management. He explains how users are reclaiming control from traditional SaaS providers like Okta. The discussion highlights Authentik's flexibility and adaptability for businesses, whether on-premises or in the cloud. Fletcher emphasizes user-driven development, security through transparency, and the importance of backup strategies, making a strong case for the future of open-source identity solutions.
undefined
50 snips
Feb 12, 2025 • 59min

Risky Business #779 -- DOGE staffer linked to The Com

Edward Wu, Founder and CEO of Dropzone.AI, shares insights on leveraging AI to improve security operations at SOCs. He discusses the rise in cybersecurity threats connected to sensitive data access, especially concerning the controversies surrounding Musk's DOGE team. The conversation delves into the evolving practices in cloud security and the shift from reactive to proactive measures against cybercrime. Wu emphasizes how AI can handle tedious tasks, allowing human analysts to focus on critical insights and better tackle emerging cyber risks.
undefined
34 snips
Feb 5, 2025 • 56min

Risky Business #778 -- Musk's child soldiers seize control of FedGov IT systems

Josh Kamdjou, co-founder and CEO of Sublime Security, dives into the significant challenges facing email security. He discusses how attackers exploit trusted platforms like DocuSign for phishing campaigns. The conversation also touches on recent cybersecurity breaches, the complexities of managing government IT systems, and the necessity for advanced detection methods in email security. Kamdjou highlights the continuous evolution of scammers’ tactics and the importance of robust defenses to safeguard sensitive information.
undefined
16 snips
Jan 29, 2025 • 51min

Risky Business #777 -- It's SonicWall's turn

Luke Jennings, a security researcher at Push Security, dives into the pitfalls of federated authentication, emphasizing how attackers exploit unexpected identity providers. He highlights alarming vulnerabilities in SonicWall devices and a comical DNS mishap involving MasterCard. The discussion also touches upon the risks of using personal Google accounts for corporate access and the complexities of managing multiple identity providers. With an eye on emerging threats, Jennings provides insights into securing user authentication in today's digital landscape.
undefined
34 snips
Jan 22, 2025 • 1h 4min

Risky Business #776 -- Trump will flex American cyber muscles

Craig Rowland, founder of Sandfly Security, brings his expertise in Linux EDR solutions to the conversation. He discusses the pressing challenges in Linux security monitoring, emphasizing the lack of standardized detection and response methods. The podcast also examines political influences on cybersecurity during the Trump administration and the implications of recent U.S. policies. Key topics include the complexities of securing Linux systems compared to Windows and addressing vulnerabilities in critical infrastructure. Tune in for insights into how organizations can fortify their defenses!
undefined
Dec 20, 2024 • 27min

Risky Biz Soap Box: Cool compliance tricks with the Island enterprise browser

Michael Fey, CEO of Island, shares insights on their innovative enterprise browser designed for compliance and security. He discusses clever ways the browser meets cybersecurity and regulatory challenges, particularly around user access and GDPR. The conversation also delves into the risks of using Gen.ai chatbots in corporate settings and how a specialized browser can enhance secure collaborations during mergers and acquisitions. Fey's engaging take on compliance makes it a surprisingly fun listen!
undefined
43 snips
Dec 18, 2024 • 1h 1min

Risky Business #775 -- Cl0p is back, SEC hack disclosures disappoint

Robby Winchester from SpecterOps, a leading cybersecurity firm renowned for its penetration testing expertise, joins the discussion. He shares insights on the evolution of penetration testing, highlighting the growing importance of identity-centric approaches. The conversation also dives into the recent resurgence of the Cl0p ransomware crew and their alarming hacks. The hosts critique the SEC's uninspiring cyber incident reporting rule and examine the implications of vulnerabilities within Java enterprise software, emphasizing the pressing challenges in today's cybersecurity landscape.

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner