Podcast Episodes
Back to SearchHow Fortinet Delivers Web App Security in the AI Era (Sponsored)
Episode 88
Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’r…
2 months, 4 weeks ago
Why SBOMs Are Cooler and More Useful Than You Think
Episode 87
Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could yo…
3 months ago
Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
Episode 86
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF sta…
3 months, 1 week ago
News Roundup - Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
Episode 85
Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigat…
3 months, 2 weeks ago
Inside the CVE Process With Cisco (Sponsored)
Episode 84
CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many thin…
3 months, 3 weeks ago
A CISO’s Perspective on Model Context Protocol (MCP)
Episode 83
Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and…
4 months ago
Building a Workable Mobile Security Strategy In a World of Risky Apps
Episode 82
Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile off…
4 months, 1 week ago
News Roundup - BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
Episode 81
From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop…
4 months, 2 weeks ago
The State of OT Risks in 2025 (and What to Do About Them)
Episode 80
What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security …
4 months, 3 weeks ago
Rethinking the Architecture of Microsegmentation
Episode 79
Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentati…
5 months ago