Podcast Episodes

Back to Search
The Generative Firewall: Securing AI and Using AI for Defense
The Generative Firewall: Securing AI and Using AI for Defense

Episode 328

This episode explores the transformative challenge of modern security, focusing on how organizations must adapt their strategies to both secure gener…

3 months, 1 week ago

Short Long
View Episode
Rogue Agents and Railgun Fights: Securing the AI Frontier
Rogue Agents and Railgun Fights: Securing the AI Frontier

Episode 327

Nation-state hackers are now deploying autonomous AI agents like Claude to execute 80–90% of sophisticated espionage and crime campaigns at machine s…

3 months, 2 weeks ago

Short Long
View Episode
The 90% Attack: Inside the First AI-Orchestrated Cyber Espionage Campaign
The 90% Attack: Inside the First AI-Orchestrated Cyber Espionage Campaign

Episode 326

Anthropic revealed on November 13, 2025, that Chinese state-sponsored hackers successfully weaponized its Claude AI system to conduct the first docum…

3 months, 2 weeks ago

Short Long
View Episode
Beyond the First Lie: Building Communication Resilience with the RESIST Framework
Beyond the First Lie: Building Communication Resilience with the RESIST Framework

Episode 325

Explore the systematic RESIST 3 framework, which guides government communicators through six sequential steps designed to build resilience against th…

3 months, 2 weeks ago

Short Long
View Episode
From Perimeter to Pipeline: Securing the OWASP Top 10 in the Cloud Era
From Perimeter to Pipeline: Securing the OWASP Top 10 in the Cloud Era

Episode 323

The 2025 OWASP Top 10 reveals a fundamental shift in application security, showing how threats have transformed from simple code flaws like buffer ov…

3 months, 2 weeks ago

Short Long
View Episode
From BOLA to Bots: Building a Layered API Defense Against the Modern Top 10
From BOLA to Bots: Building a Layered API Defense Against the Modern Top 10

Episode 322

APIs are the "nervous system" of modern applications, making them the number one attack vector, with flaws like Broken Object Level Authorization (BO…

3 months, 2 weeks ago

Short Long
View Episode
Orchestrating Security: The DevSecOps Blueprint for 2025
Orchestrating Security: The DevSecOps Blueprint for 2025

Episode 321

Driven by a market anticipated to exceed USD 40.6 billion by 2030, DevSecOps Engineers are crucial experts who bridge the gaps between software devel…

3 months, 2 weeks ago

Short Long
View Episode
The Algorithmic Adversary: Tracking the Shift to Novel AI-Enabled Malware
The Algorithmic Adversary: Tracking the Shift to Novel AI-Enabled Malware

Episode 324

The Google Threat Intelligence Group (GTIG) has identified a significant shift where adversaries are now deploying novel AI-enabled malware in active…

3 months, 3 weeks ago

Short Long
View Episode
The Scorched Earth CISO: Extinguishing Burnout with AI and Executive Support
The Scorched Earth CISO: Extinguishing Burnout with AI and Executive Support

Episode 320

Cybersecurity leaders, including CISOs, face overwhelming job demands and chronic stress, with up to 80% classifying themselves as “highly stressed” …

3 months, 3 weeks ago

Short Long
View Episode
Hybrid Resilience: Mastering Digital Tech and Collaboration for Supply Chain Recovery
Hybrid Resilience: Mastering Digital Tech and Collaboration for Supply Chain Recovery

Episode 319

The COVID-19 pandemic introduced unprecedented volatility and uncertainty (VUCA) to global supply chains, forcing retailers to rapidly pivot their op…

3 months, 3 weeks ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us