When fake fixes hide real attacks.

When fake fixes hide real attacks.

Up next

War hits where it hurts.

Conflict in the Middle East disrupts the circuit board supply chain. The Supreme Court considers arguments on geofence searches. A new report highlights Chinese digital transnational repression. The NCSC protects HDMI and DisplayPort links. Tennessee bans cryptocurrency ATMs. Res ...  Show more

The Three-Layer Strategy for Autonomous Agent Governance with Joe Hladik [Data Security Decoded] and Amit Malik

The race for AI dominance has created a dangerous imbalance between business velocity and cyber resilience. In this episode, host Caleb Tolin is joined by Joe Hladik, Head of Rubrik Zero Labs, and Staff Security Researcher Amit Malik to break down the findings of their latest rep ...  Show more

Recommended Episodes

Managing online security throughout the decades.
Hacking Humans

This week, our hosts⁠⁠⁠⁠⁠ Dave Bittner, ⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off w ...  Show more

The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
Innovation Heroes

A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.

...

  Show more

10,000 Days in Cybersecurity
Threat Vector by Palo Alto Networks

Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ...  Show more