PLAY PODCASTS
CISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

463 episodes — Page 1 of 10

Shadows Over Security: Inside the CSIS 2025 Public Report

May 15, 202622 min

Securing the AI Supply Chain: The G7 SBOM Guidelines

May 14, 202621 min

The Dual-Use Dilemma: OpenAI Daybreak vs. Project Glasswing

May 13, 202622 min

The 2026 Cyber Compliance Collision: AI, Quantum, and Global Mandates

May 12, 202623 min

The EdTech Supply Chain Collapse: Inside the PowerSchool and Canvas Breaches

May 11, 202647 min

Building the Human Resilience Infrastructure

May 7, 202614 min

Zero Trust in OT: Securing the Physical World

May 4, 202625 min

Autonomous Defenses: Securing Agentic AI

May 3, 202625 min

Autonomic Resilience: Navigating the Hidden Fault Lines

May 1, 202657 min

CISO.POKER — Where Security Leadership Meets the Felt

Apr 29, 202617 min

Digital Trust 2026: Identity, Privacy, and the New Regulatory Frontier

Apr 20, 202625 min

The 2026 Compliance Countdown: Navigating the New Era of Global Privacy and Cyber Regulations

Apr 19, 202652 min

The Digital Siege: Supply Chain Poisoning and the New Era of Cyber Warfare

Apr 18, 202650 min

Ep 451The Mythos Paradox: Leaks, Lawsuits, and the AI IPO of the Century

Anthropic recently unveiled Claude Mythos, an unreleased frontier AI model with unprecedented cybersecurity capabilities that led the company to restrict its access exclusively to defensive partners via Project Glasswing. This revelation coincided with a chaotic week of accidental source code leaks and an unprecedented legal battle against the Pentagon, which blacklisted Anthropic as a "supply chain risk" over the company's refusal to drop safety guardrails. Together, these dramatic events have fueled a massive hype narrative ahead of Anthropic's planned October 2026 IPO, where the company is targeting a valuation of up to $500 billion. https://podcast.cisomarketplace.com/e/the-mythos-dilemma-ai-zero-days-and-project-glasswing https://cisomarketplace.com/blog/project-glasswing-claude-mythos-cybersecurity https://cisomarketplace.com/blog/claude-mythos-leak-cybersecurity-stocks-crash-2026 Sponsors: www.breached.company www.compliancehub.wiki

Apr 12, 202642 min

Ep 450The 40-Minute Collapse: How Fake Compliance Broke the AI Supply Chain

In March 2026, a 40-minute supply chain attack on the open-source library LiteLLM allowed hackers to steal four terabytes of highly sensitive data from Mercor, a $10 billion AI training startup. The breach exposed a fragile trust infrastructure across the tech industry, revealing that LiteLLM's security certifications were fabricated by Delve Technologies, a compliance vendor that systematically rubber-stamped fake audits. As major AI labs like Meta indefinitely pause their contracts, Mercor now faces a wave of class-action lawsuits alleging that its mandatory, invasive contractor surveillance practices funneled unauthorized third-party trade secrets and personal data straight to cybercriminals. https://compliancehub.wiki/mercor-litellm-delve-class-action-supply-chain-compliance-fraud/ https://compliancehub.wiki/five-lawsuits-mercor-data-breach-litigation-breakdown/ Sponsors www.breached.company www.compliancehub.wiki

Apr 11, 202651 min

Ep 449The Mythos Dilemma: AI, Zero-Days, and Project Glasswing

Anthropic's latest frontier model, Claude Mythos Preview, has demonstrated an unprecedented ability to autonomously discover and exploit zero-day vulnerabilities in critical software. Recognizing the extreme dual-use risks of these capabilities falling into the wrong hands, Anthropic has made the unprecedented decision to withhold the model from general public release. Instead, the model is being deployed through Project Glasswing, a collaborative initiative with major tech industry partners aimed at using this powerful AI exclusively to secure the world's digital infrastructure. https://cisomarketplace.com/blog/project-glasswing-claude-mythos-cybersecurity https://cisomarketplace.com/blog/claude-mythos-leak-cybersecurity-stocks-crash-2026 https://www.anthropic.com/glasswing Sponsors: www.cisomarketplace.com

Apr 8, 202625 min

Ep 448Decoding CCPA: Navigating Cybersecurity Audits and Existing Frameworks

Dive into the nuances of California's new CCPA cybersecurity audit requirements and discover how they redefine the standard for "reasonable security". We explore how businesses can strategically leverage existing NIST, ISO, or CIS assessments as a foundation, while identifying the critical scope mismatches they must "top off" to ensure compliance. Tune in for a practical, four-step roadmap to navigate CalPrivacy's 18 evaluation components and prepare your organization's data protection strategy for the next wave of regulatory scrutiny. Sponsors: www.compliancehub.wiki www.cisomarketplace.com

Apr 6, 202616 min

Ep 447Encrypted Extortion: Inside Latin America's Cybercrime Boom

Dive into the rapidly evolving cyber threat landscape of Latin America and the Caribbean, where financially motivated threat actors are increasingly exploiting rapid digital adoption to target the region's largest economies. We explore how cybercriminals and hacktivist collectives like FiveFamilies are utilizing encrypted platforms like Telegram and WhatsApp to distribute banking trojans, deploy double-extortion ransomware against critical industries, and launch highly convincing AI-driven social engineering attacks. Join us as we unpack the tactics of these digital adversaries and discuss the urgent need for modernized infrastructure and public-private collaboration to secure the LAC region's digital future. Sponsors: www.myprivacy.blog www.breached.company

Apr 5, 202622 min

Ep 446Growing Up Digital: Safeguarding Youth in the EU

Explore the evolving landscape of youth digital protection across the European Union, where groundbreaking laws like the GDPR and the Digital Services Act (DSA) are being deployed to shield minors from data exploitation and harmful content. As emerging innovations like immersive virtual environments, neuromarketing, and AI-generated deepfakes introduce unprecedented risks to children's mental privacy and cognitive development, the battle for digital safety is becoming increasingly complex. Join us as we examine how local and regional authorities are stepping up to bridge the gap between high-level regulations and frontline realities, transforming overarching policies into tangible, community-based safeguards for families and schools. Sponsors: www.myprivacy.blog www.compliancehub.wiki

Apr 4, 202623 min

Ep 445Panic, Privacy, and Protecting Youth: Unpacking Child Online Safety Laws

This podcast dives into the current wave of Child Online Safety Legislation (COSL), such as the Kids Online Safety Act (KOSA), to unpack the political and societal forces driving these bipartisan bills. We critically examine the prevailing narrative that social media is the primary cause of the youth mental health crisis, exploring how "moral panics" over technology often ignore complex social realities. Furthermore, we discuss the potential unintended consequences of these legislative efforts, including severe threats to data privacy, free expression, and the well-being of marginalized youth through mandated age verification and expanded parental surveillance. Sponsors: www.myprivacy.blog www.cisomarketplace.com

Apr 4, 202623 min

Ep 444The Illusion of Trust: Fake Compliance and the LiteLLM Hack

This episode dives into the massive compliance fraud orchestrated by Delve, a Y Combinator-backed startup that generated hundreds of identical, fabricated SOC 2 reports using rubber-stamping certification mills. We explore how this "compliance theater" collided with a real-world supply chain attack when LiteLLM, a company boasting Delve-generated certifications, was breached through a compromised vulnerability scanner called Trivy. Ultimately, we unpack the devastating consequences of prioritizing automated compliance badges over actual security controls, and what this structural failure means for enterprise vendor risk management in 2026. https://compliancehub.wiki/litellm-delve-soc2-trust-chain-compliance-failure-2026 https://breached.company/litellm-supply-chain-attack-teampcp-trivy-pypi-2026 https://compliancehub.wiki/delve-compliance-startup-fake-soc2-audit-scandal https://cisomarketplace.com/blog/auditor-vs-assessor-compliance-trust-2026 Sponsors www.compliancehub.wiki www.cisomarketplace.com www.breached.company

Mar 28, 202647 min

Ep 442Il CISO del 2026: Architetti della Fiducia Digitale

Il ruolo del Chief Information Security Officer si è radicalmente trasformato da una funzione puramente informatica a una posizione strategica a livello esecutivo, focalizzata sul rischio digitale dell'intera azienda. Spinti dalla rapida adozione dell'intelligenza artificiale agentica, dall'espansione delle identità non umane e dalle nuove e severe normative globali come la Direttiva NIS2 dell'UE, i CISO sono ora essenziali per garantire la resilienza operativa e proteggere la continuità aziendale. Questo podcast esplora come i moderni leader della sicurezza stiano colmando il divario tra la tecnologia e il consiglio di amministrazione per combattere le minacce alla velocità delle macchine e navigare in un panorama normativo sempre più complesso. English: https://www.podbean.com/ew/pb-r9v3x-1a73307 Sponsors: www.cisomarketplace.com www.breached.company

Mar 27, 202623 min

Ep 443Weaponizing Trust: The TeamPCP Campaign and the Age of Cascading Failure

The cyber threat landscape is experiencing a massive paradigm shift, as adversaries move away from isolated network breaches to industrialize the compromise of global digital supply chains. This episode breaks down the unprecedented March 2026 TeamPCP campaign, exploring how attackers weaponized the trusted Trivy vulnerability scanner, compromised the widely used LiteLLM AI package, and unleashed the self-propagating Shai-Hulud worm across the npm ecosystem. We also examine how the growing use of artificial intelligence by threat actors, the exploitation of unmonitored edge devices, and the rise of destructive wiper attacks against critical infrastructure are forcing organizations to adopt zero-trust models and continuous resilience strategies. https://breached.company/litellm-supply-chain-attack-teampcp-trivy-pypi-2026 https://compliancehub.wiki/delve-compliance-startup-fake-soc2-audit-scandal Sponsors: www.cisomarketplace.com www.breached.company

Mar 26, 202641 min

Ep 441CISO 2026: Architekci Cyfrowego Zaufania

Rola dyrektora ds. bezpieczeństwa informacji (CISO) uległa fundamentalnej transformacji z funkcji operacyjnej IT w strategiczne stanowisko na szczeblu kierowniczym, koncentrujące się na ryzyku cyfrowym w całej organizacji. W związku z szybką adopcją agentycznej sztucznej inteligencji, rosnącą liczbą tożsamości nieludzkich oraz surowymi nowymi globalnymi regulacjami, takimi jak unijna dyrektywa NIS2, dyrektorzy CISO są teraz kluczowi dla zapewnienia odporności operacyjnej i ochrony ciągłości biznesowej. Ten podcast analizuje, w jaki sposób współcześni liderzy ds. bezpieczeństwa zasypują przepaść między technologią a zarządem, aby zwalczać zagrożenia działające z prędkością maszyn i poruszać się w coraz bardziej złożonym krajobrazie regulacyjnym. English Version: https://www.podbean.com/ew/pb-r9v3x-1a73307 Sponsors: www.cisomarketplace.com www.breached.company

Mar 26, 202616 min

Ep 440O CISO de 2026: Arquitetos da Confiança Digital

O papel do Chief Information Security Officer (CISO) passou por uma transformação fundamental, deixando de ser uma função técnica de TI para se tornar um cargo estratégico de nível executivo focado no risco digital de toda a empresa. Impulsionados pela rápida adoção da inteligência artificial agêntica, pela expansão das identidades não humanas e por novas regulamentações globais rigorosas, como a Diretiva NIS2 da UE, os CISOs agora são essenciais para garantir a resiliência operacional e proteger a continuidade dos negócios. Este podcast explora como os líderes de segurança modernos estão diminuindo a distância entre a tecnologia e a diretoria para combater ameaças em velocidade de máquina e navegar em um cenário regulatório cada vez mais complexo. English: https://www.podbean.com/ew/pb-r9v3x-1a73307 Sponsor: www.cisomarketplace.com www.breached.company

Mar 24, 202613 min

Ep 439Resilient Networks: Unpacking the 2025 Malicious Infrastructure Landscape

Explore the evolving world of cyber threats in this deep dive into the 2025 malicious infrastructure landscape, where tools like Cobalt Strike and AsyncRAT continued to dominate global attacks. We unpack how cybercriminals and state-sponsored actors rapidly adapted to law enforcement disruptions, highlighting the critical role of Threat Activity Enablers (TAEs) in providing bulletproof hosting and resilient routing networks. Tune in to understand the complex, multi-tiered ecosystems driving today's most prevalent malware families and what defenders can do to stay ahead of these persistent threats. https://www.recordedfuture.com/research/2025-year-in-review-malicious-infrastructure Sponsors: www.breached.company www.myprivacy.blog

Mar 23, 202614 min

Ep 438Shadows in the North: Unmasking China's Influence in the Nordic-Baltic Region

This episode delves into the complex web of China's influence operations within the Nordic-Baltic information environment, focusing specifically on the contrasting diplomatic landscapes of Denmark and Lithuania. We explore how Beijing utilizes eight distinct avenues of influence—ranging from United Front networks and economic coercion to clandestine espionage—to shape local narratives and pressure political decision-maker. Join us as we uncover how Lithuania took a bold stance with a "values-based" foreign policy, while Denmark grapples with the subtle, backstage coercion of China's "Shadow Wolf Warrior" diplomacy Sponsors: www.breached.company www.cisomarketplace.com www.myprivacy.blog

Mar 22, 202622 min

Ep 436Le CISO de 2026 : Architectes de la confiance numérique

Le rôle du responsable de la sécurité des systèmes d'information (CISO) a fondamentalement évolué, passant d'une fonction informatique à un rôle stratégique de direction axé sur le risque numérique à l'échelle de l'entreprise. Poussés par l'adoption rapide de l'IA agéntique, l'expansion des identités non humaines et de nouvelles réglementations mondiales strictes comme la directive NIS2 de l'UE, les CISO sont désormais essentiels pour garantir la résilience opérationnelle et protéger la continuité des activités. Ce podcast explore comment les leaders modernes de la sécurité comblent le fossé entre la technologie et le conseil d'administration pour combattre les menaces à la vitesse des machines et naviguer dans un paysage réglementaire de plus en plus complexe. English: https://podcast.cisomarketplace.com/e/the-2026-ciso-architects-of-digital-trust/ Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Mar 21, 202626 min

Ep 437Dismantling the FIMI House of Cards: The Fight for Information Integrity

As foreign information manipulation and interference (FIMI) reach unprecedented levels of global complexity, state actors like Russia and China are increasingly weaponizing artificial intelligence to mass-produce deceptive content. In response, the European External Action Service has launched the FIMI Deterrence Playbook, a proactive strategy designed to systematically dismantle the underlying infrastructures, proxies, and financial networks that sustain these hostile operations. Join us as we explore the digital "House of Cards" behind global disinformation campaigns and discuss how democracies are leveraging sanctions, law enforcement, and digital regulation to raise the costs for perpetrators and protect the information space. Sponsors: www.cisomarketplace.com www.myprivacy.blog www.breached.company www.compliancehub.wiki

Mar 21, 202623 min

Ep 435Der CISO von 2026: Architekten des digitalen Vertrauens

Die Rolle des Chief Information Security Officers hat sich grundlegend von einer funktionalen IT-Position zu einer strategischen Führungsposition gewandelt, die sich auf das unternehmensweite digitale Risiko konzentriert. Angetrieben durch die schnelle Einführung von agentischer KI, die Zunahme nicht-menschlicher Identitäten und strenge neue globale Vorschriften wie die NIS2-Richtlinie der EU, sind CISOs heute unerlässlich, um die betriebliche Resilienz zu gewährleisten und die Geschäftskontinuität zu schützen. Dieser Podcast untersucht, wie moderne Sicherheitsführungskräfte die Lücke zwischen Technologie und Vorstandsetage schließen, um Bedrohungen in Maschinengeschwindigkeit zu bekämpfen und durch eine immer komplexer werdende Regulierungslandschaft zu navigieren. English: https://podcast.cisomarketplace.com/e/the-2026-ciso-architects-of-digital-trust/ Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Mar 20, 202625 min

Ep 434The 2026 Threat Matrix: Navigating Global Power, Tech, and Conflict

Dive deep into the U.S. Intelligence Community's 2026 Annual Threat Assessment to uncover the most pressing security challenges facing the world today. This episode explores the shifting dynamics of global power, highlighting how major power competition and emerging technologies like artificial intelligence and quantum computing are redefining international security. Join us as we break down what these evolving threats—from transnational crime and terrorism to regional wars—mean for the U.S. Homeland and future global stability. https://www.dni.gov/index.php/newsroom/press-releases/press-releases-2026/4142-pr-03-26 Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Mar 20, 202621 min

Ep 433El CISO de 2026: Arquitectos de la Confianza Digital

El papel del Director de Seguridad de la Información (CISO) se ha transformado fundamentalmente de una posición funcional de TI a un rol estratégico de nivel ejecutivo centrado en el riesgo digital a nivel empresarial. Impulsados por la rápida adopción de la inteligencia artificial agéntica, la expansión de las identidades no humanas y las nuevas y estrictas regulaciones globales como la Directiva NIS2 de la UE, los CISO son ahora esenciales para garantizar la resiliencia operativa y proteger la continuidad del negocio. Este podcast explora cómo los líderes de seguridad modernos están cerrando la brecha entre la tecnología y la sala de juntas para combatir las amenazas a la velocidad de las máquinas y navegar por un panorama regulatorio cada vez más complejo. English: https://podcast.cisomarketplace.com/e/the-2026-ciso-architects-of-digital-trust/ Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Mar 19, 202630 min

Ep 432The 2026 CISO: Architects of Digital Trust

The role of the Chief Information Security Officer has fundamentally transformed from a functional IT position into a strategic, executive-level role focused on enterprise-wide digital risk. Driven by the rapid adoption of agentic AI, expanding non-human identities, and strict new global regulations like the EU's NIS2 Directive, CISOs are now essential for ensuring operational resilience and protecting business continuity. This podcast explores how modern security leaders are bridging the gap between technology and the boardroom to combat machine-speed threats and navigate an increasingly complex regulatory landscape. Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Mar 17, 202657 min

Ep 431Hellscape for Taiwan: The Future of Asymmetric Defense

This episode examines the Hellscape concept, an evolving asymmetric strategy designed to repel a potential Chinese invasion by flooding the Taiwan Strait with thousands of low-cost uncrewed systems. We analyze the four-layered defensive gauntlet—ranging from over-the-horizon undersea drones to short-range beach-defense quadcopters—intended to deny the People’s Liberation Army both air and sea superiority. Finally, the program explores the implementation hurdles Taiwan faces, such as shifting budget priorities away from expensive conventional platforms and building a self-sufficient domestic drone industry. Sponsors www.myprivacy.blog www.breached.company

Mar 16, 202629 min

Ep 430The Digital Shield: Ukraine’s Evolution in Hybrid Warfare

This episode explores Ukraine’s transformation from a reactive cyber posture to a proactive, multi-layered defense system that culminated in the 2025 creation of a dedicated Cyber Forces Command. We examine the pioneering "patriotic hacktivist" model, where groups like the IT Army and BO Team collaborate with state intelligence to expand the reach and impact of offensive operations. Finally, the discussion covers the vital contributions of private tech giants and international coalitions through the Tallinn Mechanism, alongside the emerging challenges of sustaining this global support as the conflict enters its second decade. Sponsors: www.breached.company www.myprivacy.blog

Mar 14, 202622 min

Ep 429Sky Guardians: The Technology and Privacy of Drone Detection

As drones become increasingly common, the need to protect critical infrastructure, airports, and public events from unauthorized unmanned aerial vehicles has never been greater. This episode dives into the layered Counter-Unmanned Aircraft Systems (C-UAS) that utilize radio frequency, radar, and advanced algorithms to detect, track, and locate both drones and their operators. We also explore the crucial legal and privacy safeguards built into these technologies, explaining how they protect the public by strictly analyzing physical signal characteristics rather than illegally intercepting private communication content. https://secureiot.house/dhs-elevated-threat-home-security-preparedness https://secureiotoffice.world/power-grid-attacks-smart-city-blackouts-iran-iraq https://secureiot.house/iran-drone-threat-california-sleeper-cells-dhs-warning-march-2026 Sponsors: www.myprivacy.blog www.breached.company www.secureiot.house

Mar 13, 202619 min

Ep 428The End of Obscurity: How AI is Breaking Consumer Robot Security

Traditional robot security, which long relied on the assumption that attackers needed specialized robotic expertise, is being rendered obsolete by the democratization of AI-powered offensive tools. Using the open-source CAI framework, researchers autonomously identified 38 critical vulnerabilities—including safety-critical motor controls—across diverse consumer robots in just a fraction of the time required by human experts. This technological shift necessitates an urgent transition from static, rule-based defenses toward GenAI-native defensive agents capable of real-time patching and coordinated threat detection to counter these rapid, automated attacks. Sponsors: www.myprivacy.blog www.breached.company

Mar 12, 202649 min

Ep 427Beyond the Perimeter: Inside the Cloud Threat Landscape

Threat actors are increasingly abandoning traditional malware in favor of exploiting valid credentials and native cloud services to move laterally and execute destructive attacks. This episode explores the latest cloud security trends, including the rise of cloud-native ransomware, the abuse of AI and LLM supply chains, and how attackers leverage third-party integrations to breach multiple tenants. Join us as we unpack the strategies defenders must adopt, such as strict identity and access management (IAM) hardening and behavioral monitoring, to secure modern hybrid cloud environments. Sponsors: www.cisomarketplace.com www.securitycareers.help

Mar 11, 202619 min

Ep 426The AI Copyright Crisis: Fair Use, Piracy, and the Future of Publishing

This episode delves into the high-stakes legal battles between authors and tech giants over training generative AI models, like Meta's Llama and Anthropic's Claude, on millions of copyrighted books. We explore recent federal court rulings to understand how the traditional "fair use" defense is being tested by accusations of unauthorized torrenting and the threat of "market dilution". Tune in to discover whether the courts will protect human creators and their markets, or prioritize technological innovation in the rapidly expanding era of generative AI. https://myprivacy.blog/meta-bittorrent-piracy-fair-use-ai-training Sponsors: www.cisomarketplace.com www.myprivacy.blog

Mar 10, 202636 min

Ep 424The Algorithmic Rubicon: Silicon Valley, the Pentagon, and the Future of War

When AI startup Anthropic refused to let the Pentagon use its Claude model for fully autonomous weapons and mass domestic surveillance, the Department of Defense retaliated by designating the American company an unprecedented "supply chain risk". This standoff highlights a growing crisis as consumer AI systems are rapidly integrated into kinetic military operations and lethal kill chains, accelerating targeting in conflicts like the US-Israeli war on Iran. As the government wields economic warfare and Cold War-era statutes to dismantle corporate ethical guardrails, the tech industry faces a defining battle over who ultimately controls the moral architecture of the world's most powerful technologies. https://cisomarketplace.com/blog/operational-technology-critical-infrastructure-security-2026-strategic-briefing https://breached.company/banned-at-dawn-deployed-by-dusk-the-u-s-used-anthropics-claude-in-the-iran-strikes-hours-after-trump-banned-it Sponsors: www.breached.company www.cisomarketplace.com

Mar 10, 202641 min

Ep 425Gloves Off: Operation Epic Fury and the Trump Administration 2026 Cyber Strategy

In this episode, we dive into the escalating military and cyber conflict between the United States and Iran, highlighted by the devastating U.S. strikes of Operation Epic Fury. We unpack the administration's aggressive new 2026 "Cyber Strategy for America" and recent Executive Orders, which signal a doctrinal shift toward offensive operations, deregulation, and the dismantling of transnational cybercrime networks. Join us as we explore the geopolitical and legal fallout of "unleashing" private tech companies to actively defend against adversaries, and how artificial intelligence is rapidly shaping the future of global security. https://securitycareers.help/president-trumps-cyber-strategy-for-america-2026-six-pillars-reshaping-national-cybersecurity https://compliancehub.wiki/trump-cyber-strategy-2026-compliance-implications https://scamwatchhq.com/white-house-executive-order-cybercrime-scams-2026 Sponsors: www.cisomarketplace.com www.breached.company

Mar 9, 202642 min

Ep 423Critical Resilience: Defending Energy and Water in 2026

As nation-state actors and hacktivist proxies increasingly target operational technology (OT) across the energy and water sectors, the 2026 cybersecurity landscape has reached a critical inflection point. In response to this escalating risk, sweeping new regulatory mandates—such as the NERC CIP Roadmap, permanent TSA pipeline directives, and CIRCIA—are forcing organizations to shift away from traditional perimeter defenses and adopt maturity-based risk management. This episode explores the active threat groups currently pre-positioning within critical networks, breaks down impending compliance deadlines, and outlines how organizations can strategically prioritize their budgets to build true operational resilience. https://secureiotoffice.world/water-infrastructure-cyberattacks-desalination-iran-war https://secureiotoffice.world/power-grid-attacks-smart-city-blackouts-iran-iraq https://cisomarketplace.com/blog/operational-technology-critical-infrastructure-security-2026-strategic-briefing Sponsors: www.cisomarketplace.com www.cisomarketplace.services www.breached.company

Mar 8, 202657 min

Ep 422When the Cloud Burns: Missiles, Rogue AI, and the Fragility of Global Infrastructure

In 2025 and 2026, the illusion of an invincible cloud was shattered by a convergence of unprecedented threats, ranging from Iranian drone strikes physically destroying AWS and Azure data centers in the Gulf to an Amazon AI coding agent autonomously wiping out a production environment. These kinetic and AI-driven disasters, alongside massive configuration failures at Microsoft and Cloudflare, exposed the terrifying reality that our entire digital economy relies on a few hyper-scale providers acting as unacknowledged critical infrastructure. Join us as we unpack why traditional disaster recovery models are officially obsolete and discuss the immediate steps security leaders must take to ensure survival in an era where cloud platforms are active battlegrounds. https://cisomarketplace.com/blog/when-the-cloud-burns-disaster-recovery-backup-and-cloud-redundancy-in-2026 https://cisomarketplace.com/blog/when-the-cloud-burns-part-ii-iran-targets-microsoft-azure-gulf Sponsors: www.cisomarketplace.com www.cisomarketplace.services

Mar 7, 202653 min

Ep 421Beyond the Takedown: Measuring True Impact in the Ransomware War

Law enforcement agencies are increasingly striking back against ransomware syndicates, but highly visible operations do not always translate into long-term success. In this episode, we explore a newly developed framework that systematically evaluates counter-ransomware interventions across four key dimensions: severity, scope, longevity and reversibility, and signalling value. By examining high-profile case studies like the disruptions of LockBit and Hive, we uncover the complex trade-offs involved in tackling cybercrime and discuss how policymakers can design strategies that move past temporary setbacks to inflict lasting damage on the ransomware ecosystem. https://breached.company/operation-leak-fbi-and-global-partners-dismantle-leakbase-one-of-the-worlds-largest-cybercriminal-data-forums Sponsors: www.breached.company www.cisomarketplace.com

Mar 6, 20269 min

Ep 420Echoes of Epic Fury: The Convergence of AI, Cyber, and Kinetic Warfare

In early 2026, Operation Epic Fury shattered the traditional boundaries of conflict by seamlessly synchronizing devastating kinetic airstrikes with an unprecedented four-pronged cyber assault that plunged Iran into a near-total digital blackout. Behind the scenes, military commanders controversially relied on Anthropic's Claude AI for rapid intelligence assessments and target identification, fundamentally altering the speed and cognitive load of modern battle. However, this historic fusion of digital and physical warfare also exposed critical new global vulnerabilities, ranging from the physical destruction of vital cloud data centers to a relentless wave of hacktivist retaliation utilizing commercial satellite networks to bypass the blackout https://breached.company/operation-roaring-lion-the-cyberattack-that-rewrote-the-rules-of-modern-warfare https://breached.company/when-the-cloud-burns-the-aws-uae-data-center-disaster-and-the-dr-bcp-lessons-everyone-keeps-ignoring https://breached.company/the-cyber-war-in-the-shadows-how-the-2026-iran-israel-u-s-conflict-is-reshaping-the-middle-easts-digital-battlefield https://breached.company/banned-at-dawn-deployed-by-dusk-the-u-s-used-anthropics-claude-in-the-iran-strikes-hours-after-trump-banned-it/ Sponsor: www.cisomarketplace.com www.breached.company

Mar 5, 202638 min

Ep 419Growing Up in the Online World: The UK's National Conversation

This episode dives into the UK government's 2026 consultation on how to better protect children and enrich their experiences in a fast-paced digital world. We explore major proposed interventions, including potential bans on social media for under-16s, mandatory daily screentime limits, and new rules restricting addictive design features like infinite scrolling and autoplay. Join us as we unpack the crucial balance between safeguarding kids from emerging online harms—such as emotionally manipulative AI chatbots—while ensuring they build the essential digital skills needed for the future. Sponsors: www.myprivacy.blog www.scamwatchhq.com

Mar 4, 202620 min

Ep 418Shadows in the Screen: Unmasking 'The Com' and the 764 Network

Dive into the dark reality of "The Com" and the notorious "764" network, sophisticated online ecosystems where digital predators use popular games and social media platforms to groom, extort, and radicalize vulnerable youth. We explore Europol's global initiative, Project Compass, alongside unprecedented international law enforcement efforts aimed at dismantling these decentralized and violent groups. Finally, we equip parents with crucial "operational security" strategies and behavioral red flags to help protect their families' digital privacy and recognize the early warning signs of online exploitation. https://myprivacy.blog/the-7m-tiktok-cult-fbi-raids-escalate-investigation-into-alleged-sex-trafficking-and-financial-exploitation https://myprivacy.blog/the-764-network-how-predators-exploit-children-through-gaming-and-social-media https://myprivacy.blog/protecting-your-familys-digital-privacy-from-the-com-what-parents-need-to-know Sponsor: www.myprivacy.blog

Mar 3, 202621 min

Ep 417Industrialized Deception: Navigating the 2025 Payment Fraud Landscape

In this episode, we explore how the global fraud ecosystem has industrialized, equipping cybercriminals with highly scalable tools like Malware-as-a-Service e-skimmer kits and AI-powered purchase scams. We dive into the most pressing emerging threats, including the opaque risks of AI-driven agentic commerce and the rising popularity of one-time password (OTP) interception to enable digital wallet fraud. Finally, we discuss how financial institutions and merchants can fight back by abandoning reactive models in favor of proactive, cross-functional cyber-fraud fusion centers. Sponsors: www.scamwatchhq.com

Mar 2, 202614 min

Ep 415Resilience 2026: AI, Audits, and Air-Gaps

In 2026, organizations are navigating an expanding risk zone where autonomous AI cyberattacks, climate-driven physical disasters, and strict regulatory demands collide. This podcast dives into the core pillars of modern operational resilience, exploring everything from AI-generated incident response playbooks to the evolution of evidence-based attestation standards like SSAE 18 and SOC 2. Join us as we unpack the strategies leaders are using to fight machine-speed threats, implement bulletproof disaster recovery, and guarantee organizational survival in an unpredictable world. www.securitycareers.help/strategic-briefing-the-evolution-of-cybersecurity-compliance-and-ai-integration-2025-2026 https://ssaephysicalsecurity.com Sponsors: www.cisomarketplace.com www.breached.company

Mar 1, 202634 min

Ep 416The 2026 Cyber Insurance Shift: AI, Exclusions, and the Resilience Mandate

In 2026, the cyber insurance landscape has dramatically shifted as AI-driven threats, sophisticated ransomware, and supply chain vulnerabilities force insurers to rewrite the rules of coverage. This episode dives deep into the tightening underwriting requirements—from mandatory phishing-resistant MFA to strict AI and nation-state exclusions—that companies must navigate to stay insured. Join us as we explore how businesses can move beyond basic compliance and build the verifiable digital resilience needed to survive in an era of complex regulatory crackdowns and expanding liabilities. www.securitycareers.help/strategic-risk-and-insurance-landscape-2026-global-briefing Sponsors: www.cisomarketplace.com www.breached.company

Feb 23, 202620 min