All Episodes
Ahead of the Breach — 51 episodes
Gary Lobermier on Scaling Red Team Automation with AI to Run Hundreds of Real Attacks Daily
Zoom's Andy Grant on Offensive Intuition and Letting Hackers Hunt
Accenture's Daniel Barnes on SAML exploitation and what really matters in pentesting
T. Rowe Price's Matthew Winters on Threat Hunting, Graph Thinking, and Making Adversaries Cry
Citi's Ryan Hays Navigating Risk and Resilience at Scale
Microsoft's Tori Westerhoff on Offensive Security in the Age of AI
Nevada Air National Guard's Nikita Belikov on Real-World Cyber Defense at Scale
MacArthur Foundation's Seth Arnoff on Top AI and Quantum Threats
F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime
What Makes Hybrid Pentesting So Powerful?
GreyNoise’s Andrew Morris on Internet Background Noise as Data
How Does Expert-Driven Offensive Security Provide Comprehensive Risk Insight?
Sprinklr’s Roger Allen on Why Vendor Telemetry Only Gets You 90% There
Why is Continuous Pentesting a Must for Dynamic Environments?
Armis’ Andrew Grealy on Left-of-Boom Threat Actor Intelligence
How Do You Build an Offensive Security Program from Scratch?
Covert Entry: Tools, Tricks, and True Stories from the Field
What Should You Ask Before Choosing an Offensive Security Platform?
Phillip Wylie on How IoT Devices Become Corporate Network Entry Points
What Tools Do You Need for an Offensive Security Stack?
AccessIT Group’s Brett Price on Governance-Driven Cybersecurity
What Steps Should You Take to Build a Modern Pentesting Program?
Parthasarathi Chakraborty on Building Architectural Assurance Functions
What Are the Common Myths About Continuous Pentesting?
Rocket Lawyer’s Tim Silverline on Why Clean Pentest Reports Can Be Red Flags
How Do You Prepare for the Future of Pentesting?
Digital Turbine’s Vivek Menon on Quarterly Pentesting Frameworks
What’s Broken About Legacy Pentesting?
WhoisXML’s Alex Ronquillo on Domain Age as a Security Signal
Why Continuous Pentesting Outperforms Bug Bounties
Sentry’s Cody Florek on AppSec Programs That Create Partnerships Not Problems
Block Harbor’s Ayyappan Rajesh on Advanced RF Exploitation Techniques for Automotive Systems
OX Security’s Eyal Paz on Vulnerability Triage That Actually Works in Production
Spektrum Labs’ Joshua Brown on Why Control is an Illusion in Modern Security
Fraunhofer Institute’s Donika Mirdita on Novel Attack Methods Against Internet Routing Security
NerdWallet’s DK Koran on Building Proactive Security Through Red Teams
Rapyd’s Nir Rothenberg on Why Security Needs Constant Testing, Not Annual Checkups
Eptura’s Sean Finley on Building Risk-Based Application Security Programs
Microsoft’s Vladimir Tokarev on Discovering Critical OpenVPN Vulnerabilities
N-able’s Keiran Smith on Building Better Security Through Development Experience
RSA’s Lorenzo Pedroncelli on Identity Security as the New Cyber Perimeter
DigiCert’s Bindi Davé on Digital Trust in Cybersecurity
Collectors’ Arif Basha on Proactive Security and Attack Surface Management
Ryerson’s Joe Mariscal on Building a Resilient Cybersecurity Culture
Cubic’s Konrad Fellmann on Proactive Strategies for Identifying Cybersecurity Vulnerabilities
MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing
Gong’s Jack Leidecker on Balancing Innovation and Security
Allegiant’s Dan Creed on Navigating the Risks of Deepfakes in Corporate Security
Odyssey Group’s Mario DiNatale on Understanding Your Cybersecurity Attack Surface
Sprocket’s Pen Test Team on Bypassing Web Application Security
Security Engineering Expert & Leader Mike Takahashi on Creativity in Red Teaming