All Episodes
mnemonic security podcast — 160 episodes
Auditing AI
OpenClaw
INTERPOL
Social Engineering TTPs
Initial Access Trends
Runtime
Cloud Detection and Response
Pentesting anno 2026
LLMalware
Present and Future of MDR
Agentic Browsers
Dark Web Roast
The Quiet Conflict
Prompt Engineering
State of the Union: Agentic AI
Autonomous cyberattacks
Pig Butchering
The Economy for Phish
Agentic
Proofing for Quantum
Magic Cat (Part 1)
Magic Cat (Part 2)
Negotiation
Personal Leadership
LLMs in Security Products
Storebrand Success Story (Part 2)
Policy as Code (Part 1)
Exposure Management
AV and IoT
FINN.no
n-days
CTFs
Reverse Engineering
Risk Hunting
CNAPP
Deviation Detection
Infostealers
Prioritisation & Decision Making in Critical Infrastructure Defence
KraftCERT Threat Assessment 2024
Risk Forecast: Windy
Email and Human Centric Security
Episode 100*!
Follow the Crypto
Black Teaming
ML Engineers these days
Isolate first, Triage second, and the tools to help you do it.
Guidance for High-Risk Individuals
Models Always Lie
Data Brokers and Removal Services
The Risk Business
Ethical Social Engineering
A student/mentor’s perspective on AI
When Ransomware Hits the Ranch
Conflictual coexistence
From Russia with Ransomware
Metaverses
Defending Cyber Space (EVE Online)
Digging into State Directed Cyber
Cryptology
Physical Penetration Testing / Red Teaming
Securing AI Models
Supply Chain Attacks
Experience Sharing - Bug Bounty Programs
Influencing the board
KraftCERT
Managing stress in cybersecurity (ISACA series)
Asset Intelligence
Unit 42
Crypto Finance
Office IoT
Passwords and their managers
Darkwebs
Security Engineering - IAM
Bots
We are Defending (ISACA series)
House of Pain (ISACA series)
Insider threats to ransomware groups
Network detection and response (NDR): the value of evidence
ICS in the Cloud
Enterprise Security Architecture
Azure / Office365: monitoring & hardening
Keeping the lights on
Smartphones
More Drones
Drones
Application Programming Interfaces
Industrial Security Conference
Nordic Choice
TIBER
Security Leadership Essentials for Managers
Zero Trust vs. Castle and Moat
Security of Things
The ransomware dilemma
Encrypted traffic management
Conti leaks - The inside of the dark side
The Science of SOAR
Control Validation & Cyber Insurance
Special Edition: SOCCRATES
Space Norway
Deception technology
Collecting and sharing threat intelligence
Innsiderisiko
Does your managed SOC suck?
Project 2030
CMMC
Mergers & Acquisitions
Initial Access Brokers
Communicating threat intelligence to management
Buying security products
The state of cyber insurance in 2021
Can threat intelligence be automated?
Is honesty the best policy in incident response?
Threat hunting
Chat with a CFO
Stress and security
Internet of Things
Honeypots
The World of Open Source
The future of privacy | Privacy miniseries
Business Email Compromise
Cyber espionage | Privacy miniseries
Your phone is spying on you | Privacy miniseries
DNS security with Quad9
Nuclear Cyber Security | OT miniseries
IT Security Is From Mars, Software Security Is From Venus
Technology isn't the problem | OT miniseries
SIEM is DEAD?
Security Assurance
When security hits the fan
Financial Cyber Crime
Feature velocity > software security?
Forensic Readiness | OT miniseries
Misconceptions of Threat Intelligence
OODA Loops with Open Source
Security Validation
A shared responsibility
Data science and security visibility
KPIs vs. Empowerment
A chat with KraftCERT | OT miniseries
Why should we care about PAM?
You can't protect what you don't know you have | OT miniseries
Turning users from targets to defenders
OT's role in a CISO's world | OT miniseries
Microservices, in theory and practice
To SOAR, or not to SOAR? (Part 2)
To SOAR, or not to SOAR? (Part 1)
Securing healthcare data while studying COVID-19
IAM these days
Bug Bounties and Unicorns
Hack my (hard-coded) heart
Super CISO! With 300 brands to secure
Securing our financial future
Out of Control
Cyber Insurance for Y2K
Pentesting these days - Crowdsourcing
Special Edition: Under the hood of Argus
Cloud security with an Angel
Boss of the SOC
Sharing is caring - Threat Intelligence with ACT