mnemonic security podcast cover art

All Episodes

mnemonic security podcast — 160 episodes

#
Title
1

Auditing AI

2

OpenClaw

3

INTERPOL

4

Social Engineering TTPs

5

Initial Access Trends

6

Runtime

7

Cloud Detection and Response

8

Pentesting anno 2026

9

LLMalware

10

Present and Future of MDR

11

Agentic Browsers

12

Dark Web Roast

13

The Quiet Conflict

14

Prompt Engineering

15

State of the Union: Agentic AI

16

Autonomous cyberattacks

17

Pig Butchering

18

The Economy for Phish

19

Agentic

20

Proofing for Quantum

21

Magic Cat (Part 1)

22

Magic Cat (Part 2)

23

Negotiation

24

Personal Leadership

25

LLMs in Security Products

26

Storebrand Success Story (Part 2)

27

Policy as Code (Part 1)

28

Exposure Management

29

AV and IoT

30

FINN.no

31

n-days

32

CTFs

33

Reverse Engineering

34

Risk Hunting

35

CNAPP

36

Deviation Detection

37

Infostealers

38

Prioritisation & Decision Making in Critical Infrastructure Defence

39

KraftCERT Threat Assessment 2024

40

Risk Forecast: Windy

41

Email and Human Centric Security

42

Episode 100*!

43

Follow the Crypto

44

Black Teaming

45

ML Engineers these days

46

Isolate first, Triage second, and the tools to help you do it.

47

Guidance for High-Risk Individuals

48

Models Always Lie

49

Data Brokers and Removal Services

50

The Risk Business

51

Ethical Social Engineering

52

A student/mentor’s perspective on AI

53

When Ransomware Hits the Ranch

54

Conflictual coexistence

55

From Russia with Ransomware

56

Metaverses

57

Defending Cyber Space (EVE Online)

58

Digging into State Directed Cyber

59

Cryptology

60

Physical Penetration Testing / Red Teaming

61

Securing AI Models

62

Supply Chain Attacks

63

Experience Sharing - Bug Bounty Programs

64

Influencing the board

65

KraftCERT

66

Managing stress in cybersecurity (ISACA series)

67

Asset Intelligence

68

Unit 42

69

Crypto Finance

70

Office IoT

71

Passwords and their managers

72

Darkwebs

73

Security Engineering - IAM

74

Bots

75

We are Defending (ISACA series)

76

House of Pain (ISACA series)

77

Insider threats to ransomware groups

78

Network detection and response (NDR): the value of evidence

79

ICS in the Cloud

80

Enterprise Security Architecture

81

Azure / Office365: monitoring & hardening

82

Keeping the lights on

83

Smartphones

84

More Drones

85

Drones

86

Application Programming Interfaces

87

Industrial Security Conference

88

LinkedIn

89

Nordic Choice

90

TIBER

91

Security Leadership Essentials for Managers

92

Zero Trust vs. Castle and Moat

93

Security of Things

94

The ransomware dilemma

95

Encrypted traffic management

96

Conti leaks - The inside of the dark side

97

The Science of SOAR

98

Control Validation & Cyber Insurance

99

Special Edition: SOCCRATES

100

Space Norway

101

Deception technology

102

Collecting and sharing threat intelligence

103

Innsiderisiko

104

Does your managed SOC suck?

105

Project 2030

106

CMMC

107

Mergers & Acquisitions

108

Initial Access Brokers

109

Communicating threat intelligence to management

110

Buying security products

111

The state of cyber insurance in 2021

112

Can threat intelligence be automated?

113

Is honesty the best policy in incident response?

114

Threat hunting

115

Chat with a CFO

116

Stress and security

117

Internet of Things

118

Honeypots

119

The World of Open Source

120

The future of privacy | Privacy miniseries

121

Business Email Compromise

122

Cyber espionage | Privacy miniseries

123

Your phone is spying on you | Privacy miniseries

124

DNS security with Quad9

125

Nuclear Cyber Security | OT miniseries

126

IT Security Is From Mars, Software Security Is From Venus

127

Technology isn't the problem | OT miniseries

128

SIEM is DEAD?

129

Security Assurance

130

When security hits the fan

131

Financial Cyber Crime

132

Feature velocity > software security?

133

Forensic Readiness | OT miniseries

134

Misconceptions of Threat Intelligence

135

OODA Loops with Open Source

136

Security Validation

137

A shared responsibility

138

Data science and security visibility

139

KPIs vs. Empowerment

140

A chat with KraftCERT | OT miniseries

141

Why should we care about PAM?

142

You can't protect what you don't know you have | OT miniseries

143

Turning users from targets to defenders

144

OT's role in a CISO's world | OT miniseries

145

Microservices, in theory and practice

146

To SOAR, or not to SOAR? (Part 2)

147

To SOAR, or not to SOAR? (Part 1)

148

Securing healthcare data while studying COVID-19

149

IAM these days

150

Bug Bounties and Unicorns

151

Hack my (hard-coded) heart

152

Super CISO! With 300 brands to secure

153

Securing our financial future

154

Out of Control

155

Cyber Insurance for Y2K

156

Pentesting these days - Crowdsourcing

157

Special Edition: Under the hood of Argus

158

Cloud security with an Angel

159

Boss of the SOC

160

Sharing is caring - Threat Intelligence with ACT