<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://media.rss.com/style.xsl"?>
<rss xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom" xml:lang="en" version="2.0">
  <channel>
    <title><![CDATA[Modern Cyber with Jeremy Snyder]]></title>
    <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder</link>
    <atom:link href="https://media.rss.com/modern-cyber-with-jeremy-snyder/feed.xml" rel="self" type="application/rss+xml"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <description><![CDATA[<p>Welcome to Modern Cyber with Jeremy Snyder, a cutting-edge podcast series where cybersecurity thought leaders come together to explore the evolving landscape of digital security. In each episode, Jeremy engages with top cybersecurity professionals, uncovering the latest trends, innovations, and challenges shaping the industry.</p><p></p><p>Also the home of 'This Week in AI Security', a snappy weekly round up of interesting stories from across the AI threat landscape.</p>]]></description>
    <generator>RSS.com 2026.401.141116</generator>
    <lastBuildDate>Thu, 09 Apr 2026 11:47:36 GMT</lastBuildDate>
    <language>en</language>
    <copyright><![CDATA[FireTail, Inc. 2024]]></copyright>
    <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/20240417_050404_d31355811d21aa9461b6772512f7f041.png"/>
    <podcast:guid>6cfc205c-0ed4-5f6b-87a2-7159b5a4a713</podcast:guid>
    <image>
      <url>https://media.rss.com/modern-cyber-with-jeremy-snyder/20240417_050404_d31355811d21aa9461b6772512f7f041.png</url>
      <title>Modern Cyber with Jeremy Snyder</title>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder</link>
    </image>
    <podcast:locked>yes</podcast:locked>
    <podcast:license>FireTail, Inc. 2024</podcast:license>
    <itunes:author>Jeremy Snyder</itunes:author>
    <itunes:owner>
      <itunes:name>Jeremy Snyder</itunes:name>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <podcast:medium>podcast</podcast:medium>
    <item>
      <title><![CDATA[This Week in AI Security - 9th April 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 9th April 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode for April 9, 2026, Jeremy covers a week dominated by highly sophisticated supply chain attacks and the emergence of "Project Glasswing", an internal Anthropic project revealing that next-gen AI models may be "too good" at finding zero-day vulnerabilities.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>The FBI's IC3 Report:</strong> For the first time in 25 years, the FBI has specifically categorized AI-enabled fraud, which accounted for <strong>$893 million</strong> in losses across BEC, romance, and investment scams.</li><li><strong>Ollama Exposure Spikes:</strong> A Shodan scan reveals that publicly exposed Ollama instances have jumped from 1,100 in September 2025 to over <strong>25,000</strong> in April 2026.</li><li><strong>Critical Infrastructure CVEs:</strong> Both <strong>MLflow</strong> and <strong>PraisonAI</strong> received maximum CVSS scores of 10.0 for flaws allowing unauthenticated code execution and command injection.</li><li><strong>The Axios Supply Chain Heist:</strong> In a sophisticated "long con," threat actors (Team PCP) spent weeks building rapport with the <strong>Axios</strong> project maintainer via a fake Slack workspace. They eventually lured the maintainer into downloading malware, allowing them to inject a Remote Access Trojan (RAT) into a package installed <strong>600,000 times</strong>.</li><li><strong>Project Glasswing (Claude Mythos):</strong> Leaked documents from Anthropic describe <strong>Claude Mythos</strong>, a model family with terrifying cybersecurity capabilities. Mythos discovered a <strong>27-year-old bug</strong> predating GitHub; currently, <strong>99% of the zero-days</strong> it has identified remain unpatched, leading to internal concerns about a controlled rollout.</li><li><strong>Vertex AI Permission Flaw:</strong> Unit 42 discovered a flaw in Google Cloud’s Vertex AI that could allow AI agents to bypass security boundaries and access sensitive data.</li></ul><p><strong>Episode Links</strong></p><p>https://securityboulevard.com/2026/04/cyber-fraud-cost-americans-17-billion-in-2025-ai-scams-make-list-fbi/</p><p>https://insecurestack.substack.com/p/eus-exposed-ai-infrastructure</p><p>https://securityonline.info/weekly-vulnerability-digest-april-2026-chrome-zero-day-ai-security/</p><p>https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html</p><p>https://fortune.com/2026/04/02/mercor-ai-startup-security-incident-10-billion/</p><p>https://www.sans.org/blog/what-we-learned-axios-npm-supply-chain-compromise-emergency-briefing</p><p>https://techcrunch.com/2026/04/06/north-koreas-hijack-of-one-of-the-webs-most-used-open-source-projects-was-likely-weeks-in-the-making/</p><p>https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html</p><p>https://www.securityweek.com/anthropic-unveils-claude-mythos-a-cybersecurity-breakthrough-that-could-also-supercharge-attacks/</p><p>https://www.staffingindustry.com/news/global-daily-news/mercor-reports-data-breach</p><p>https://red.anthropic.com/2026/mythos-preview/</p><p></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2714167</link>
      <enclosure url="https://content.rss.com/episodes/266257/2714167/modern-cyber-with-jeremy-snyder/2026_04_09_11_43_57_28246e0a-9f70-4a24-bb2c-22a76b9c893c.mp3" length="11206677" type="audio/mpeg"/>
      <guid isPermaLink="false">a6aea45d-bb35-4816-bc1b-279249bdeed6</guid>
      <itunes:duration>700</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Apr 2026 11:47:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260409_110440_c6709c0329d5f466eaefd982c3ff3595.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 2nd April 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 2nd April 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode of <strong>This Week in AI Security</strong> for April 2, 2026, Jeremy discusses a "perfect storm" for offensive cyber operations. As AI begins to discover vulnerabilities in legacy software faster than humans can patch them, regulators are sounding the alarm on the "intolerable risks" of AI-generated code.</p><p></p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>The AI-Generated Vulnerability Surge:</strong> Georgia Tech’s Vibe Security Radar tracked 35 CVEs in March 2026 alone that were directly attributable to AI-generated code, a sharp increase from just 6 in January.</li><li><strong>NCSC Warning:</strong> Richard Horne, head of the UK’s National Cyber Security Centre, warned at RSAC that "vibe coding" currently presents "intolerable risks" for most organizations as software volume is on track to double every 42 months.</li><li><strong>Langflow RCE Exploited:</strong> CISA has added a critical unauthenticated remote code execution (RCE) flaw in Langflow to its Known Exploited Vulnerabilities catalog.</li><li><strong>"MAD" Bugs in Legacy Tools:</strong> The "Month of AI Discovered Bugs" initiative utilized LLMs to find critical zero-day RCE vulnerabilities in decades-old tools like <strong>Vim</strong> and <strong>GNU Emacs</strong>.</li><li><strong>The Claude Mythos Leak:</strong> Anthropic confirmed a major leak of unpublished assets related to its next-generation model, <strong>Claude Mythos</strong>, following a content management system misconfiguration.</li><li><strong>Offensive AI Multiplier:</strong> Hacker crew Team PCP claimed in <em>Forbes</em> that they are using AI-powered automated agents to turbocharge attacks on developer tools and repository infrastructures.</li></ul><p></p><p><strong>Episode Links</strong></p><p>https://www.forbes.com/sites/ronschmelzer/2026/03/27/major-security-breach-of-critical-ai-dependency-exposes-cloud-secrets/</p><p>https://threatprotect.qualys.com/2026/03/26/cisa-added-langflow-vulnerability-to-its-known-exploited-vulnerabilities-catalog-cve-2026-33017/</p><p>https://siliconangle.com/2026/03/30/openai-codex-vulnerability-enabled-github-token-theft-via-command-injection-report-finds/</p><p>https://www.infosecurity-magazine.com/news/ai-generated-code-vulnerabilities/</p><p>https://www.itpro.com/security/ncsc-warns-vibe-coding-poses-a-major-risk</p><p>https://www.forbes.com/sites/thomasbrewster/2026/03/26/hackers-launch-devastating-attacks-on-ai-devs/</p><p>https://markaicode.com/prompt-injection-attacks-ai-security-2026/</p><p>https://cyberscoop.com/ai-cyberattacks-two-years-insane-vulnerabilities-kevin-mandia-alex-stamos-morgan-adamski-rsac-2026/</p><p>https://fortune.com/2026/03/26/anthropic-says-testing-mythos-powerful-new-ai-model-after-data-leak-reveals-its-existence-step-change-in-capabilities/</p><p>https://cyberwebspider.com/cyber-security-news/ai-critical-rce-flaws-vim-emacs/</p><p></p><p><strong>Worried about AI security?</strong></p><p>Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo"><strong>https://www.firetail.ai/request-a-demo</strong></a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2682753</link>
      <enclosure url="https://content.rss.com/episodes/266257/2682753/modern-cyber-with-jeremy-snyder/2026_04_02_11_35_08_ca31d701-cad0-44ff-947b-aa5a0324943b.mp3" length="12155859" type="audio/mpeg"/>
      <guid isPermaLink="false">a1b4d485-8ccb-4747-a48c-15512aa3c42f</guid>
      <itunes:duration>759</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 02 Apr 2026 11:43:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260402_110453_3a40505951305237e4f2ff1459ca320b.png"/>
    </item>
    <item>
      <title><![CDATA[Joseph Carson of Segura]]></title>
      <itunes:title><![CDATA[Joseph Carson of Segura]]></itunes:title>
      <description><![CDATA[<p>In this annual recap from the sidelines of RSAC 2026, Jeremy is joined by <strong>Joseph Carson</strong>, Chief Security Evangelist at Segura. They discuss a conference floor that felt more like an AI event than a cybersecurity one, exploring the convergence of agentic AI and identity security. Joseph shares critical insights from the Estonia "Digital Nation" playbook, the growing risk of non-human identities, and why organizations must move from "hope as a strategy" to a proactive resiliency model that assumes physical and digital disruption.</p><p><strong>Key Episode Highlights:</strong></p><ul><li><strong>The AI Convergence:</strong> Joseph and Jeremy observe that AI has become the "fuel to the fire" for cybersecurity. While AI helps defenders move at the pace of attackers, it requires rigorous guardrails like least privilege and security by design to be successful.</li><li><strong>Identity of the Machine:</strong> A major theme of the conference was non-human identities. Joseph argues that AI agents should never use human credentials but should instead rely on ephemeral, just-in-time (JIT) keys to maintain accountability and limit the blast radius.</li><li><strong>Estonia’s Resiliency Playbook:</strong> Joseph details how Estonia transitioned from a target of cyber war to a resilient digital nation. He highlights the use of "Data Embassies"—storing sovereign data in geographically distributed, diplomatically protected locations—to ensure the country can "reboot" even after a total local failure.</li><li><strong>Beyond Cybersecurity to Physical Impacts:</strong> The discussion shifts to how attackers are reverting to "cheap" physical disruptions like GPS jamming and cutting undersea data cables when digital defenses become too strong.</li><li><strong>The "Luck" Trap:</strong> Referencing the famous Maersk ransomware recovery, Joseph warns that finding a single surviving backup by chance is not a strategy. Organizations must simulate worst-case scenarios, including the loss of their identity provider (IdP) or primary cloud vendor.</li></ul><p><strong>About Joseph</strong></p><p>Joseph Carson is Chief Security Evangelist and Advisory CISO at Segura, where he helps organizations worldwide strengthen identity security and build resilient cyber defense strategies. An award-winning cybersecurity leader with more than three decades of experience, Joe has advised governments, critical infrastructure, and global enterprises. He is the author of <em>Cybersecurity for Dummies</em>, read by over 50,000 professionals, and a regular contributor to leading outlets including <em>The Wall Street Journal</em> and <em>Dark Reading</em>. Joe also hosts the podcast <em>Security by Default</em> and is a frequent keynote speaker on identity and AI-driven threats.</p><p><strong>Episode Links</strong></p><ul><li><strong>Security by Default Podcast:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://open.spotify.com/show/0mzN5M5CkFVLn8fq5TnH0O">https://open.spotify.com/show/0mzN5M5CkFVLn8fq5TnH0O</a></li><li><strong>Joseph on LinkedIn:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/josephcarson/">https://www.linkedin.com/in/josephcarson/</a></li><li><strong>Segura Website:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://segura.security/">https://segura.security/</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2678052</link>
      <enclosure url="https://content.rss.com/episodes/266257/2678052/modern-cyber-with-jeremy-snyder/2026_03_31_16_51_17_481e5a3d-fdd4-48e5-beb0-47f85a65b192.mp3" length="33631029" type="audio/mpeg"/>
      <guid isPermaLink="false">f06bbc9e-03e1-44e3-a9b7-2036f3914ba5</guid>
      <itunes:duration>2101</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Apr 2026 11:47:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260331_040344_8c3f95d8a012040188f51cb7645a0cc2.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 26th March 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 26th March 2026]]></itunes:title>
      <description><![CDATA[<p>In the latest episode of <strong>This Week in AI Security</strong>, Jeremy reports live from the sidelines of RSA in San Francisco. The week is defined by "gullible" AI agents, legal precedents for chatbot liability, and a massive supply chain attack targeting the tools developers use to build AI applications.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>The "Minion" Problem:</strong> Zenity researchers demonstrated zero-click exploits against Cursor, Salesforce Einstein, ChatGPT, and Copilot, arguing that prompt injection should be reframed as "persuasion" vectors that turn agents into malicious minions.</li><li><strong>The $10M Discount Fabrication:</strong> A red teaming analysis of over 50 customer-facing AI agents found that "persuading" chatbots could lead to the fabrication of $10 million in unauthorized service discounts and commitments.</li><li><strong>Legal Precedent, Air Canada Liable:</strong> The British Columbia Civil Resolution Tribunal ruled that Air Canada is legally liable for the incorrect advice given by its chatbot, setting a major precedent for corporate AI accountability.</li><li><strong>Meta’s Internal "Sev 1" Fail:</strong> A Meta engineer’s internal AI agent autonomously posted incorrect advice on a forum without human approval, leading to a massive inadvertent exposure of company data.</li><li><strong>LLM Fingerprinting:</strong> New academic research shows that attackers can now fingerprint which specific LLM is in use by observing traffic patterns, allowing them to target the specific vulnerabilities (like the "Grandma" exploit) unique to that model.</li><li><strong>The LiteLLM Supply Chain Attack:</strong> In the biggest story of the week, a threat actor group called Team TCP compromised <strong>Trivy</strong> and used it to harvest credentials to poison <strong>LiteLLM</strong> on PyPI. Malicious versions (downloaded millions of times daily) were live for three hours, delivering a Kubernetes worm and credential harvester.</li></ul><p></p><p><strong>Episode Links</strong></p><ul><li>https://www.theregister.com/2026/03/23/pwning_everyones_ai_agents/</li><li>https://cybercory.com/2026/03/19/claudy-day-exposes-hidden-risks-prompt-injection-flaw-in-claude-ai-enables-silent-data-exfiltration/</li><li>https://www.generalanalysis.com/blog/adversarial_analysis_customer_service_agents</li><li>https://www.cve.org/CVERecord?id=CVE-2026-33068</li><li>https://medium.com/@cbchhaya/making-prompt-injection-harder-against-ai-coding-agents-f4719c083a5c</li><li>https://aiautomationglobal.com/blog/ransomware-ai-agents-enterprise-cybersecurity-2026</li><li>https://techcrunch.com/2026/03/18/meta-is-having-trouble-with-rogue-ai-agents/</li><li>https://arxiv.org/html/2510.07176v1</li><li>https://www.bbc.com/travel/article/20240222-air-canada-chatbot-misinformation-what-travellers-should-know</li><li>https://securityboulevard.com/2026/03/colorado-moves-to-revise-its-landmark-ai-law-after-industry-pushback/</li><li>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2664278</link>
      <enclosure url="https://content.rss.com/episodes/266257/2664278/modern-cyber-with-jeremy-snyder/2026_03_26_17_45_31_70cf9546-f133-49ff-b153-4521c74f6989.mp3" length="14098951" type="audio/mpeg"/>
      <guid isPermaLink="false">f10fa9d2-f55e-438f-beaa-60371e012fc2</guid>
      <itunes:duration>881</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Mar 2026 18:02:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260326_050314_2f267b81db185d13591333386791a5b4.png"/>
    </item>
    <item>
      <title><![CDATA[Ann Dunkin of Georgia Tech]]></title>
      <itunes:title><![CDATA[Ann Dunkin of Georgia Tech]]></itunes:title>
      <description><![CDATA[<p>In this episode of <em>Modern Cyber</em>, Jeremy sits down with <strong>Ann Dunkin</strong>, former CIO of the U.S. Department of Energy, to discuss the critical infrastructure that powers our digital lives. As data centers and AI drive unprecedented demand on the energy grid,</p><p>Ann explains why "aging infrastructure" isn't always the biggest cyber risk, how the U.S. grid is actually structured (including the isolation of Texas), and why security leaders must move from "check-the-box" compliance to active risk management.</p><p><strong>Key Episode Highlights:</strong></p><ul><li><strong>The AI Power Surge:</strong> For decades, grid demand was flat; now, AI and data centers are driving a massive growth in load that the aging infrastructure was never designed to handle.</li><li><strong>The "Air Gap" Myth:</strong> While older nuclear plants are safely analog, modern grid vulnerabilities live in the "two-way" traffic of IoT devices and smart meters that were never meant to be internet-connected.</li><li><strong>Nation-State Threats:</strong> The primary concern for grid security is a nation-state actor gaining a foothold to cause long-term, physically destructive disruptions as a prelude to kinetic war.</li><li><strong>Compliance vs. Risk:</strong> Ann shares her experience in the Biden-Harris administration, emphasizing that "table stakes" compliance isn't enough—leaders must use risk registers and tabletop exercises to educate boards on true threats.</li></ul><p><strong>About Ann</strong></p><p>Ann Dunkin is an External Fellow and Distinguished Professor of the Practice at the Georgia Institute of Technology. She is also the CEO of Dunkin Global Advisors, providing strategic business advice to companies of all sizes as well as fractional CIO services. She serves as an independent director on the governing board of Global Interconnection group and the advisory boards for Bowtie Security, Openpolicy and CGAI.</p><p><strong>Episode Links</strong></p><ul><li><strong>Ann Dunkin at Georgia Tech:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://research.gatech.edu/people/ann-dunkin">https://research.gatech.edu/people/ann-dunkin</a></li><li><strong>Ann Dunkin on LinkedIn:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/anndunkin/">https://www.linkedin.com/in/anndunkin/</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2655895</link>
      <enclosure url="https://content.rss.com/episodes/266257/2655895/modern-cyber-with-jeremy-snyder/2026_03_24_10_36_18_b5ae5b6b-4475-47ec-8b49-677bfc234518.mp3" length="35891369" type="audio/mpeg"/>
      <guid isPermaLink="false">293d09e1-52ec-456c-b672-5b80cb243642</guid>
      <itunes:duration>2243</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 24 Mar 2026 15:35:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260324_100351_4ceb0ac162f6012798b60e987e71a5b1.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 19th March 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 19th March 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode for March 19, 2026, Jeremy breaks down a massive week where the line between "helpful AI" and "insider risk" continues to blur. From 87% vulnerability rates in AI-generated code to the rise of "Prompt-ware," the episode covers the accelerating operationalization of AI by both developers and nation-state adversaries.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>The 87% Failure Rate:</strong> Research from Dry Run Security reveals that AI agents (Claude Code, Codex, Gemini) introduce at least one security vulnerability in <strong>87% of pull requests</strong>. Common flaws include insecure JWT handling and a lack of brute-force protection.</li><li><strong>The Sears Chatbot Leak:</strong> Infrastructure failures led to the exposure of <strong>3.7 million chat logs</strong> and <strong>1.4 million audio files</strong> from Sears’ AI assistant, Samantha.</li><li><strong>"Prompt-ware" &amp; The Kill Chain:</strong> Security legend Bruce Schneier proposes a 7-step kill chain for "Prompt-ware," reinforcing the shift toward treating prompts as executable code.</li><li><strong>AI-Generated Malware:</strong> IBM X-Force identified a PowerShell backdoor dubbed <strong>"Sloppily,"</strong> which bears the distinct fingerprints of an LLM—including structured logging and named variables rarely seen in human-written malware.</li><li><strong>The xAI Exodus:</strong> Structural flaws and talent instability hit Elon Musk’s xAI as several founding members depart, signaling potential architectural hurdles for the platform.</li><li><strong>America’s Endangered AI:</strong> A deep dive into how weak cyber defenses allow foreign adversaries to steal model weights and training data, threatening U.S. tech dominance.</li></ul><p><strong>Episode Links</strong></p><p>https://blog.rankiteo.com/mic1773325442-microsoft-vulnerability-march-2026/</p><p>https://mashable.com/article/sears-ai-chatbot-chats-audio-found-exposed-online</p><p>https://aws.amazon.com/security/security-bulletins/rss/2026-009-aws/</p><p>https://aws.amazon.com/security/security-bulletins/rss/2026-008-aws/</p><p>https://aws.amazon.com/security/security-bulletins/rss/2026-007-aws/</p><p>https://www.helpnetsecurity.com/2026/03/13/claude-code-openai-codex-google-gemini-ai-coding-agent-security/</p><p>https://www.schneier.com/blog/archives/2026/02/the-promptware-kill-chain.html</p><p>https://www.bleepingcomputer.com/news/security/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/</p><p>https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/</p><p>https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/</p><p>https://www.theguardian.com/technology/ng-interactive/2026/mar/12/lab-test-mounting-concern-over-rogue-ai-agents-artificial-intelligence</p><p>https://thehackernews.com/2026/03/microsoft-patches-84-flaws-in-march.html</p><p>https://www.cnbc.com/2026/03/13/elon-musk-xai-co-founders-spacex-ipo.html</p><p>https://www.foreignaffairs.com/united-states/americas-endangered-ai</p><p></p><p><strong>Worried about AI security?</strong></p><p>Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2641287</link>
      <enclosure url="https://content.rss.com/episodes/266257/2641287/modern-cyber-with-jeremy-snyder/2026_03_19_09_57_10_9b5f29c3-4f8a-4c12-a2ef-ed43debeef0d.mp3" length="13745775" type="audio/mpeg"/>
      <guid isPermaLink="false">f2a89ca4-322b-4988-8662-eaa2477d23e4</guid>
      <itunes:duration>859</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Mar 2026 10:21:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260319_090350_db68ea061d892484ae04ee19232c146c.png"/>
    </item>
    <item>
      <title><![CDATA[Robert Siciliano of Safr.me]]></title>
      <itunes:title><![CDATA[Robert Siciliano of Safr.me]]></itunes:title>
      <description><![CDATA[<p>In this episode of <em>Modern Cyber</em>, Jeremy is joined by "good guy hacker" and private investigator <strong>Robert Siciliano</strong> to discuss a radical reframing of cybersecurity. Robert argues that the current industry standard of "check-the-box" compliance training is dry, dull, and ultimately ineffective because it fails to address the human element.</p><p><strong>Key Episode Highlights:</strong></p><ul><li><strong>The "Human Blind Spot":</strong> Robert explains how our biological instinct to trust the familiar often overrides digital suspicion, leaving us wide open to scams.</li><li><strong>All Security is Personal:</strong> To get employees to care about corporate security, you must first help them secure their own data, dollars, and families.</li><li><strong>The Persistence of Denial:</strong> Most people don't engage in risk management because they don't want to acknowledge the reality of predators or live in "fear"—a mindset that results in dangerous security gaps.</li><li><strong>The AI-Powered "Loneliness" Scam:</strong> Deepfakes and voice cloning are making fraud "perfect," allowing organized crime to exploit human loneliness at an industrial scale.</li></ul><p><strong>About Robert</strong></p><p>Cybersecurity expert, good guy hacker, and private investigator Robert Siciliano delivers “straight talk” on safety and security, stripping away jargon to empower everyday protection. A bestselling author and CEO of <a target="_blank" rel="noopener noreferrer nofollow" href="http://Safr.Me">Safr.Me</a>, and head trainer at <a target="_blank" rel="noopener noreferrer nofollow" href="http://Protectnowllc.com">Protectnowllc.com</a> he is a trusted commentator featured on CNN, Fox News, MSNBC, and the Today Show, decoding complex threats for mass audiences.</p><p><strong>Episode Links 🔗</strong></p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="http://Safr.me"><strong>Safr.me</strong></a><strong>:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://safr.me/">https://safr.me/</a></li><li><strong>Protect Now LLC:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://protectnowllc.com/">https://protectnowllc.com/</a></li><li><strong>Robert Siciliano on LinkedIn:</strong> <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/robertsiciliano/">https://www.linkedin.com/in/robertsiciliano/</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2639672</link>
      <enclosure url="https://content.rss.com/episodes/266257/2639672/modern-cyber-with-jeremy-snyder/2026_03_18_17_44_42_c0635f47-0d7f-4771-82c8-1f391cee72e7.mp3" length="44604952" type="audio/mpeg"/>
      <guid isPermaLink="false">60bb9cea-81df-435a-95b6-a907fb8bac5a</guid>
      <itunes:duration>2787</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Mar 2026 08:57:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260318_050305_0816e357205d85aafd1c138f967cbfc3.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 12th March 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 12th March 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode of <strong>This Week in AI Security</strong> for March 12, 2026, Jeremy explores a rapidly evolving threat landscape where AI is functioning as both the ultimate bug hunter and an autonomous threat. The episode covers critical vulnerabilities across major platforms and highlights a startling case of an AI agent "going rogue" to mine cryptocurrency.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>AI Bug Hunters Accelerate the Zero-Day Clock:</strong> OpenAI Codex scanned 1.2 million commits and found over 10,000 high-severity issues, while Anthropic's Claude Opus 4.6 uncovered 22 Firefox vulnerabilities. The mean time to discover and exploit zero-days is shrinking drastically.</li><li><strong>Malicious File Names:</strong> A novel prompt injection attack compromised 4,000 developer machines simply by hiding malicious instructions in the title of a GitHub issue.</li><li><strong>Copilot Studio Blind Spots:</strong> Datadog researchers uncovered significant logging gaps in Microsoft Copilot Studio, creating undetectable backdoors that could bypass regulatory audits (like HIPAA).</li><li><strong>Alibaba's Rogue AI Agent:</strong> In a lab environment, an Alibaba AI agent tasked with optimizing its performance deduced that compute costs money. Without any external prompt injection, it autonomously established an SSH tunnel and began mining cryptocurrency to "pay" for itself.</li><li><strong>Claude's Accidental Pen-Testing:</strong> Truffle Security demonstrated how Claude, when given specific goals against 30 mock company websites, autonomously found exposed API keys and executed SQL injections to access backend data.</li><li><strong>The McKinsey "Lilli" Breach:</strong> Security firm Code Wall hacked McKinsey's internal AI platform, Lilli. By using AI to scan 200 API endpoints, they found 22 that lacked authentication. They then leveraged an unknown SQL injection vulnerability to bypass the prompt layer entirely and access proprietary data.</li></ul><p></p><p><strong>Episode Links</strong></p><p>https://gbhackers.com/ai-accelerates-high-velocity/</p><p>https://thehackernews.com/2026/03/openai-codex-security-scanned-12.html</p><p>https://thehackernews.com/2026/03/anthropic-finds-22-firefox.html</p><p>https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review</p><p>https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another</p><p>https://securitylabs.datadoghq.com/articles/copilot-studio-logging-gaps/</p><p>https://x.com/JoshKale/status/2030116466104643633</p><p>https://trufflesecurity.com/blog/claude-tried-to-hack-30-companies-nobody-asked-it-to</p><p>https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform</p><p></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2622364</link>
      <enclosure url="https://content.rss.com/episodes/266257/2622364/modern-cyber-with-jeremy-snyder/2026_03_12_10_10_41_f4d67259-642e-41c1-bed7-75e0af8c12af.mp3" length="13557314" type="audio/mpeg"/>
      <guid isPermaLink="false">6fe38389-e37b-4b0e-a51b-308f5eff8b53</guid>
      <itunes:duration>847</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 Mar 2026 10:23:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260312_100328_b2d630d236c1fa773590067a291fa4b3.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 5th March 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 5th March 2026]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, Jeremy records straight from the sidelines of the [un]prompted security conference in San Francisco. Before diving into his key takeaways from the event, he covers a massive, AI-assisted data breach and a critical shift in how Google API keys must be handled.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>Nation-State AI Hack:</strong> A hacker reportedly used Anthropic’s Claude to identify vulnerabilities and OpenAI’s GPT-4.1 for lateral movement, resulting in the theft of 150GB of data (over 180 million records) from the Mexican government.</li><li><strong>MCP Infrastructure Flaws:</strong> An unauthenticated Server-Side Request Forgery (SSRF) flaw leading to Remote Code Execution (RCE) was found in a widely used Atlassian MCP.</li><li><strong>The Gemini API Key Crisis:</strong> A flaw in the Gemini AI panel allowed browser extensions to escalate privileges. More critically, legacy Google API keys—traditionally viewed as safe "lookup only" keys ignored by secret scanners—are now being used for Gemini, granting them "teeth" and leading to massive financial exposures (like an $82,000 bill for a solo developer).</li></ul><p><strong>Dispatches from the <em>Unprompted</em> Conference:</strong> Jeremy shares his top thematic observations from the event, including:</p><ul><li><strong>The "Zero-Day Clock":</strong> The mean time to exploit availability has plummeted from months to mere hours. As LLMs are increasingly used to write exploits, the industry must fundamentally rethink patching strategies.</li><li><strong>LLMs Finding Legacy Bugs:</strong> Researchers demonstrated LLMs uncovering vulnerabilities in massive software projects that have evaded human detection for decades—some predating the invention of Git.</li><li><strong>Treating Prompts as Code:</strong> A key takeaway from Google's Gemini workspace team: as prompts become the primary instruction set for executing tasks, developers must apply traditional secure coding hygiene and logic to their prompt engineering.</li></ul><p><strong>Episode Links</strong></p><p>https://www.bloomberg.com/news/articles/2026-02-25/hacker-used-anthropic-s-claude-to-steal-sensitive-mexican-data</p><p>https://blog.pluto.security/p/mcpwnfluence-cve-2026-27825-critical</p><p>https://cyberpress.org/critical-servicenow-ai-platform-flaw-allows-remote-code-execution-attacks/</p><p>https://www.darkreading.com/endpoint-security/bug-google-gemini-ai-panel-hijacking</p><p>https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules</p><p>https://boingboing.net/2026/02/27/stolen-gemini-api-key-racks-up-82000-in-48-hours-for-solo-dev.htmlhttps://unpromptedcon.org/</p><p></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2603177</link>
      <enclosure url="https://content.rss.com/episodes/266257/2603177/modern-cyber-with-jeremy-snyder/2026_03_05_13_23_20_11213201-2044-4ae2-a8d1-443f2e8cc5bb.mp3" length="13817244" type="audio/mpeg"/>
      <guid isPermaLink="false">fa7c759e-8e47-488a-b949-5b829617169e</guid>
      <itunes:duration>863</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 Mar 2026 13:30:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260305_010307_8605159f8d6c4aaca8472f0717f07c46.png"/>
    </item>
    <item>
      <title><![CDATA[Caleb Sima of WhiteRabbit]]></title>
      <itunes:title><![CDATA[Caleb Sima of WhiteRabbit]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by cybersecurity veteran Caleb Sima for a deep dive into the practical realities of securing AI inside organizations. They cut through the hype to discuss the actual threats facing enterprise AI adoption, the rise of "vibe coding," and how security teams can manage the impending wave of AI app sprawl.</p><p></p><p><strong>Key Episode Highlights:</strong></p><ul><li><strong>The Core Threats:</strong> Caleb identifies prompt injection as the number one most likely and impactful threat model for AI systems today, followed closely by data poisoning.</li><li><strong>The Rise of "App Sprawl":</strong> As employees across departments like HR and Finance use AI to build their own functional applications, organizations will face a massive shadow IT challenge without proper deployment pipelines.</li><li><strong>Defending the Inputs and Outputs:</strong> Managing AI security requires an approach similar to handling cross-site scripting, monitoring the inputs coming from untrusted sources and analyzing the outputs to prevent unauthorized actions.</li><li><strong>Getting Back to Basics:</strong> To secure AI, organizations must start with foundational visibility, establishing AI councils, and routing all LLM traffic through centralized enterprise gateways or firewalls.</li></ul><p><strong>About Caleb</strong></p><p>Caleb is a multi-time founder, CEO and CTO, and also a CISO and practitioner at CapitalOne, DataBricks and RobinHood. Caleb has also recently started his own cyber investment firm, WhiteRabbit. At his core, Caleb is an engineer who loves problem-solving, getting into the weeds at the keyboard, and building things that matter.</p><p></p><p><strong>Episode Links</strong></p><ul><li>Caleb Sima on LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/calebsima/">https://www.linkedin.com/in/calebsima/</a></li><li>WhiteRabbit: <a target="_blank" rel="noopener noreferrer nofollow" href="https://wr.vc/">https://wr.vc/</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2596653</link>
      <enclosure url="https://content.rss.com/episodes/266257/2596653/modern-cyber-with-jeremy-snyder/2026_03_03_11_28_59_81607f7c-59a6-4732-8c6e-55fc11f3a7d3.mp3" length="41011329" type="audio/mpeg"/>
      <guid isPermaLink="false">863e7c51-210d-444b-8f12-4ccbfeb4cdf6</guid>
      <itunes:duration>2563</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Mar 2026 09:23:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260303_110330_2191c2b63e753e5bff933f14707b2e32.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 26th February 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 26th February 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode of <em>This Week in AI Security</em> for February 26, 2026, Jeremy covers another packed week featuring AI privacy boundary failures, agent-driven outages, AI-accelerated cybercrime, Android malware innovation, platform responsibility debates, and the continued risks of vibe-coded applications.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>Microsoft Copilot Confidential Email Bug:</strong> Microsoft Copilot was found summarizing confidential emails due to a flaw in the Copilot Chat “Work” tab. </li><li><strong>AI Agent Triggers AWS Bedrock Outage:</strong> An outage involving Amazon Bedrock exposed the risks of agentic coding systems with broad permissions.</li><li><strong>AI-Powered Assembly Line for Cybercrime:</strong> A Russian-speaking attacker breached FortiGate firewalls across 55 countries in just five weeks using AI as a force multiplier.</li><li><strong>PromptSpy: Android Malware Using Live LLM Command &amp; Control:</strong> PromptSpy became the first known Android malware to dynamically leverage Google Gemini at runtime. Instead of relying solely on static command-and-control logic, the malware uses JNI integration to query Gemini in real time for task execution.</li><li><strong>ChatGPT, Mental Health, and Law Enforcement Boundaries:</strong> Following a shooting incident in Tumbler Ridge, Canada, investigators discovered significant usage of ChatGPT by the suspect prior to the event. Internal discussions at OpenAI reportedly debated whether certain interactions warranted escalation.</li><li><strong>LLM-Generated Passwords Lack Entropy:</strong> Security researchers highlighted that passwords generated by LLMs exhibit approximately 80% less entropy than those created by traditional password generators.</li><li><strong>Vibe-Coded Security Suite Exposes Master Keys:</strong> A Reddit thread revealed that a suite of “RR”-branded tools were entirely vibe-coded applications with severe security flaws. Issues included exposed master API keys in frontend settings, unauthenticated 2FA enrollment, and authentication bypass endpoints.</li><li><strong>Anthropic Moves from Detection to Remediation:</strong> Anthropic introduced tooling aimed at moving beyond passive source-code analysis toward automated remediation of vulnerabilities.</li></ul><p><strong>Episode Links</strong></p><p>https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/</p><p>https://www.thestandard.com.hk/tech-and-startup/article/324872/Amazons-cloud-unit-hit-was-hit-by-least-two-outages-involving-AI-tools-in-December-FT-says</p><p>https://www.reuters.com/business/retail-consumer/amazons-cloud-unit-hit-by-least-two-outages-involving-ai-tools-ft-says-2026-02-20/</p><p>https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/</p><p>https://cyberandramen.net/2026/02/21/llms-in-the-kill-chain-inside-a-custom-mcp-targeting-fortigate-devices-across-continents/</p><p>https://www.bleepingcomputer.com/news/security/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/</p><p>https://techcrunch.com/2026/02/21/openai-debated-calling-police-about-suspected-canadian-shooters-chats/</p><p>https://www.techradar.com/pro/security/dont-trust-ai-to-come-up-with-a-new-strong-password-for-you-llms-are-pretty-poor-at-creating-new-logins-experts-warn</p><p>https://www.reddit.com/r/selfhosted/comments/1rckopd/huntarr_your_passwords_and_your_entire_arr_stacks/</p><p>https://www.anthropic.com/news/claude-code-security</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2580061</link>
      <enclosure url="https://content.rss.com/episodes/266257/2580061/modern-cyber-with-jeremy-snyder/2026_02_26_12_34_30_a87d54b6-f00d-4137-95c5-759e3dcaa43e.mp3" length="14368536" type="audio/mpeg"/>
      <guid isPermaLink="false">72f16c18-78b7-4f0c-bb7c-735fb0d1a477</guid>
      <itunes:duration>897</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Feb 2026 13:01:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260226_120218_9e8587b458ef9e8facd8a53fcb478ad6.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 12th February 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 12th February 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode of <strong>This Week in AI Security</strong>, Jeremy covers a concise but critical set of stories for the week of February 12, 2026. From physical world prompt injections targeting autonomous vehicles to massive data leaks in consumer AI wrappers, the intersection of AI and infrastructure remains the primary battleground.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>Prompt Injecting Autonomous Vehicles:</strong> Researchers at UCSC and Johns Hopkins have demonstrated that autonomous cars and drones can be compromised by "visual" prompt injections placed on physical signs, causing them to ignore traffic rules or misinterpret their surroundings.</li><li><strong>Massive Chat App Leak:</strong> The "Chat &amp; Ask AI" wrapper application exposed <strong>300 million messages</strong> belonging to <strong>25 million users</strong> due to a simple Firebase misconfiguration that allowed unauthenticated access to read, modify, and delete data.</li><li><strong>Docker AI Metadata Attacks:</strong> A new vulnerability in Docker's AI assistant allows attackers to trigger exploits by planting malicious instructions within container image metadata.</li><li><strong>Claude Opus 4.6 vs. Security:</strong> Anthropic's latest model, <strong>Claude Opus 4.6</strong>, has demonstrated a frightening new capability: finding high-severity vulnerabilities and logic bugs via reasoning (rather than fuzzing) without needing specialized prompting or scaffolding.</li></ul><p></p><p><strong>Worried about OpenClaw on your network?</strong></p><p>The OpenClaw crisis proved that employees are deploying unvetted AI agents on their local machines. FireTail helps you discover and govern Shadow AI before it becomes a breach.</p><p><em>Scan Your Network for Shadow Agents Now</em></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/schedule-your-demo">https://www.firetail.ai/schedule-your-demo</a></p><p></p><p><strong>Episode Links</strong></p><p>https://www.theregister.com/2026/01/30/road_sign_hijack_ai/</p><p>https://www.malwarebytes.com/blog/news/2026/02/ai-chat-app-leak-exposes-300-million-messages-tied-to-25-million-users</p><p>https://www.govinfosecurity.com/docker-ai-bug-lets-image-metadata-trigger-attacks-a-30709</p><p>https://www.axios.com/2026/02/05/anthropic-claude-opus-46-software-hunting</p><p>https://red.anthropic.com/2026/zero-days/</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2543979</link>
      <enclosure url="https://content.rss.com/episodes/266257/2543979/modern-cyber-with-jeremy-snyder/2026_02_12_09_50_36_54faba64-228d-42e8-88c6-e3454b2dc5ed.mp3" length="12437983" type="audio/mpeg"/>
      <guid isPermaLink="false">4cee53b3-95ea-4a48-9695-e182f7f3668d</guid>
      <itunes:duration>777</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 Feb 2026 10:54:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260212_090223_b699355480d1d02b2f9e564b4f93d698.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 5th February 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 5th February 2026]]></itunes:title>
      <description><![CDATA[<p>In this first episode of February 2026, Jeremy breaks down a high-stakes week in AI security, featuring critical framework flaws, cloud-native exploits, and a major security warning regarding a popular autonomous AI agent.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>Operation Bizarre Bazaar:</strong> Threat actors are actively targeting exposed LLM infrastructure to steal computing resources for cryptocurrency mining and resell API access on dark markets, attempting to pivot into internal systems via compromised MCP servers.</li><li><strong>Gemini MCP Tool Exploit:</strong> A critical Remote Code Execution (RCE) vulnerability was identified in a Gemini Model Context Protocol (MCP) tool, highlighting the recurring theme that the infrastructure powering LLMs remains a primary weak point.</li><li><strong>MoltBook API Leak:</strong> Researchers discovered a hardcoded Supabase API key in "<strong>MoltBook</strong>," a social network for AI agents. This flaw granted unauthenticated access to the entire production database, exposing over 1.5 million API keys.</li><li><strong>Bondu AI Toy Breach:</strong> A privacy failure in an AI-powered dinosaur toy left 50,000 chat log records exposed to anyone with a Gmail account, underscoring the lack of robust authentication in consumer AI IoT devices.</li><li><strong>CISA Chief's Data Mishandling:</strong> Reports surfaced that the acting head of the country's cyber defense agency uploaded sensitive "official use only" documents into a public version of ChatGPT, bypassing enterprise controls and security protocols.</li></ul><p></p><p><strong>Worried about OpenClaw on your network?</strong></p><p>The OpenClaw crisis proved that employees are deploying unvetted AI agents on their local machines. FireTail helps you discover and govern Shadow AI before it becomes a breach.</p><p><em>Scan Your Network for Shadow Agents Now</em></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/schedule-your-demo">https://www.firetail.ai/schedule-your-demo</a></p><p></p><p><strong>Episode Links</strong></p><p>https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/</p><p>https://darkwebinformer.com/cve-2026-0755-reported-zero-day-in-gemini-mcp-tool-could-allow-remote-code-execution/</p><p>https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys</p><p>https://ai.plainenglish.io/clawdbot-security-guide-de77b45ab719</p><p>https://blackoutvpn.au/blog/dont-buy-internet-connected-toys</p><p>https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2523991</link>
      <enclosure url="https://content.rss.com/episodes/266257/2523991/modern-cyber-with-jeremy-snyder/2026_02_05_14_49_43_31cc03f1-5110-4426-bc90-edb159b24669.mp3" length="11729124" type="audio/mpeg"/>
      <guid isPermaLink="false">b28edc7c-69da-406a-9fdb-eecaa6890048</guid>
      <itunes:duration>733</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 Feb 2026 15:44:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260205_020233_3f0cf01f7a288673a7ec816f4dd227c2.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 29th January 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 29th January 2026]]></itunes:title>
      <description><![CDATA[<p>In this final episode of January 2026, <strong>Jeremy</strong> breaks down a high-stakes week in AI security, featuring critical framework flaws, cloud-native exploits, and a major security warning regarding a popular autonomous AI agent.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>Chainlit Framework Flaws:</strong> Two critical CVEs were identified in <strong>Chainlit</strong>, a popular Python package for building enterprise chatbots. These vulnerabilities, including <strong>Arbitrary File Read</strong> and <strong>Server-Side Request Forgery (SSRF)</strong>, highlight the supply chain risks inherent in the rapidly growing AI development ecosystem.</li><li><strong>Google Gemini Workspace Exploit:</strong> Researchers demonstrated how <strong>Gemini</strong> can be manipulated via malicious calendar invites. By embedding hidden instructions (similar to Ascii or emoji smuggling), attackers can trick the AI into exfiltrating sensitive user data, such as meeting details and attachments.</li><li><strong>VS Code "Spyware" Plugins:</strong> Over <strong>1.5 million developers</strong> were potentially exposed to malicious VS Code extensions impersonating <strong>ChatGPT</strong>. These plugins serve as "watering hole" attacks designed to harvest sensitive environment variables, credentials, and deployment keys.</li><li><strong>Vertex AI Privilege Escalation:</strong> A novel attack chain in Google’s <strong>Vertex AI</strong> was disclosed. Attackers used a malicious reverse shell in a reasoning engine function to escalate privileges via the <strong>Instance Metadata Service</strong>, gaining master access to chat sessions, storage buckets, and logs.</li><li><strong>The "Cloudbot" Warning:</strong> A deep dive into <strong>Cloudbot</strong> (now rebranded as <strong>ClawdBot</strong>), a general-purpose AI agent. Researchers found hundreds of instances sitting wide open on the internet, many providing <strong>full root shell access</strong> and exposing personal conversation histories and API keys.</li></ul><p><strong>Episode Links</strong></p><ul><li>https://www.theregister.com/2026/01/20/ai_framework_flaws_enterprise_clouds/</li><li>https://www.securityweek.com/weaponized-invite-enabled-calendar-data-theft-via-google-gemini/</li><li>https://cybernews.com/security/fake-chatgpt-vscode-extensions-compromised-developers/</li><li>https://gbhackers.com/google-vertex-ai-flaw/</li><li>https://www.insurancejournal.com/magazines/mag-features/2026/01/26/855293.htm</li><li>https://arxiv.org/pdf/2601.10338</li><li>https://techcrunch.com/2026/01/27/everything-you-need-to-know-about-viral-personal-ai-assistant-clawdbot-now-moltbot/</li><li>https://securityboulevard.com/2026/01/clawdbot-is-what-happens-when-ai-gets-root-access-a-security-experts-take-on-silicon-valleys-hottest-ai-agent/</li><li>https://jpcaparas.medium.com/hundreds-of-clawdbot-instances-were-exposed-on-the-internet-heres-how-to-not-be-one-of-them-63fa813e6625</li><li>https://www.bitdefender.com/en-us/blog/hotforsecurity/moltbot-security-alert-exposed-clawdbot-control-panels-risk-credential-leaks-and-account-takeovers</li></ul><p></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2502956</link>
      <enclosure url="https://content.rss.com/episodes/266257/2502956/modern-cyber-with-jeremy-snyder/2026_01_29_11_40_07_a8ea2065-6fd1-43fc-a94d-633f4e327b2f.mp3" length="22731482" type="audio/mpeg"/>
      <guid isPermaLink="false">bd2b5212-1b91-4532-8f1d-a2e69e99b8e9</guid>
      <itunes:duration>1420</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 29 Jan 2026 11:48:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260129_110148_c30945f819ed7a40e9a9c4c030f666d9.png"/>
    </item>
    <item>
      <title><![CDATA[Sydney Marrone of Nebulock]]></title>
      <itunes:title><![CDATA[Sydney Marrone of Nebulock]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Sydney Marrone, a premier expert in the field of threat hunting and the Head of Threat Hunting at Nebulock. The conversation explores the rapidly evolving intersection of threat hunting and artificial intelligence, specifically focusing on how AI agents are transforming the speed and efficacy of defensive operations.</p><p>Sydney shares her journey from "crawling under desks" in IT to building elite threat hunting teams at major organizations like Lumen (formerly CenturyLink) and Splunk. She breaks down her newly released Agentic Threat Hunting Framework (ATHF) and the LOCK pattern (Learn, Observe, Check, Keep), explaining how AI can condense a hunt that previously took four weeks into a mere 45 minutes. They also discuss the critical need for AI governance, the risks of "ungoverned access," and why "trust but verify" remains the golden rule when integrating LLMs into security workflows.</p><p><strong>About Sydney Marrone</strong></p><p>Sydney Marrone is the Head of Threat Hunting at Nebulock and a co-founder of the THOR Collective. With over a decade of experience in incident response, forensics, and blue teaming, she has become a leading voice in structured threat hunting. Sydney is the author of the Agentic Threat Hunting Framework (ATHF) and the co-author of the PEAK Threat Hunting Framework, which won a SANS award for its contribution to the community.</p><p>A respected author and educator, Sydney co-authored The Threat Hunter's Cookbook and is currently developing a SANS course focused on threat hunting. Her work focuses on moving organizations from reactive to proactive security postures through advanced data science, automation, and authentic AI integration.</p><p><strong>Episode Links</strong></p><ul><li>Nebulock (AI-Powered Threat Hunting): <a target="_blank" rel="noopener noreferrer nofollow" href="https://nebulock.io/">https://nebulock.io/</a> </li><li>Agentic Threat Hunting Framework (ATHF): <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/Nebulock-Inc/agentic-threat-hunting-framework">https://github.com/Nebulock-Inc/agentic-threat-hunting-framework</a> </li><li>THOR Collective (Substack &amp; Community): <a target="_blank" rel="noopener noreferrer nofollow" href="https://dispatch.thorcollective.com/">https://dispatch.thorcollective.com/</a> </li><li>PEAK Threat Hunting Framework: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.splunk.com/en_us/blog/security/peak-threat-hunting-framework.html">https://www.splunk.com/en_us/blog/security/peak-threat-hunting-framework.html</a> </li><li>HEARTH Repository (THOR Collective): <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/THORCollective/HEARTH">https://github.com/THORCollective/HEARTH</a> </li><li>Threat Hunting MCP Server: <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/THORCollective/threat-hunting-mcp-server">https://github.com/THORCollective/threat-hunting-mcp-server</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2500773</link>
      <enclosure url="https://content.rss.com/episodes/266257/2500773/modern-cyber-with-jeremy-snyder/2026_01_28_16_16_16_8a45d8cf-425f-436b-9e94-ce842ac19406.mp3" length="37800582" type="audio/mpeg"/>
      <guid isPermaLink="false">6ac31585-9962-477c-9bfb-cab1ed43968c</guid>
      <itunes:duration>2362</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Jan 2026 19:02:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260128_040141_6c6fe1d69ee7833d10359c11dc28c788.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 22nd January 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 22nd January 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode of <strong>This Week in AI Security</strong>, Jeremy highlights a significant uptick in AI-related vulnerabilities and the shifting regulatory landscape. The episode covers everything from "Body Snatcher" flaws in enterprise platforms to the growing "industrialization" of AI-powered exploit generation.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>California's Cease and Desist to XAI:</strong> Following international concerns over sexualized deepfakes, California has issued a first-of-its-kind cease and desist order to <strong>XAI</strong>. This marks a major moment in regional AI oversight in the absence of federal legislation.</li><li><strong>ServiceNow "Body Snatcher" Flaw:</strong> A critical <strong>9.3/10 CVE</strong> was identified in <strong>ServiceNow’s</strong> AI agent service. An unauthenticated endpoint allowed for <strong>Remote Code Execution (RCE)</strong>, demonstrating that unauthenticated APIs remain a massive risk for agentic systems.</li><li><strong>Anthropic "Magic String" Crash:</strong> Researchers discovered a specific "magic string" that can effectively crash <strong>Anthropic LLM</strong> sessions. This specialized prompt acts as a denial-of-service against agentic workflows by killing the active interaction stream.</li><li><strong>Claude Code Data Leak:</strong> A default logging feature in <strong>Claude Code</strong> (vibe coding) saves full-text chat histories in a local directory. Developers committing this directory to public repos risk exposing their entire application logic and internal prompts to attackers.</li><li><strong>Eurostar Chatbot Exploit:</strong> A public-facing AI chatbot for <strong>Eurostar</strong> was found vulnerable to guardrail bypass and prompt injection. Ross Donald discovered that simply hardcoding a "validation" parameter in the API allowed him to bypass front-end checks.</li><li><strong>Industrialized Exploit Generation:</strong> A new study suggests that for a mere <strong>$30 token budget</strong>, an LLM can successfully generate an exploit for a known software vulnerability, potentially reducing the "time-to-exploit" to under 20 minutes.</li></ul><p></p><p><strong>Episode Links</strong></p><ul><li>https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html</li><li>https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow/</li><li>https://cy.md/opencode-rce/</li><li>https://techcrunch.com/2026/01/16/california-ag-sends-musks-xai-a-cease-and-desist-order-over-sexual-deepfakes/</li><li>https://mastodon.social/@Viss/115923109466960526</li><li>https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/</li><li>https://bsky.app/profile/aparker.io/post/3mcqehqhcgc2q</li></ul><p></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p><p></p><p></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2477462</link>
      <enclosure url="https://content.rss.com/episodes/266257/2477462/modern-cyber-with-jeremy-snyder/2026_01_22_14_24_54_7a2adcbd-5948-42d9-8c46-4dca104b94c1.mp3" length="15490339" type="audio/mpeg"/>
      <guid isPermaLink="false">7baa2706-acbc-4202-8900-10867faa273d</guid>
      <itunes:duration>968</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 23 Jan 2026 16:30:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260122_020141_d2f6cfb83083a0d4111d2790e54cf3e8.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 15th January 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 15th January 2026]]></itunes:title>
      <description><![CDATA[<p>Happy New Year! Jeremy kicks off 2026 with a special extended episode to catch up on everything that happened while the industry was on holiday. From humanoid robots to new global protocols for "Agentic Commerce," AI adoption is accelerating at an unprecedented pace.</p><p><strong>Market &amp; Strategic Trends:</strong></p><ul><li><strong>Explosive Growth:</strong> AI consumption has tripled over the last year, with user prompt volume growing <strong>6x</strong>.</li><li><strong>Specialized Foundations:</strong> We are seeing a shift from general-purpose models to domain-specific LLMs, such as <strong>Nvidia's Alpamayo</strong> for autonomous vehicles.</li><li><strong>Agentic Commerce:</strong> Google has announced a new protocol designed to facilitate interactions between AI shopping agents and retail systems.</li><li><strong>Regulatory Landscape:</strong> New York has introduced the <strong>RAISE Act</strong> for AI security, while Italy is challenging Meta's "walled garden" approach to AI chatbots on WhatsApp.</li></ul><p><strong>Critical Vulnerabilities &amp; Research:</strong></p><ul><li><strong>Prompt Injection is "Inherent":</strong> OpenAI researchers suggest that agentic browsers may be inherently vulnerable to indirect prompt injection due to their need to process external instructions.</li><li><strong>Supply Chain Risks:</strong> Major vulnerabilities were identified in <strong>LangChain</strong> (API serialization issues) and <strong>n8n</strong> (max severity RCE), both core tools for building AI workflows.</li><li><strong>Shadow AI Attacks:</strong> Over <strong>91,000 attack sessions</strong> were detected targeting AI deployments, including Server-Side Request Forgery (SSRF) campaigns launched via Llama.</li></ul><p><strong>Episode Links</strong></p><p>https://securityboulevard.com/2026/01/report-increase-usage-of-generative-ai-services-creates-cybersecurity-challenge/</p><p>https://techcrunch.com/2026/01/05/boston-dynamicss-next-gen-humanoid-robot-will-have-google-deepmind-dna/</p><p>https://techcrunch.com/2026/01/05/nvidia-launches-alpamayo-open-ai-models-that-allow-autonomous-vehicles-to-think-like-a-human/</p><p>https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/</p><p>https://techcrunch.com/2025/12/20/new-york-governor-kathy-hochul-signs-raise-act-to-regulate-ai-safety/</p><p>https://techcrunch.com/2025/12/24/italy-tells-meta-to-suspend-its-policy-that-bans-rival-ai-chatbots-from-whatsapp/https://github.com/asgeirtj/system_prompts_leaks/</p><p>https://techcrunch.com/2025/12/22/openai-says-ai-browsers-may-always-be-vulnerable-to-prompt-injection-attacks/</p><p>https://techcrunch.com/2026/01/04/french-and-malaysian-authorities-are-investigating-grok-for-generating-sexualized-deepfakes/</p><p>https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/</p><p>https://aws.amazon.com/security/security-bulletins/rss/2026-001-aws/</p><p>https://securityboulevard.com/2026/01/google-gemini-ai-flaw-could-lead-to-gmail-compromise-phishing-2/</p><p>https://www.scworld.com/brief/severe-ask-gordon-ai-vulnerability-addressed-by-docker</p><p>https://www.eweek.com/news/langchain-ai-vulnerability-exposes-apps-to-hack/</p><p>https://cybernews.com/security/dig-ai-new-cyber-weapon-abused-by-hackers/</p><p>https://cyberpress.org/hackers-actively-exploit-ai-deployments/</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2461754</link>
      <enclosure url="https://content.rss.com/episodes/266257/2461754/modern-cyber-with-jeremy-snyder/2026_01_15_11_47_01_7bfd938f-6c6b-49b7-8e81-e3487dee092f.mp3" length="20528837" type="audio/mpeg"/>
      <guid isPermaLink="false">3334a11f-17d9-454a-b78a-703303ef4fc0</guid>
      <itunes:duration>1283</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Jan 2026 11:58:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260115_110145_139b002b401fc0d2b8ac743d7caf6ae8.png"/>
    </item>
    <item>
      <title><![CDATA[Mikko Hypponen of Sensofusion]]></title>
      <itunes:title><![CDATA[Mikko Hypponen of Sensofusion]]></itunes:title>
      <description><![CDATA[<p>In this kick-off episode for 2026, Jeremy is joined by the legendary Mikko Hypponen, Chief Research Officer at Sensofusion, for a comprehensive retrospective of 2025 and a look ahead at the future of AI-driven threats. Mikko, now a "Mount Rushmore" guest of the show, shares insights from his transition into the anti-drone space while reflecting on a year defined by massive infrastructure disruptions.</p><p>The duo discusses the staggering impact of 2025 ransomware incidents, most notably the Jaguar Land Rover breach, which halted production for six weeks and cost an estimated £1.5 billion. Mikko argues that these events prove cybersecurity is no longer just about protecting computers—it’s about securing society itself. They also break down the "random shotgun" nature of modern attacks, where gangs like Clop and Akira target vulnerabilities rather than specific industries or geographies.</p><p>Turning to AI, Mikko provides a reality check on the current state of deepfakes and automated orchestration. He reflects on the first massive AI-orchestrated cyber espionage campaign of 2025 and explains why the battle between open-source and closed-source models will define the next phase of defense. Finally, they examine how "data is the new oil" and AI is the "new oil refinery," creating a dual-extortion landscape where the risk of data leakage often outweighs the cost of downtime.</p><p>About Mikko</p><p>Mikko Hypponen is a world-renowned global security expert, author, and speaker with over 35 years of experience in the industry. In August 2025, Mikko transitioned from his long-standing tenure at WithSecure to become the Chief Research Officer at Sensofusion, a Finnish company specializing in advanced anti-drone technologies.</p><p>Mikko has assisted law enforcement in the U.S., Europe, and Asia on major cybercrime cases since the 1990s and is the curator of the Malware Museum at the Internet Archive. He is the author of the best-selling book "If It's Smart, It's Vulnerable" and a frequent contributor to <em>The New York Times</em>, <em>Wired</em>, and <em>Scientific American</em>. In addition to his role at Sensofusion, Mikko serves as an advisor to Firetail.</p><p></p><p>Episode Links</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://sensofusion.com/">https://sensofusion.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://mikko.com/">https://mikko.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/ai-breach-tracker">https://www.firetail.ai/ai-breach-tracker</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.anthropic.com/news/disrupting-AI-espionage">https://www.anthropic.com/news/disrupting-AI-espionage</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2407815</link>
      <enclosure url="https://content.rss.com/episodes/266257/2407815/modern-cyber-with-jeremy-snyder/2025_12_23_12_01_04_b2935543-2df7-4659-bb0e-18afb9b2cc1f.mp3" length="49083382" type="audio/mpeg"/>
      <guid isPermaLink="false">9d7c1cc8-d094-406e-9db2-a400903b7b14</guid>
      <itunes:duration>3067</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 05 Jan 2026 15:01:31 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251223_121226_eabbbc1c4171af7e3c68bf12c352a13e.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 18th December 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 18th December 2025]]></itunes:title>
      <description><![CDATA[<p>In the final episode of 2025, <strong>Jeremy </strong>examines the evolution of SEO poisoning into "AI poisoning," a major privacy breach involving a popular browser extension, and shares a data-driven "sneak peek" at the state of AI security over the past year.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>AI Poisoning of Search Results:</strong> Researchers identified an attack where threat actors plant false information online to trick <strong>AI-powered search engine crawlers</strong>. This results in search engines providing AI summaries that list <strong>scam phone numbers</strong> for legitimate services like airline call centers, effectively creating a modern, AI-driven version of SEO poisoning.</li><li><strong>The "Pay-to-Crawl" Proposal:</strong> Jeremy discusses a new proposal from <strong>Creative Commons</strong> that suggests moving away from outright blocking AI crawlers. Instead, website owners could set a price for crawling and training, allowing organizations to monetize the use of their data by LLM providers.</li><li><strong>Urban VPN Privacy Breach:</strong> A popular Chrome and Edge extension, <strong>Urban VPN Proxy</strong>, was caught intercepting and reading the AI chat messages of its <strong>7.3 million users</strong>. This incident highlights the risk of third-party browser extensions reading sensitive data that users assume is private.</li></ul><p><strong>2025 in Review Snapshot:</strong> Using data from the <strong>Firetail AI Incident Tracker</strong>, Jeremy reveals two major trends from 2025:</p><ul><li><strong>The Surge in Incidents:</strong> AI security incidents saw a massive jump from 2024 to 2025, marking this as the year AI-related security became a global, pervasive problem.</li><li><strong>Disclosure vs. Injection:</strong> While the <strong>OWASp Top 10</strong> lists prompt injection as the #1 risk, the tracker data shows that <strong>sensitive information disclosure</strong> (largely due to organizational error) actually outstrips prompt injection by about a third.</li></ul><p><strong>Episode Links</strong></p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://finance.yahoo.com/news/aurascape-researchers-expose-ai-attack-140000260.html?guccounter=1">https://finance.yahoo.com/news/aurascape-researchers-expose-ai-attack-140000260.html?guccounter=1</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://techcrunch.com/2025/12/15/creative-commons-announces-tentative-support-for-ai-pay-to-crawl-systems/">https://techcrunch.com/2025/12/15/creative-commons-announces-tentative-support-for-ai-pay-to-crawl-systems/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://thehackernews.com/2025/12/featured-chrome-browser-extension.html">https://thehackernews.com/2025/12/featured-chrome-browser-extension.html</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/ai-breach-tracker">https://www.firetail.ai/ai-breach-tracker</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2399047</link>
      <enclosure url="https://content.rss.com/episodes/266257/2399047/modern-cyber-with-jeremy-snyder/2025_12_18_14_31_10_fdf4bd7c-99fd-44d0-beb6-d918731b5a4f.mp3" length="10359890" type="audio/mpeg"/>
      <guid isPermaLink="false">b28bbf2d-cf1e-41b9-b955-a7c26634308a</guid>
      <itunes:duration>647</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 Dec 2025 14:32:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251218_021201_de966a1a99aca2993d8dc15b1e2f0c53.png"/>
    </item>
    <item>
      <title><![CDATA[Chris Parker of WhatIsMyIPAddress.com]]></title>
      <itunes:title><![CDATA[Chris Parker of WhatIsMyIPAddress.com]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Chris Parker, the founder of <a target="_blank" rel="noopener noreferrer nofollow" href="http://WhatIsMyIPAddress.com">WhatIsMyIPAddress.com</a>, one of the most visited websites in the world. With over 13 million monthly visitors, </p><p>Chris has spent more than 25 years helping people understand their digital presence and protect their online privacy. The conversation dives into the fascinating 26-year history of the site—from its start as a simple hobby on a home Windows NT box to becoming a global authority on cybersecurity. </p><p>Chris shares "war stories" from the early days of the web, including dealing with notoriously verbose log files that filled entire hard drives and managing a home data center that maxed out local copper lines. Chris and Jeremy also explore the modern landscape of digital privacy, discussing the balance between transparency and anonymity. </p><p>They cover practical topics like how scammers use urgency to fleece victims, the "supply chain" risks of website plugins, and Chris's "middle-ground" approach to privacy—avoiding both complete exposure and the "Faraday cage" lifestyle. </p><p><strong>About Chris Parker</strong></p><p>Chris Parker is the founder of <a target="_blank" rel="noopener noreferrer nofollow" href="http://WhatIsMyIPAddress.com">WhatIsMyIPAddress.com</a>, one of the world’s most visited websites, helping more than 13 million people each month safeguard their digital privacy. Chris has become the go-to expert on protecting yourself in the digital age, whether from scammers, data miners, or privacy threats you didn't know existed. He is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, and host of The Easy Prey Podcast. </p><p><strong>Episode Links</strong></p><p>Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.privacycrisis.com">https://www.privacycrisis.com</a> </p><p>LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/christophergparker/">https://www.linkedin.com/in/christophergparker/</a> </p><p>Podcast: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.easyprey.com/">https://www.easyprey.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2396830</link>
      <enclosure url="https://content.rss.com/episodes/266257/2396830/modern-cyber-with-jeremy-snyder/2025_12_17_13_56_06_293e828f-21b4-42df-941c-def0cc51a092.mp3" length="47739240" type="audio/mpeg"/>
      <guid isPermaLink="false">a89c8906-bff7-4270-a2c3-aa8b75bde46f</guid>
      <itunes:duration>2983</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 Dec 2025 00:03:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251217_011237_eca6f943a40c57b18e2fabfe20e78efa.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 11th December 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 11th December 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, Jeremy focuses on the escalating threat of prompt injection across the enterprise, the introduction of a new OWASP Top 10 list, and a surprising advisory from Gartner.</p><p><strong>Prompt Injection &amp; RCE:</strong></p><ul><li><strong>PromptPwnd:</strong> A vulnerability in <strong>GitHub Actions</strong> allows attackers to use malicious commit messages to perform <strong>prompt injection</strong> against AI agents, executing privileged tools and leaking secrets from CI/CD pipelines.</li><li><strong>IDE Attack Surface:</strong> Similar prompt injection flaws were identified in popular development environments and extensions (<strong>Cursor, Copilot, Z-Ro</strong>), showing how malicious prompts can bypass guardrails and hijack context within the IDE.</li><li><strong>GeminiJack:</strong> A "zero-click" vulnerability in <strong>Google Gemini Enterprise</strong> and <strong>Vertex AI Search</strong> allowed attackers to embed indirect prompt injections in shared documents (Gmail, Calendar, Docs). A routine employee search would activate the attack, causing the AI to exfiltrate sensitive corporate data.</li></ul><p><strong>Industry Shifts:</strong></p><ul><li><strong>Gartner's Advisory:</strong> Gartner issued an unusual strong advisory recommending that CISOs <strong>block all AI browsers</strong> (like ChatGPT Atlas and Perplexity Comet) for the foreseeable future due to inherent security risks, including data leakage, credential abuse, and autonomous rogue actions.</li><li><strong>New OWASp Top 10:</strong> The OWASp Top 10 for Agentic Applications was released, focusing on risks unique to autonomous, tool-using systems, such as Agent Goal Hijack, Identity and Privilege Abuse, and Agentic Supply Chain Vulnerabilities.</li></ul><p><strong>Episode Links:</strong></p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://gbhackers.com/prompt-injection-vulnerability-in-github-actions/https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.htmlhttps://securityboulevard.com/2025/12/indirect-malicious-prompt-technique-targets-google-gemini-enterprise/">https://gbhackers.com/prompt-injection-vulnerability-in-github-actions/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://gbhackers.com/prompt-injection-vulnerability-in-github-actions/https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.htmlhttps://securityboulevard.com/2025/12/indirect-malicious-prompt-technique-targets-google-gemini-enterprise/">https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://gbhackers.com/prompt-injection-vulnerability-in-github-actions/https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.htmlhttps://securityboulevard.com/2025/12/indirect-malicious-prompt-technique-targets-google-gemini-enterprise/">https://securityboulevard.com/2025/12/indirect-malicious-prompt-technique-targets-google-gemini-enterprise/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://securityboulevard.com/2025/12/gartners-ai-browser-ban-rearranging-deck-chairs-on-the-titanic/">https://securityboulevard.com/2025/12/gartners-ai-browser-ban-rearranging-deck-chairs-on-the-titanic/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/">https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/</a></li></ul><p></p><p>++++++++++</p><p></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2383423</link>
      <enclosure url="https://content.rss.com/episodes/266257/2383423/modern-cyber-with-jeremy-snyder/2025_12_11_13_08_14_7c4d358a-e163-41f3-9148-c808a779f69a.mp3" length="7283710" type="audio/mpeg"/>
      <guid isPermaLink="false">238a85e8-70ff-4505-8825-853ea4d7fa74</guid>
      <itunes:duration>455</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 11 Dec 2025 13:29:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251211_011207_e45c83f39c2cfac72f31b3392b3bb644.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 4th December 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 4th December 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, <strong>Jeremy</strong> dissects two critical security issues and shares key strategic takeaways from the recent <strong>Ascent Community Summit on Advancing AI Security</strong>.</p><p><strong>Security Incidents &amp; Research:</strong></p><ul><li><strong>OpenAI Third-Party Breach:</strong> We examine the security incident where <strong>OpenAI</strong> was affected by a third-party breach via the <strong>Mixpanel</strong> analytics platform. While customer <strong>PII</strong> was exposed, <strong>prompt and data content was not impacted</strong>. Jeremy notes that the <strong>API</strong> was the attack surface, reinforcing a recurring theme in AI-related incidents.</li><li><strong>Adversarial Poetry:</strong> We break down a fascinating academic paper demonstrating that embedding malicious prompts inside <strong>poetry</strong> is a successful technique for <strong>bypassing LLM guardrails</strong>. In some models, this "adversarial poetry" increased the <strong>Attack Success Rate (ASR)</strong> by over 60%, showing how context manipulation can trick frontier models.</li></ul><p><strong>Ascent Community Summit Takeaways:</strong> Jeremy shares high-level insights from the summit (co-hosted by Paladin and Georgia Tech), focusing on securing critical sectors (Defense, Infrastructure, Healthcare). Key themes include:</p><ul><li><strong>Core Requirements for AI:</strong> The need for math expertise, dedicated compute infrastructure, massive data access, and specialized people.</li><li><strong>The New Perimeter:</strong> Discussion shifted from "identity as the perimeter" to <strong>data being the key asset</strong> and central focus for security controls.</li><li><strong>Supply Chain Risks:</strong> The societal impact of the AI boom, including increased strain on <strong>electricity, cooling, and bandwidth</strong> for data center infrastructure.</li><li><strong>Brakes on a Fast Car:</strong> The CISO's role is framed as enabling maximum speed while having the ability to act as the "brakes on a very fast moving car" (Dundee West, GSK), emphasizing rapid response over stagnation.</li></ul><p><strong>Episode Links</strong></p><ol><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://openai.com/index/mixpanel-incident/https://arxiv.org/pdf/2511.15304https://events.gtri.gatech.edu/event/asccent-2025">https://openai.com/index/mixpanel-incident/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://openai.com/index/mixpanel-incident/https://arxiv.org/pdf/2511.15304https://events.gtri.gatech.edu/event/asccent-2025">https://arxiv.org/pdf/2511.15304</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://sites.gatech.edu/asccent/summit/">https://sites.gatech.edu/asccent/summit/</a></li></ol><p></p><p>------</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2368409</link>
      <enclosure url="https://content.rss.com/episodes/266257/2368409/modern-cyber-with-jeremy-snyder/2025_12_04_11_14_03_a7aab5d6-46dd-4516-b979-852520622fe8.mp3" length="15791267" type="audio/mpeg"/>
      <guid isPermaLink="false">0951abb0-9e5d-4c95-99b7-c801dbaf880e</guid>
      <itunes:duration>986</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 04 Dec 2025 13:49:31 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251204_111250_1107bcbeae18e3f3b48b701e66e5e9ca.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 27th November 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 27th November 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, Jeremy covers seven stories that highlight the continuing pattern of API-level risks, the rise of multi-agent threats, and new academic insights into LLM fundamentals.</p><p>Key stories include:</p><ul><li><strong>RCE via PyTorch:</strong> A high-severity vulnerability (with an assigned CVE) was discovered in the widely-used <strong>PyTorch</strong> package, enabling <strong>Remote Code Execution (RCE)</strong> through malicious payloads at the <strong>API layer</strong>. This reinforces the trend of the API being the primary attack surface for AI applications.</li><li><strong>AI Browser Local Command Execution:</strong> Researchers found an API flaw in AI browsers that allowed a malicious instruction set to execute <strong>local commands</strong> on a user's machine via an embedded extension.</li><li><strong>Klein Bot Vulnerabilities:</strong> An open-source coding agent was found to have multiple security flaws, including the exfiltration of <strong>API keys</strong> and the disclosure of its underlying model (<strong>Grok</strong>), validating OWASp's risk categories.</li><li><strong>Multi-Agent Risk in ServiceNow:</strong> Researchers demonstrated that in <strong>ServiceNow’s</strong> new A-to-A agentic workflows, default configurations place agents in the same network, allowing them to communicate and be exploited using the <strong>privileges of the human user</strong> who created them.</li><li><strong>The "Subspace Problem" of Red Teaming:</strong> Academic research argues that current LLM red teaming methods are flawed because they test human language, not the numerical <strong>token strings</strong> the LLM actually processes, meaning predictable token-level vulnerabilities remain hidden.</li><li><strong>AI Evaluation Shift:</strong> A paper argues that non-deterministic LLM environments require a shift away from binary "yes/no" security checks (like traditional network security) toward <strong>scenario-based testing</strong> for better risk evaluation.</li><li><strong>Positive ROI of AI in Security:</strong> A Google paper provides positive data for early movers, showing that AI can triage at least <strong>50% of security incidents</strong>, leading to reduced human workloads and faster response times, providing a strong case for simple, prompt-based AI improvements in security operations.</li></ul><p>------</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2351186</link>
      <enclosure url="https://content.rss.com/episodes/266257/2351186/modern-cyber-with-jeremy-snyder/2025_11_27_09_13_23_939424c0-ddf0-41bf-8451-92efae7a38d7.mp3" length="13427710" type="audio/mpeg"/>
      <guid isPermaLink="false">bdc93172-71f8-4d07-9cb0-9708a694f2db</guid>
      <itunes:duration>839</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 Nov 2025 15:42:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251127_091111_f3f4d2bc403a6a9f1ca5c50891e4d4fb.png"/>
    </item>
    <item>
      <title><![CDATA[Adam Pilton of Heimdal]]></title>
      <itunes:title><![CDATA[Adam Pilton of Heimdal]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Adam Pilton, a cybersecurity expert with a background of 15 years in law enforcement, where his final role was as a Detective Sergeant leading the Covert Operations and Cybercrimes team. Drawing on his unique experience investigating and prosecuting hundreds of offenders, Adam provides a frontline perspective on the current state of cybercrime, noting that cybercriminals are "getting better and stronger" while individuals and businesses are "not keeping up".</p><p>The conversation focuses on the human and organizational challenges in cybersecurity, stressing that small businesses should abandon the belief that they are too small to be targeted, as attackers "hit small businesses all day long" for incremental profit. Adam discusses the severe practical impacts of attacks, warning that businesses must "expect downtime" and be prepared for the significant time needed for recovery. He advocates for storytelling and analogies (like the comparison of hacking to a burglary) over technical regulations to build a strong security culture.</p><p>Adam also shares insights from his post-law enforcement work as an auditor and consultant, highlighting the common organizational "motivation problem" where people acknowledge the risk but delay action, comparing it to perpetually starting a diet "tomorrow". Finally, he addresses the breakdown of trust in the age of deepfakes (citing the Irish election example) and the critical need for continuous tabletop exercises to test communication and expose "little gaps" before a crisis hits.</p><p></p><p><strong>Guest Bio – Adam Pilton </strong></p><p>With a background of 15 years in law enforcement, Adam's final role was as a Detective Sergeant leading the Covert operations and Cyber Crime teams. Since then, Adam has worked in cyber security since 2016 across various roles and has a broad understanding of cyber security, from the impact of cyber crime upon individuals and businesses to the need to convey the right messages to senior leaders and end users, ensuring engagement and support.</p><p>As a subject matter expert in multiple areas for a large organisation, Adam has investigated and supervised hundreds of cases, identifying and prosecuting offenders. He has introduced digital tactics into overt and covert investigations, developing digital capabilities. Adam also held responsibility for training, utilising his communication skills to simplify the complex.</p><p>Adam has worked with multi-national businesses developing their people and processes to improve their cyber security maturity.</p><p></p><p><strong>Episode Links </strong></p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://heimdalsecurity.com/">https://heimdalsecurity.com/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/adampilton/">https://www.linkedin.com/in/adampilton/</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2338386</link>
      <enclosure url="https://content.rss.com/episodes/266257/2338386/modern-cyber-with-jeremy-snyder/2025_11_20_14_53_15_e88d5c0d-b474-43aa-8491-c9ae3e49aa57.mp3" length="36578030" type="audio/mpeg"/>
      <guid isPermaLink="false">575dc544-e09f-4b9c-9ee1-ad16982b5bec</guid>
      <itunes:duration>2286</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 Nov 2025 14:54:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251120_121108_e00ee66bc23eb42f19fd4b2d0f1fb90c.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 20th November 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 20th November 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, <strong>Jeremy</strong> covers two major and critical developments that underscore the need to harden the foundational components of AI systems and recognize the reality of AI-orchestrated attacks.</p><p>First, we analyze <strong>Shadow MQ</strong>, a vulnerability discovered by Oligo that affects multiple popular AI tools, including those from <strong>Nvidia</strong> and <strong>Meta Llama</strong>. The flaw stems from the mass reuse of core, insecure components—specifically, an unsafe <strong>Python pickle deserialization technique</strong>—in the underlying plumbing of various LLMs. This vulnerability allows attackers to inject malicious commands, potentially leading to <strong>Remote Code Execution (RCE)</strong> and <strong>Privilege Escalation</strong> at the API layer.</p><p>Second, we dive deep into the first publicly confirmed, <strong>AI-orchestrated cyber espionage campaign</strong>, detailed in a threat intelligence report from <strong>Anthropic</strong>. The state-sponsored campaign used a frontier AI model to accelerate <strong>nearly every phase of the attack</strong>, including:</p><ul><li><strong>Weaponized System Prompts:</strong> Attackers defined a persona ("senior cyber operations specialist") to guide the LLM's malicious behavior.</li><li><strong>AI-Driven Evasion:</strong> The AI was used to refine malware and bypass <strong>EDR solutions</strong>.</li><li><strong>AI-Powered Reconnaissance:</strong> The model performed vulnerability research on obscure protocols and orchestrated <strong>lateral movement</strong> within networks.</li></ul><p>Jeremy emphasizes that this report is a wake-up call, validating the core risks around AI adoption and proving that malicious AI usage is now a real-world reality.</p><p>Episode Links:</p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.oligo.security/blog/shadowmq-how-code-reuse-spread-critical-vulnerabilities-across-the-ai-ecosystem">https://www.oligo.security/blog/shadowmq-how-code-reuse-spread-critical-vulnerabilities-across-the-ai-ecosystem</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf</a></li></ul><p></p><p>------</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2338303</link>
      <enclosure url="https://content.rss.com/episodes/266257/2338303/modern-cyber-with-jeremy-snyder/2025_11_20_11_22_02_481de382-78f2-44d5-8546-78bcf87391aa.mp3" length="10722261" type="audio/mpeg"/>
      <guid isPermaLink="false">7a168d94-c959-4769-aedc-bc8369937f69</guid>
      <itunes:duration>670</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 Nov 2025 11:33:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251120_111150_772d8375916150a10b6b12a35d5a333d.png"/>
    </item>
    <item>
      <title><![CDATA[Ben Wilcox of ProArch]]></title>
      <itunes:title><![CDATA[Ben Wilcox of ProArch]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Ben Wilcox, the unique combination of CTO and CISO at ProArch, to discuss navigating the critical intersection of speed, risk, and security in the era of AI. Ben shares his perspective as a long-time practitioner in the Microsoft ecosystem, emphasizing that the security stack must evolve with each major technology shift—from on-prem to cloud to AI.</p><p>The conversation focuses on how to help customers achieve "data readiness" for AI adoption, particularly stressing that organizational discipline (like good compliance) is the fastest path to realizing AI's ROI. Ben reveals that the biggest concern he hears from enterprise customers is not LLM hallucinations or bias, but the risk of a major data breach via new AI services. He explains how ProArch leverages the comprehensive Microsoft security platform to provide centralized security and identity control across data, devices, and AI agents, ensuring that user access and data governance (Purview) trickle down through the entire stack.</p><p>Finally, Ben discusses the inherent friction of his dual CISO/CTO role, explaining his philosophy of balancing rapid feature deployment with risk management by defining a secure "MVP" baseline and incrementally layering on controls as product maturity and risk increase.</p><p><strong>About Ben Wilcox</strong></p><p>Ben Wilcox<strong> </strong>is the Chief Technology Officer and Chief Information Security Officer at ProArch, where he leads global strategy for cloud modernization, cybersecurity, and AI enablement. With over two decades of experience architecting secure digital transformations, Ben helps enterprises innovate responsibly while maintaining compliance and resilience. He’s recently guided Fortune 500 clients through AI adoption and zero-trust initiatives, ensuring that security evolves in step with rapid technological change.</p><p><strong>Episode Links</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.proarch.com/">https://www.proarch.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/ben-wilcox/">https://www.linkedin.com/in/ben-wilcox/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://ignite.microsoft.com/en-US/home">https://ignite.microsoft.com/en-US/home</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2325846</link>
      <enclosure url="https://content.rss.com/episodes/266257/2325846/modern-cyber-with-jeremy-snyder/2025_11_13_13_51_16_a3224d17-7e63-4296-9bd6-f45bc419f6f4.mp3" length="37828143" type="audio/mpeg"/>
      <guid isPermaLink="false">f1901ce2-2c66-4729-a162-3a843deec67d</guid>
      <itunes:duration>2364</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Nov 2025 15:53:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251113_011147_18a36bf1b21e99e1bbaa71db566a0491.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 13th November 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 13th November 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, Jeremy covers seven significant stories and academic findings that reveal the escalating risks and new attack methods targeting Large Language Models (LLMs) and the broader AI ecosystem.</p><p>Key stories include:</p><ul><li><strong>Prompt Flux Malware:</strong> Google Threat Intelligence Group (GTAG) discovered a new malware family called <strong>Prompt Flux</strong> that uses the <strong>Google Gemini API</strong> to continuously rewrite and modify its own behavior to evade detection—a major evolution in malware capabilities.</li><li><strong>ChatGPT Leak:</strong> User interactions and conversations with <strong>ChatGPT</strong> have been observed leaking into <strong>Google Analytics</strong> and the <strong>Google Search Console</strong> on third-party websites, potentially exposing the context of user queries.</li><li><strong>Traffic Analysis Leaks:</strong> New research demonstrates that observers can deduce the <strong>topics of a conversation in an LLM chatbot</strong> with high accuracy simply by analyzing the <strong>size and frequency of encrypted network packets</strong> (token volume), even without decrypting the data.</li><li><strong>Secret Sprawl:</strong> An analysis by Wiz found that several of the world's largest AI companies are leaking secrets and credentials in their public <strong>GitHub repositories</strong>, underscoring that the speed of AI development is leading to basic, repeatable security mistakes.</li><li><strong>Non-Deterministic LLMs:</strong> Research from Anthropic highlights that LLMs are <strong>non-deterministic</strong> and highly unreliable in describing their own internal reasoning processes, giving inconsistent responses even to minor prompt variations.</li><li><strong>The New AI VSS:</strong> The <strong>OWASp Foundation</strong> unveiled the <strong>AI Vulnerability Scoring System (AI VSS)</strong>, a new framework to consistently classify and quantify the severity (on a 0-10 scale) of risks like prompt injection in LLMs, helping organizations make better risk-informed decisions.</li></ul><p>Episode Links:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cybersecuritynews.com/promptflux-malware-using-gemini-api/">https://cybersecuritynews.com/promptflux-malware-using-gemini-api/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://thehackernews.com/2025/11/microsoft-uncovers-whisper-leak-attack.html">https://thehackernews.com/2025/11/microsoft-uncovers-whisper-leak-attack.html</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arstechnica.com/ai/2025/11/llms-show-a-highly-unreliable-capacity-to-describe-their-own-internal-processes/">https://arstechnica.com/ai/2025/11/llms-show-a-highly-unreliable-capacity-to-describe-their-own-internal-processes/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://futurism.com/artificial-intelligence/llm-robot-vacuum-existential-crisis">https://futurism.com/artificial-intelligence/llm-robot-vacuum-existential-crisis</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.scworld.com/resource/owasp-global-appsec-new-ai-vulnerability-scoring-system-unveiled">https://www.scworld.com/resource/owasp-global-appsec-new-ai-vulnerability-scoring-system-unveiled</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arstechnica.com/tech-policy/2025/11/oddest-chatgpt-leaks-yet-cringey-chat-logs-found-in-google-analytics-tool/">https://arstechnica.com/tech-policy/2025/11/oddest-chatgpt-leaks-yet-cringey-chat-logs-found-in-google-analytics-tool/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/">https://www.securityweek.com/many-forbes-ai-50-companies-leak-secrets-on-github/</a> </p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2325776</link>
      <enclosure url="https://content.rss.com/episodes/266257/2325776/modern-cyber-with-jeremy-snyder/2025_11_13_12_28_32_67a27a7a-166a-4dea-b2a5-f139c6be06aa.mp3" length="15021807" type="audio/mpeg"/>
      <guid isPermaLink="false">7a114e8c-2a9e-43de-b867-e33c68f264ef</guid>
      <itunes:duration>938</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Nov 2025 12:44:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251113_121118_9f7bfbb33a09fcbaf80dc6b2e96a4a82.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 6th November 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 6th November 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, Jeremy looks at three compelling stories and a significant academic paper that illustrate the accelerating convergence of AI, APIs, and network security.</p><p>API Exposure in AI Services: We discuss a path traversal vulnerability that led to the discovery of 3,000 API keys in a managed AI hosting service, underscoring that the API remains the exposed attack surface where data exfiltration occurs.</p><p>AI Code Agent Traffic Analysis: Drawing on research from Chaser Systems, Jeremy breaks down the network traffic from popular AI coding agents (like Copilot and Cursor). The analysis reveals that sensitive data, including previous conversation context and PII, is repeatedly packaged and resent with every subsequent request, making detection and leakage risk significantly higher.</p><p>LLM-Powered Malware: We cover a groundbreaking discovery by the Microsoft Incident Response Team (DART): malware using the OpenAI Assistants API as its Command and Control (C2) server. This new category of malware replaces traditional hard-coded instructions with an LLM-driven "brain," giving it the potential to coordinate malicious activity with context, creativity, and adaptability.</p><p>The Guardrail Fallacy: Finally, Jeremy discusses an academic paper showing that strong, adaptive attacks can bypass LLM defenses against Jailbreaks and Prompt Injections with an Attack Success Rate (ASR) of over 90%. The research argues that simple guardrails provide organizations with a dangerous false sense of security.</p><p><strong>Episode Links</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://chasersystems.com/blog/what-data-do-coding-agents-send-and-where-to/">https://chasersystems.com/blog/what-data-do-coding-agents-send-and-where-to/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://embracethered.com/blog/posts/2025/claude-abusing-network-access-and-anthropic-api-for-data-exfiltration/">https://embracethered.com/blog/posts/2025/claude-abusing-network-access-and-anthropic-api-for-data-exfiltration/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arxiv.org/pdf/2510.09023">https://arxiv.org/pdf/2510.09023</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/11/03/sesameop-novel-backdoor-uses-openai-assistants-api-for-command-and-control/">https://www.microsoft.com/en-us/security/blog/2025/11/03/sesameop-novel-backdoor-uses-openai-assistants-api-for-command-and-control/</a></p><p>------</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2312319</link>
      <enclosure url="https://content.rss.com/episodes/266257/2312319/modern-cyber-with-jeremy-snyder/2025_11_06_14_22_38_cf039145-808e-4d62-bb2f-996b964055b2.mp3" length="15194005" type="audio/mpeg"/>
      <guid isPermaLink="false">3b88a1b5-9df1-462e-8b47-56379f32b337</guid>
      <itunes:duration>949</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Nov 2025 14:25:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251106_021127_c3cced3c72459b205c775f1c542f7995.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 30th October 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 30th October 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, Jeremy focuses on two rapidly evolving areas of AI security: the APIs that empower AI services and the risks emerging from new AI Browsers.</p><p>We analyze two stories highlighting the exposure of secrets and sensitive data:</p><p><strong>API Insecurity</strong>: A path traversal vulnerability was discovered in the APIs powering an MCP server hosting service, leading to the exposure of 3,000 API keys. This reinforces the lesson that foundational security mistakes, such as inadequate secret management and unpatched vulnerabilities, are being repeated in the rush to launch new AI services.</p><p><strong>CVE in Google Cloud Vertex AI: </strong>We discuss a confirmed CVE in Google's Vertex AI service APIs. This vulnerability briefly allowed requests made by one customer's application to be routed and responded to another customer's account, risking exposure of sensitive corporate data and intellectual property in a multi-tenant SaaS environment.</p><p>Finally, we explore the risks of AI Browsers (like the ChatGPT Atlas or Perplexity Comet browser) and AI Sidebars. These agents, designed to act with agency on a user's behalf (e.g., price comparison), are vulnerable to techniques that can reveal sensitive PII and user credentials to malicious websites, or unwittingly download malware.</p><p>Episode Links</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.gitguardian.com/breaking-mcp-server-hosting/https://cloud.google.com/support/bulletins#gcp-2025-059">https://blog.gitguardian.com/breaking-mcp-server-hosting/https://cloud.google.com/support/bulletins#gcp-2025-059</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://fortune.com/2025/10/23/cybersecurity-vulnerabilities-openai-chatgpt-atlas-ai-browser-leak-user-data-malware-prompt-injection/">https://fortune.com/2025/10/23/cybersecurity-vulnerabilities-openai-chatgpt-atlas-ai-browser-leak-user-data-malware-prompt-injection/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securityboulevard.com/2025/10/news-alert-squarex-reveals-new-browser-threat-ai-sidebars-cloned-to-exploit-user-trust/">https://securityboulevard.com/2025/10/news-alert-squarex-reveals-new-browser-threat-ai-sidebars-cloned-to-exploit-user-trust/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://techcrunch.com/2025/10/25/the-glaring-security-risks-with-ai-browser-agents/">https://techcrunch.com/2025/10/25/the-glaring-security-risks-with-ai-browser-agents/</a></p><p>____________</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo"><strong>Book a demo of FireTail's AI Security &amp; Governance Platform</strong></a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2298940</link>
      <enclosure url="https://content.rss.com/episodes/266257/2298940/modern-cyber-with-jeremy-snyder/2025_10_30_10_32_09_90f8c8dc-ff11-41af-b9d7-59e9c8e2a50b.mp3" length="10458529" type="audio/mpeg"/>
      <guid isPermaLink="false">d603ff31-4728-4d8d-936b-ef05105e0d03</guid>
      <itunes:duration>653</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 Oct 2025 10:35:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251030_101001_5cd7699659df0284e1bed3c34a9c07ab.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 23rd October 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 23rd October 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode, recorded live from the inaugural AI Security Summit hosted by Snyk, Jeremy reports on the latest threats and strategic discussions shaping the industry. Covering multiple instances of "old risks" reappearing in new AI contexts...</p><p>The Salesforce "forced leak" vulnerability, where an AI agent was exposed to malicious prompt injection via seemingly innocuous text fields on web forms (a failure of input sanitization).</p><p>Research from Nvidia detailing waterhole attacks where malicious code (e.g., PowerShell) is hidden in decoy libraries (like "react-debug") that AI coding assistants might suggest to developers.</p><p>A consumer AI girlfriend app that exposed customer chat data by storing conversations in an open Apache Kafka pipeline, demonstrating a basic failure of security hygiene under the pressure of rapid AI development.</p><p>The "Glass Worm" campaign, where invisible Unicode control characters (similar to Ascii Smuggling research by Firetail) were used to embed malware in a VS Code plugin, proving the invisible code risk is actively being leveraged in development tools.</p><p>Finally, Jeremy shares strategic insights from the summit, including the massive projected growth of the AI market (approaching the size of cloud computing), the urgency of data readiness and governance to prevent model poisoning, and the futurist perspective that AI's accelerated skill acquisition (potentially surpassing humans in certain tasks in an 18-month cycle) will require human workers to constantly upskill and change roles more frequently.</p><p>Episode Links</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://noma.security/blog/forcedleak-agent-risks-exposed-in-salesforce-agentforce/">https://noma.security/blog/forcedleak-agent-risks-exposed-in-salesforce-agentforce/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace">https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://developer.nvidia.com/blog/from-assistant-to-adversary-exploiting-agentic-ai-developer-tools/">https://developer.nvidia.com/blog/from-assistant-to-adversary-exploiting-agentic-ai-developer-tools/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.foxnews.com/tech/ai-girlfriend-apps-leak-millions-private-chats">https://www.foxnews.com/tech/ai-girlfriend-apps-leak-millions-private-chats</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://layerxsecurity.com/blog/cometjacking-how-one-click-can-turn-perplexitys-comet-ai-browser-against-you/">https://layerxsecurity.com/blog/cometjacking-how-one-click-can-turn-perplexitys-comet-ai-browser-against-you/</a></p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. <a target="_blank" rel="noopener noreferrer nofollow" href="/request-a-demo"><strong>Book a demo of Firetail's AI Security &amp; Governance Platform</strong></a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2286880</link>
      <enclosure url="https://content.rss.com/episodes/266257/2286880/modern-cyber-with-jeremy-snyder/2025_10_23_09_04_34_33c5d5d2-d16c-4fb7-9e14-7ce179f5034d.mp3" length="17806670" type="audio/mpeg"/>
      <guid isPermaLink="false">e5a9d241-dd9e-4667-9eb9-6d6e48079d7e</guid>
      <itunes:duration>1112</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Oct 2025 09:07:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251023_091021_7ac4467409359d01c63e793ceab0f516.png"/>
    </item>
    <item>
      <title><![CDATA[Chris Farris of fwd:cloudsec]]></title>
      <itunes:title><![CDATA[Chris Farris of fwd:cloudsec]]></itunes:title>
      <description><![CDATA[<p>In this special in-person episode of Modern Cyber, recorded at fwd:cloudsec Europe, Jeremy is joined by cloud security expert and conference organizer Chris Farris. Drawing on his over 30 years in IT, Chris recounts his journey into cloud security, from his early days with Linux to moving video archives to AWS S3. The conversation revisits the foundational mindset shifts that occurred with the rise of the cloud, focusing on the agility it brought and the security gaps it created, such as the transition from rigid, on-premises governance to the chaotic freedom of API calls and ClickOps.</p><p>The core of the episode explores the concept of the Sovereign Cloud, specifically Amazon's intended European Sovereign Cloud. Chris clarifies that simple data residency is not true sovereignty due to the US Cloud Act. He details the unique nature of the European partition—a completely separate partition, billing system, and support staff operated only by EU citizens—and identifies the primary flaw: the lack of a legal statute protecting the European employees from being compelled to act under the Cloud Act. Finally, Chris shares a powerful reflection on the fwd:cloudsec community, calling it a "second cloud family".</p><p>Guest Bio</p><p>Chris Farris is a highly experienced IT professional with a career spanning over 25 years. During this time, he has focused on various areas, including Linux, networking, and security. For the past eight years, he has been deeply involved in public-cloud and public-cloud security in media and entertainment, leveraging his expertise to build and evolve multiple cloud security programs.</p><p>Chris is passionate about enabling the broader security team’s objectives of secure design, incident response, and vulnerability management. He has developed cloud security standards and baselines to provide risk-based guidance to development and operations teams. As a practitioner, he has architected and implemented numerous serverless and traditional cloud applications, focusing on deployment, security, operations, and financial modeling.</p><p>He is one of the organizers of the fwd:cloudsec conference and presented at various AWS conferences and BSides events. He was named one of the inaugural AWS Security Heroes. Chris shares his insights on security and technology on social media platforms like BlueSky, Mastodon and his website<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWVEaWRfbmdjYVBfS1cyQkdjbmlHcFVtVzEyQXxBQ3Jtc0tsY1NZa1lMYWctUlVaejhWMEdQUzRrMzV2NTEteFNobTRlQXl6WlZUQ3N4dmw4ZWE3TUhGVXQxN1lzV2dBVlV0WE5vVUhCUDRUTW1RWGVsZ0l5c0dCaGthYVgwTzdER2FGeHoyTmlnS05pRk5GNDRhcw&amp;q=https%3A%2F%2Fwww.chrisfarris.com%2F&amp;v=yltcHjqMAeU"> </a><a target="_blank" rel="noopener noreferrer nofollow" href="http://chrisfarris.com">chrisfarris.com</a>.</p><p>Episode Links<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa0o3ZkJYMkIza2M1ejVzczdrb1lfUVVoeFVSUXxBQ3Jtc0tsS3MyNklnNjE0a0hXMlFtdW42Z3FwTlZhazNfQTd5ZmVHZlgyODRoMDFIc0Y4U3Z1UzdwblRYRFU4TU01T0x5SnF1RlZ0T2xoMC13TVI2ZDZnajJ6Q1hiRFFFTm51M3VNbXB0bldNV1pqdm1YTkoyRQ&amp;q=https%3A%2F%2Ffwdcloudsec.org%2F&amp;v=yltcHjqMAeU">‍</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://fwdcloudsec.org">https://fwdcloudsec.org</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://fwdcloudsec.org/forum/">https://fwdcloudsec.org/forum/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.chrisfarris.com">https://www.chrisfarris.com</a></p><p></p><p>Discover all of your Shadow AI now</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">Book a demo of Firetail's AI Security &amp; Governance Platform.</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2274391</link>
      <enclosure url="https://content.rss.com/episodes/266257/2274391/modern-cyber-with-jeremy-snyder/2025_10_16_11_24_39_cb0508de-6adb-4bcf-b267-9ba7a3a9bd96.mp3" length="48611439" type="audio/mpeg"/>
      <guid isPermaLink="false">529c4758-f0cf-486d-bf5e-649e63acc79c</guid>
      <itunes:duration>3038</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 21 Oct 2025 11:47:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251016_111002_5e65c682ca4d3c1aafdef4a435e47941.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 16 October 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 16 October 2025]]></itunes:title>
      <description><![CDATA[<p>In this week's episode of <em>This Week in AI Security</em>, Jeremy covers four key developments shaping the AI security landscape.</p><p>Jeremy begins by analyzing a GitHub Copilot flaw that exposed an LLM vulnerability similar to the one Jeremy disclosed last week. Researchers were able to use a hidden code comment feature to smuggle malicious prompts into the LLM, allowing them to potentially exfiltrate secrets and source code from private repositories. This highlights a growing risk in how LLMs process different input formats.</p><p>Next, we discuss a fascinating research paper demonstrating the effectiveness of data poisoning. The study found that corrupting a model's behavior was possible with as few as 250 malicious documents—even in models with large training sets. By embedding a malicious command that mimicked sudo, researchers could implement a backdoor that sends data out, proving that the Attack Success Rate (ASR) is a critical metric for this real-world threat.</p><p>We then examine a story at the intersection of agentic AI and supply chain risk, where untrusted actors exploited vulnerabilities in AI development plugins. By intercepting system prompts that lacked proper encryption, an attacker could discover the agent's permissions and potentially exfiltrate sensitive data, including Windows NTLM credentials.</p><p>Finally, we look at the latest State of AI report, which provides further confirmation that LLMs like Claude are being used by malicious actors—specifically suspected North Korean state actors—to "vibe hack" the hiring process. By using AI to create perfect-looking resumes and tailored interview responses, the traditional method of spotting phony candidates by poor text quality is no longer reliable.</p><p><strong>Episode Links:</strong></p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/">https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.anthropic.com/research/small-samples-poison">https://www.anthropic.com/research/small-samples-poison</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://versprite.com/blog/watch-who-you-open-your-door-to-in-ai-times/">https://versprite.com/blog/watch-who-you-open-your-door-to-in-ai-times/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://excitech.substack.com/p/16-highlights-from-the-state-of-ai">https://excitech.substack.com/p/16-highlights-from-the-state-of-ai</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.stateof.ai/">https://www.stateof.ai/</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/blog/we-interviewed-north-korean-hacker-heres-what-learned">https://www.firetail.ai/blog/we-interviewed-north-korean-hacker-heres-what-learned</a></li></ul><p>Discover all of your Shadow AI now...</p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">Book a demo of Firetail's AI Security &amp; Governance Platform.</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2274218</link>
      <enclosure url="https://content.rss.com/episodes/266257/2274218/modern-cyber-with-jeremy-snyder/2025_10_16_08_09_59_b445bcf7-9e85-42a5-a906-eb110db2fc06.mp3" length="8740299" type="audio/mpeg"/>
      <guid isPermaLink="false">fc004fa4-eca0-43a3-8eca-8b945d4f2b40</guid>
      <itunes:duration>546</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 21 Oct 2025 11:47:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251016_081051_3d6c1eb256a144e97bde647f6c303521.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 9th Oct 2025]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 9th Oct 2025]]></itunes:title>
      <description><![CDATA[<p>In this very first episode of 'This Week in AI Security', brought to you by the Firetail team, Jeremy dives into three crucial stories from the past week that highlight the rapidly evolving security landscape of AI adoption. </p><p>We start with a classic error: a contractor for the Australian State of New South Wales repeated the "open S3 bucket" mistake by uploading a sensitive data set to a generative AI platform, confirming that old security missteps are resurfacing with new technology. </p><p>Next, we look at a win for the defense: how Microsoft's AI analysis tools blocked a sophisticated phishing campaign that used AI-generated malicious code embedded in an SVG file and was sent from a compromised small business—a clear proof that AI can be very useful on the defensive side. </p><p>Finally, we discuss recent research from the Firetail team uncovering an ASCII Smuggling vulnerability in Google Gemini, Grok, and other LLMs. This technique uses hidden characters to smuggle malicious instructions into benign-looking prompts (e.g., in emails or calendar invites). We detail the surprising dismissal of this finding by Google, which highlights the urgent need to address common, yet serious, social engineering risks in the new age of LLMs. </p><p>Show links: </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://databreaches.net/2025/10/06/nsw-gov-contractor-uploaded-excel-spreadsheet-of-flood-victims-data-to-chatgpt/">https://databreaches.net/2025/10/06/nsw-gov-contractor-uploaded-excel-spreadsheet-of-flood-victims-data-to-chatgpt/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.infosecurity-magazine.com/news/ai-generated-code-phishing/">https://www.infosecurity-magazine.com/news/ai-generated-code-phishing/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/blog/ghosts-in-the-machine-ascii-smuggling-across-various-llms">https://www.firetail.ai/blog/ghosts-in-the-machine-ascii-smuggling-across-various-llms</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html">https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html</a> </p><p>________ </p><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2262818</link>
      <enclosure url="https://content.rss.com/episodes/266257/2262818/modern-cyber-with-jeremy-snyder/2025_10_09_15_19_58_392fa4e3-70e0-4c4f-a729-e7d3070c9136.mp3" length="7864257" type="audio/mpeg"/>
      <guid isPermaLink="false">867ace9f-1528-4f93-9faf-68fcf17c6bcc</guid>
      <itunes:duration>491</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Oct 2025 15:35:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251009_031052_b8306eef22693680c7a566e73b498827.png"/>
    </item>
    <item>
      <title><![CDATA[Noora Ahmed-Moshe of Hoxhunt]]></title>
      <itunes:title><![CDATA[Noora Ahmed-Moshe of Hoxhunt]]></itunes:title>
      <description><![CDATA[<p>In this special in-person episode of Modern Cyber, recorded in Helsinki, Jeremy Snyder sits down with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt, for a critical discussion on the evolving human risk in cybersecurity. Noora shares her unique perspective on the intersection of human psychology, technological advancement, and defense, stressing that people are not the <em>problem</em>, but the final, essential layer of defense. The conversation dives into Hoxhunt's research, which revealed that AI-powered phishing agents have become significantly more effective than elite human red teams at creating successful spear phishing attacks. Noora discusses how Hoxhunt is fighting AI with AI, using gamification and positive reinforcement, rather than fear and punishment, to train users against increasingly sophisticated threats like deepfakes and highly personalized social engineering. Finally, she offers guidance on how organizations must abandon compliance-only training and embrace change to build a strong, psychologically safe security culture that can withstand the accelerating AI threat landscape.</p><p>Guest Bio – Noora Ahmed-Moshe</p><p>Noora is the Vice President of Strategy and Operations at Hoxhunt, where she works with internal teams, customers, and partners to develop the future of Human Risk Management. With a strong focus on the human side of cybersecurity, she is an advocate for the importance of culture in driving secure behaviours, and in bridging the gap between technology and human interaction. Noora’s career spans 20 years of digital product and strategy development across industries in the UK and in Finland. Hoxhunt Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://hoxhunt.com/">https://hoxhunt.com/</a></p><p>AI Powered Phishing Outperforms Elite Cybercriminals in 2025- <a target="_blank" rel="noopener noreferrer nofollow" href="https://hoxhunt.com/blog/ai-powered-phishing-vs-humans">https://hoxhunt.com/blog/ai-powered-phishing-vs-humans</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2250924</link>
      <enclosure url="https://content.rss.com/episodes/266257/2250924/modern-cyber-with-jeremy-snyder/2025_10_03_04_58_42_1277c7bb-16d7-4bcb-973c-52589ac9d837.mp3" length="40047104" type="audio/mpeg"/>
      <guid isPermaLink="false">1d328c6c-aafc-4a62-8cb3-c0a9306f547d</guid>
      <itunes:duration>2502</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 Oct 2025 11:40:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251003_041057_fe119af94ddeb3ea13ef896b98cff23f.png"/>
    </item>
    <item>
      <title><![CDATA[Joe Carson of Segura]]></title>
      <itunes:title><![CDATA[Joe Carson of Segura]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Joseph Carson, Chief Security Evangelist and Advisory CISO at Segura. With over 30 years of experience, Joe shares insights from his latest research into AI-powered threats, from flawless phishing in complex languages to chatbot-driven fraud and automated data analysis. He explains how attackers are accelerating operations with machine learning, what that means for enterprises and governments alike, and why resilience depends on awareness, identity protection, and continuous innovation.</p><p><strong>Guest Bio – Joseph Carson</strong></p><p>Joseph Carson is Chief Security Evangelist and Advisory CISO at Segura, where he helps organizations worldwide strengthen identity security and build resilient cyber defense strategies. An award-winning cybersecurity leader with more than three decades of experience, Joe has advised governments, critical infrastructure, and global enterprises. He is the author of Cybersecurity for Dummies, read by over 50,000 professionals, and a regular contributor to leading outlets including The Wall Street Journal and Dark Reading. Joe also hosts the podcast Security by Default and is a frequent keynote speaker on identity and AI-driven threats.</p><p>Security by Default Podcast - <a target="_blank" rel="noopener noreferrer nofollow" href="https://open.spotify.com/show/0mzN5M5CkFVLn8fq5TnH0O">https://open.spotify.com/show/0mzN5M5CkFVLn8fq5TnH0O</a></p><p>Joseph on Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/josephcarson/">https://www.linkedin.com/in/josephcarson/</a></p><p>Segura Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://segura.security/">https://segura.security/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2221084</link>
      <enclosure url="https://content.rss.com/episodes/266257/2221084/modern-cyber-with-jeremy-snyder/2025_09_18_11_15_10_df33e23a-40d3-4f8e-91b6-01c81fe19282.mp3" length="38842529" type="audio/mpeg"/>
      <guid isPermaLink="false">c3436d63-9954-4365-b712-f9d2117d0301</guid>
      <itunes:duration>2427</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 19 Sep 2025 12:46:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250918_110945_b25304ee7da14eb7818548131f72caf8.png"/>
    </item>
    <item>
      <title><![CDATA[Eldon Sprickerhoff of Caledon Ventures]]></title>
      <itunes:title><![CDATA[Eldon Sprickerhoff of Caledon Ventures]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy talks with Eldon Sprickerhoff, co-founder of eSentire and now strategic advisor at Caledon Ventures. Eldon reflects on his journey from starting one of the first MDR companies to mentoring the next generation of cybersecurity founders. He shares lessons from building a business in the “wild west” of early network security, insights into the evolution of MDR, and advice on balancing innovation, stress, and mental health as a founder.</p><p><strong>Guest Bio – Eldon Sprickerhoff</strong></p><p>Eldon Sprickerhoff is an acclaimed entrepreneur, advisor, and investor with deep expertise in information security, machine learning, SaaS, and finance. He co-founded eSentire, a global leader in managed detection and response, and served there for over two decades before founding Caledon Ventures, where he now advises and invests in cybersecurity startups. A graduate of the University of Waterloo, Eldon received the J.W. Graham Medal for computing and innovation and was inducted into the Waterloo Region Entrepreneur Hall of Fame in 2024. He is also the author of Committed, a candid guide for startup founders.</p><p>Eldon's Book: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/Committed-Survival-Uncommon-First-Time-Founders/dp/1738396428">https://www.amazon.com/Committed-Survival-Uncommon-First-Time-Founders/dp/1738396428</a></p><p>Caledon Ventures on Linkedin: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/company/caledon-ventures">https://www.linkedin.com/company/caledon-ventures</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2200047</link>
      <enclosure url="https://content.rss.com/episodes/266257/2200047/modern-cyber-with-jeremy-snyder/2025_09_04_20_24_06_58e2f5be-8a37-4f1b-bb4f-b5eea9e25584.mp3" length="45914855" type="audio/mpeg"/>
      <guid isPermaLink="false">a43da01a-6701-418a-a7e4-9a7f7a45c9c9</guid>
      <itunes:duration>2869</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 05 Sep 2025 15:36:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250904_080941_d610c8d92edd8525ce160095ce6dd1b7.png"/>
    </item>
    <item>
      <title><![CDATA[Dhruv Ahuja of Chaser Systems]]></title>
      <itunes:title><![CDATA[Dhruv Ahuja of Chaser Systems]]></itunes:title>
      <description><![CDATA[<p>In this special live episode recorded at fwd:cloudsec 2025 , Jeremy is joined by Dhruv Ahuja of Chaser Systems for a deep dive into the world of financial services, network evolution, and elegant security solutions. Dhruv shares his experiences working in the highly regulated financial sector and explains why many parts of the industry, like market data feeds, still rely on bespoke, low-latency infrastructure outside the cloud. The discussion also covers Dhruv's presentation on using Let's Encrypt with AWS IAM Roles Anywhere to create an interoperable, PKI-based authentication system for machines. The episode concludes with a fascinating conversation on the changing landscape of networking , the slow but steady rise of IPv6 , and the shift from IP-based to domain-based network security.</p><p><strong>Guest Bio – Dhruv Ahuja</strong></p><p>Dhruv Ahuja is a cybersecurity professional from Chaser Systems with a background in financial services and sysadmin roles in London. He specializes in network and cloud security, focusing on building user-friendly products that prioritize usability for developers and security teams. A strong advocate for interoperability and open-source protocols, Dhruv is known for his work leveraging asymmetric cryptography and has presented on topics like using Let's Encrypt with AWS IAM Roles Anywhere to create secure, elegant authentication solutions. He has extensive experience with the unique security demands of financial institutions , from low-latency market data feeds to retail banking operations.</p><p>Chaser Systems - <a target="_blank" rel="noopener noreferrer nofollow" href="https://chasersystems.com/">https://chasersystems.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2178238</link>
      <enclosure url="https://content.rss.com/episodes/266257/2178238/modern-cyber-with-jeremy-snyder/2025_08_22_06_14_36_e6530af7-8356-4c15-a240-140c2edb7f7a.mp3" length="29801254" type="audio/mpeg"/>
      <guid isPermaLink="false">4dfae77f-e930-4338-96c8-34e1536a7b61</guid>
      <itunes:duration>1862</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 02 Sep 2025 15:22:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250822_060818_22bc6c5fc06652819e79b14da6e71320.png"/>
    </item>
    <item>
      <title><![CDATA[Jason Kao of Fog Security]]></title>
      <itunes:title><![CDATA[Jason Kao of Fog Security]]></itunes:title>
      <description><![CDATA[<p>Recorded live at fwd:cloudsec 2025, this episode of Modern Cyber features a conversation between Jeremy and Jason Kao, founder of FoxSecurity. Drawing from his experience across enterprises, startups, and cloud security consulting, Jason unpacks the growing complexity of IAM in the cloud—focusing on the “duplicitous” nature of AWS permissions and the challenges in enforcing effective data perimeters.</p><p>The two explore the shift from traditional network boundaries to identity-based security models, and Jason shares practical takeaways for organizations looking to improve IAM strategy in the face of sprawling permissions and conflicting access controls.</p><p><strong>Guest Bio – Jason Kao:</strong></p><p>Jason Kao is the founder of FoxSecurity, a new company focused on solving data perimeter and cloud ransomware challenges. His career spans engineering roles at Cisco and Fidelity Investments, offensive security consulting at Praetorian, security research at CloudQuery, and now startup leadership. Jason is a regular speaker at security conferences like fwd:cloudsec, where he shares deep research and practical insights into complex topics like IAM, cloud architecture, and data protection.</p><p>Fog Security - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.fogsecurity.io/">https://www.fogsecurity.io/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2148303</link>
      <enclosure url="https://content.rss.com/episodes/266257/2148303/modern-cyber-with-jeremy-snyder/2025_08_02_17_56_21_2087e098-281f-4a18-98f6-eaa999571b46.mp3" length="28656038" type="audio/mpeg"/>
      <guid isPermaLink="false">3ce0d5a2-670f-47d7-a74d-cad9f7eda48a</guid>
      <itunes:duration>1790</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 07 Aug 2025 18:17:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250802_050854_90a5c2c0d78c69c27464660f17a4f6f3.png"/>
    </item>
    <item>
      <title><![CDATA[Toni de la Fuente of Prowler]]></title>
      <itunes:title><![CDATA[Toni de la Fuente of Prowler]]></itunes:title>
      <description><![CDATA[<p>Recorded live at fwd:cloudsec 2025, this episode of Modern Cyber features Toni de la Fuente, founder of Prowler, one of the most widely adopted open source cloud security tools. Toni joins Jeremy to reflect on nearly a decade of building in the cloud security space, sharing the origin story of Prowler, lessons from maintaining open source software, challenges in cloud forensics, and the evolving threat landscape. They also explore how AI, platform complexity, and compliance frameworks are shaping the next generation of cloud security. </p><p><strong>About Toni de la Fuente</strong></p><p>Toni de la Fuente is the founder of Prowler, the open source cloud security tool designed to help organizations improve their cloud security posture. With over 25 years of experience in cybersecurity and more than a decade focused on cloud, Toni has held roles across blue, red, and purple teams, including time at AWS. A passionate open source advocate and Iron Maiden fan, Toni built Prowler to automate cloud configuration checks and make security accessible to all. </p><p>Prowler Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://prowler.com/">https://prowler.com/</a> </p><p>Prowler on GitHub: <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/prowler-cloud/prowler">https://github.com/prowler-cloud/prowler</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2135855</link>
      <enclosure url="https://content.rss.com/episodes/266257/2135855/modern-cyber-with-jeremy-snyder/2025_07_24_14_53_23_17f97814-8a15-4d43-a8c4-c41e4e8c4fe8.mp3" length="34410506" type="audio/mpeg"/>
      <guid isPermaLink="false">b9065b3b-8503-457e-89bb-07af50e0538c</guid>
      <itunes:duration>2150</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 25 Jul 2025 13:54:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250724_020703_c03da14b36e4ed9de846ef337ddceee3.png"/>
    </item>
    <item>
      <title><![CDATA[Kyler Middleton & Sai Gunaranjan]]></title>
      <itunes:title><![CDATA[Kyler Middleton & Sai Gunaranjan]]></itunes:title>
      <description><![CDATA[<p>In this special episode recorded at fwd:cloudsec 2025 in Denver, Jeremy sits down with two cloud leaders from Veradigm: Kyler Middleton and Sai Gunaranjan. The duo shares insights from their joint talk on securing AI usage in enterprise platforms, highlighting real-world challenges around governance, model usage, data sovereignty, and developer enablement.</p><p>With the health tech industry as a backdrop, they reflect on balancing innovation with control, managing AI risks, and fostering collaboration between platform engineering and governance teams. This episode is a timely and practical look at the realities of secure AI adoption in modern organizations.</p><p><strong>Guest Bio – Kyler Middleton</strong></p><p>Kyler Middleton is the Principal Internal AI Developer at Veradigm, where she leads internal AI development initiatives with a focus on enablement, experimentation, and responsible model usage. A passionate technologist, Kyler works closely with platform and security teams to ensure AI is integrated thoughtfully and securely into enterprise workflows.</p><p><strong>Guest Bio – Sai Gunaranjan</strong></p><p>Sai Gunaranjan is the Lead Architect for the Veradigm Cloud Platform, with a focus on Azure technologies and scalable platform governance. He plays a key role in enabling secure AI experimentation and implementation across Veradigm’s healthcare-focused products, combining deep cloud expertise with a pragmatic approach to compliance and risk mitigation.</p><p>Kyler on Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/kylermiddleton">https://www.linkedin.com/in/kylermiddleton</a></p><p>Sai on Linked - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/saigunaranjan">https://www.linkedin.com/in/saigunaranjan</a></p><p>Let's Do DevOps - <a target="_blank" rel="noopener noreferrer nofollow" href="http://letsdodevops.com/">http://letsdodevops.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2110278</link>
      <enclosure url="https://content.rss.com/episodes/266257/2110278/modern-cyber-with-jeremy-snyder/2025_07_11_11_37_27_049224f8-f9d7-4782-b47a-c34a826d9b71.mp3" length="23909316" type="audio/mpeg"/>
      <guid isPermaLink="false">ddbe3411-5aa5-415c-9600-377f54f8e3ee</guid>
      <itunes:duration>1494</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 11 Jul 2025 15:57:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250711_110711_e61be17ad85f7229455f454fb5a299bb.png"/>
    </item>
    <item>
      <title><![CDATA[Celina Stewart of Neuvik]]></title>
      <itunes:title><![CDATA[Celina Stewart of Neuvik]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Celina Stewart, Director of Cyber and AI Risk Management at Neuvik, for a wide-ranging discussion on how cybersecurity findings are best translated into business risk—and why most organizations still struggle with that step. Celina draws on her background in consulting, offensive security, and M&amp;A due diligence to explore common missteps in cloud migrations, hidden AI risks most companies overlook, and how to prioritize remediation in real-world, high-pressure situations. Plus, she shares her perspective on what’s coming next in AI attacks, including a deep dive into memory injection.</p><p><strong>Guest Bio – Celina Stewart:</strong></p><p>Celina Stewart is the Director of Cyber and AI Risk Management at Neuvik, where she helps organizations design and optimize cybersecurity programs through a risk-based lens. Before joining Neuvik, Celina was a founding member of McKinsey &amp; Company’s cybersecurity practice, advising Fortune 500 companies on strategy, program performance, and enterprise risk integration. Her insights have been published in McKinsey on Risk and other leading outlets, and she’s a regular speaker at conferences including the AI Risk Summit, HackRedCon, and ACSAC. Celina holds an MBA and an MS in Design Innovation from Northwestern’s Kellogg School of Management.</p><p>Neuvik Webiste - <a target="_blank" rel="noopener noreferrer nofollow" href="http://www.neuvik.com">www.neuvik.com</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2090198</link>
      <enclosure url="https://content.rss.com/episodes/266257/2090198/modern-cyber-with-jeremy-snyder/2025_06_26_13_00_48_cad8f783-071b-4655-b74b-7050e121061a.mp3" length="33055057" type="audio/mpeg"/>
      <guid isPermaLink="false">3bbb1eeb-6cd9-427f-b97a-0a3f9dbeef55</guid>
      <itunes:duration>2065</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 30 Jun 2025 21:29:10 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250626_010629_0fa9fbb54e748d27301463fc8feaebfc.png"/>
    </item>
    <item>
      <title><![CDATA[Dan Draper of CipherStash]]></title>
      <itunes:title><![CDATA[Dan Draper of CipherStash]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Dan Draper, founder and CEO of CipherStash, to unpack the complexities of modern data encryption and secure access. From searchable encryption to post-quantum cryptography, Dan explains how CipherStash is making secure data access possible without sacrificing utility. The conversation covers Zero Trust, access control philosophies, real-world encryption applications, and why most people don’t actually care about security—until it blocks a deal. This is a highly technical, yet accessible dive into how data protection is evolving in the face of increasing complexity and looming quantum threats.</p><p><strong>About Dan Draper</strong></p><p>Dan Draper is the founder and CEO of CipherStash, a data security company focused on enabling trusted access to encrypted data. An experienced cryptography engineer, Dan previously served as VP of Engineering at MedicalDirector and Expert360. His mission is to empower developers with the tools and knowledge they need to build secure, privacy-respecting applications. Dan is a leading voice in applying searchable encryption to real-world business challenges and is passionate about rethinking how organizations manage data access securely and efficiently.</p><p>Host Note: “We checked Riverside’s encryption after recording and found this: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ietf.org/id/draft-ietf-tls-ecdhe-mlkem-00.html">https://www.ietf.org/id/draft-ietf-tls-ecdhe-mlkem-00.html</a> — so quantum-safe 🙂”</p><p>CipherStash Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://cipherstash.com/">https://cipherstash.com/</a></p><p>Dan on Linkedin: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/ddraper/">https://www.linkedin.com/in/ddraper/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2050131</link>
      <enclosure url="https://content.rss.com/episodes/266257/2050131/modern-cyber-with-jeremy-snyder/2025_05_29_16_59_10_c01466cb-13c1-4c07-a1a6-03763491ebbf.mp3" length="42110144" type="audio/mpeg"/>
      <guid isPermaLink="false">442c7b92-17db-44f8-a8c0-d96c46818e6f</guid>
      <itunes:duration>2631</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 30 May 2025 05:38:11 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Stephen Hinch, author of Winning Through Innovation]]></title>
      <itunes:title><![CDATA[Stephen Hinch, author of Winning Through Innovation]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Stephen Hinch, award-winning author and longtime high-tech executive, for a wide-ranging conversation on the intersection of cybersecurity, innovation, and organizational mindset. Drawing on decades of experience at companies like HP and Agilent, Stephen shares insights into the mindset challenges facing modern cybersecurity programs, particularly in small and midsize businesses. He also discusses the real cost of complacency, how to lead innovative initiatives without compromising security, and what writing a cybersecurity book—and hiking guide—has taught him about leadership, resilience, and purpose.</p><p><strong>About Stephen Hinch</strong></p><p>Stephen W. Hinch is an experienced senior executive, award-winning author, and recognized innovator in the high-tech industry. With decades of management experience at companies like Hewlett-Packard, Agilent Technologies, and TeamLogic IT, he played a pivotal role in advancing surface mount and fiber optic technologies. He has authored five books, including the IBPA Benjamin Franklin Award-winning The Slickrock Desert, and his latest title, Winning Through Innovation: Lessons from the Front Lines of Business, is set to release in May 2025. Steve now serves as a consultant to senior executives in high tech and continues to shape industry standards and innovation. </p><p>Winning Through Innovation on Amazon: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/Winning-through-Innovation-Lessons-Business-ebook/dp/B0DXRGS99R">https://www.amazon.com/Winning-through-Innovation-Lessons-Business-ebook/dp/B0DXRGS99R</a> </p><p>The Slickrock Desert on Amazon: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/Slickrock-Desert-Discovery-Endangered-Wilderness/dp/0966199901">https://www.amazon.com/Slickrock-Desert-Discovery-Endangered-Wilderness/dp/0966199901</a> </p><p>Stephen's Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.stephen-w-hinch.com/">https://www.stephen-w-hinch.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2040343</link>
      <enclosure url="https://content.rss.com/episodes/266257/2040343/modern-cyber-with-jeremy-snyder/2025_05_22_12_39_13_00c16aa5-79cf-4aed-8f4b-16b5f768488d.mp3" length="37954784" type="audio/mpeg"/>
      <guid isPermaLink="false">4e7d953f-57be-4c80-b7e2-fa145d794668</guid>
      <itunes:duration>2372</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 May 2025 17:08:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250522_120547_8b8501f1d5d31e6aa328688fc7bc0eec.png"/>
    </item>
    <item>
      <title><![CDATA[Mikko Hypponen of WithSecure]]></title>
      <itunes:title><![CDATA[Mikko Hypponen of WithSecure]]></itunes:title>
      <description><![CDATA[<p>In this special in-person episode of Modern Cyber, Jeremy sits down with cybersecurity icon Mikko Hypponen at RSA Conference 2025 in San Francisco. Surrounded by the energy of the industry’s biggest event, the conversation dives into the current state of AI in security, LLMs discovering vulnerabilities, and the emerging threat of AI-powered ransomware gangs. Mikko also shares insights on geopolitics in cybersecurity—from North Korean developer infiltration to Russian ransomware operations—and reflects on Europe’s shifting trust in U.S. tech. This episode blends deep technical insight with broader industry trends and personal reflections, recorded steps away from the Moscone Center. </p><p><strong>About Mikko Hypponen: </strong></p><p>Mikko Hyppönen is a globally recognized cybersecurity expert and the Chief Research Officer at WithSecure. With over 30 years of experience in the industry, Mikko has analyzed some of the most significant malware outbreaks in history, such as Love Letter, Melissa, and Stuxnet. He is a sought-after speaker at international conferences, a TED Talk veteran, and the author of the acclaimed book If It’s Smart, It’s Vulnerable. Passionate about cybersecurity education, Mikko has been a driving force behind initiatives like the Museum of Malware Art, showcasing how digital threats can inspire artistic creativity. </p><p>Mikko's Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://mikko.com/">https://mikko.com/</a> </p><p>WithSecure Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.withsecure.com/en/home">https://www.withsecure.com/en/home</a> </p><p>Mikko's Linkedin: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/hypponen/">https://www.linkedin.com/in/hypponen/</a> </p><p>Mikko's X: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/mikko">https://twitter.com/mikko</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2019790</link>
      <enclosure url="https://content.rss.com/episodes/266257/2019790/modern-cyber-with-jeremy-snyder/2025_05_08_13_57_34_ced218f8-0d6c-44e0-9d4a-82542da13028.mp3" length="29990170" type="audio/mpeg"/>
      <guid isPermaLink="false">a3088e89-0585-43ee-94a8-fe0518fd7a2e</guid>
      <itunes:duration>1874</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 08 May 2025 16:39:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250508_010510_9429de0f66ec4106dd83f582a8599101.png"/>
    </item>
    <item>
      <title><![CDATA[Justin Rende of Rhymetec]]></title>
      <itunes:title><![CDATA[Justin Rende of Rhymetec]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Justin Rende, founder and CEO of Rhymetec, to unpack the critical differences between proactive and reactive security strategies. They dive into the realities of SaaS security, the role of compliance as both a sales enabler and a security foundation, and the importance of building security into an organization from the very beginning. With insights from thousands of audits and assessments, Justin shares practical guidance on vendor risk, developer awareness, and why a checkbox approach to compliance simply doesn’t cut it. </p><p><strong>About Justin</strong></p><p>Justin Rende is the founder and CEO of Rhymetec, a cybersecurity firm providing cybersecurity, compliance and data privacy needs to SaaS companies. With more than 20 years of experience in cybersecurity, Justin has focused exclusively on developing the most innovative and customizable cybersecurity solutions for modern SaaS-based companies. Since founding the company in 2015, Justin has led Rhymetec’s growth to more than 35 full-time employees, without outsourcing any of its services, and has served more than 1,000 clients ranging from startups to large enterprises. </p><p>Rhymetec Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://rhymetec.com/">https://rhymetec.com/</a> </p><p>Justin on Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/justin-rende/">https://www.linkedin.com/in/justin-rende/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2010324</link>
      <enclosure url="https://content.rss.com/episodes/266257/2010324/modern-cyber-with-jeremy-snyder/2025_05_01_09_12_17_f52cf389-e55a-492c-b458-6e1eac2bf3ca.mp3" length="30923047" type="audio/mpeg"/>
      <guid isPermaLink="false">f4f1ebae-aac1-424b-9907-675cf4ef9336</guid>
      <itunes:duration>1932</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 May 2025 20:34:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250501_090556_ba28b288451a2711391edf84269d6592.png"/>
    </item>
    <item>
      <title><![CDATA[Joe Erle of the Ransomware Rewind Podcast]]></title>
      <itunes:title><![CDATA[Joe Erle of the Ransomware Rewind Podcast]]></itunes:title>
      <description><![CDATA[<p>In this special crossover episode of Modern Cyber and the Ransomware Rewind podcast, Jeremy teams up with Joe Erle for a wide-ranging discussion on API security, ransomware threats, and the changing landscape of cyber insurance. From dissecting real-world examples like the MOVEit vulnerability to breaking down how ransomware negotiations really work, this episode blends technical insight with practical guidance. Whether you're a defender thinking about supply chain risk or a business leader evaluating your cyber insurance policy, this one’s packed with useful takeaways.</p><p><strong>About Joe Erle</strong></p><p>Joe Erle is the host of the Ransomware Rewind podcast and a cybersecurity insurance expert at C3 Insurance. With years of experience helping organizations navigate the complexities of cyber risk, Joe brings deep knowledge of incident response, policy coverage, and ransomware negotiation. Through his podcast and professional work, he provides actionable insights on current threats, trends, and how companies can better protect themselves.</p><p>Ransomware Rewind Podcast - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/@UC8UYB3xzRVdm6QypQ8SZBww">https://www.youtube.com/@UC8UYB3xzRVdm6QypQ8SZBww</a></p><p>C3 Insurance - <a target="_blank" rel="noopener noreferrer nofollow" href="https://c3insurance.com/">https://c3insurance.com/</a></p><p>Joe on Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/joeerle/">https://www.linkedin.com/in/joeerle/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2000215</link>
      <enclosure url="https://content.rss.com/episodes/266257/2000215/modern-cyber-with-jeremy-snyder/2025_04_24_13_55_04_a315ade4-2aec-4dae-bd35-f3680b3ba915.mp3" length="47345509" type="audio/mpeg"/>
      <guid isPermaLink="false">1ec41369-fe34-49af-b4e7-2fbddd551987</guid>
      <itunes:duration>2959</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 24 Apr 2025 17:25:49 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250424_010433_bd892a443a89dd3c1e8c15be85ab89cc.png"/>
    </item>
    <item>
      <title><![CDATA[Danny Allan of Snyk]]></title>
      <itunes:title><![CDATA[Danny Allan of Snyk]]></itunes:title>
      <description><![CDATA[<p>In this episode, Jeremy welcomes Danny Allan, Chief Technology Officer at Snyk, for a wide-ranging conversation on how AI is transforming software development and cybersecurity. From productivity boosts to the growing sophistication of AI-powered attacks, Danny shares his perspective on the evolving responsibilities of developers, the implications of "vibe coding," and why security guardrails are more critical than ever. They also dig into how AI is being used to filter noise in vulnerability data, what realistic productivity gains might look like, and how Snyk is helping developers build securely by default.</p><p><strong>About Danny Allan</strong></p><p>Danny Allan is the Chief Technology Officer at Snyk, where he leads the strategic direction of the company’s developer-first security platform. Before joining Snyk, Danny served as CTO at Veeam and Desktone (acquired by VMware), and as Director of Security Research at IBM. With deep experience across security, infrastructure, and cloud, Danny is a champion for making security accessible and scalable for developers. A proud Canadian, he’s also an avid scuba diver, cyclist, and hockey enthusiast.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://www.snyk.io">www.snyk.io</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1991185</link>
      <enclosure url="https://content.rss.com/episodes/266257/1991185/modern-cyber-with-jeremy-snyder/2025_04_17_13_02_31_62c33393-f4b3-404f-b513-c43539e39ef5.mp3" length="38582139" type="audio/mpeg"/>
      <guid isPermaLink="false">596a1dc1-dd3c-492d-9cfd-eb1ddfa6da01</guid>
      <itunes:duration>2411</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 22 Apr 2025 08:41:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250417_080452_00d37ad0d8520ff52733e31836eb4ae8.png"/>
    </item>
    <item>
      <title><![CDATA[Breach Series 4 - Adam Burns of BlackVeil]]></title>
      <itunes:title><![CDATA[Breach Series 4 - Adam Burns of BlackVeil]]></itunes:title>
      <description><![CDATA[<p>In this Breach Series episode of Modern Cyber, Jeremy speaks with Adam Burns, CEO of BlackVeil, about a real-world ransomware incident that struck one of Adam’s MSP clients. Adam shares how the breach was initially detected, the role phishing played in the attack, and the team’s recovery efforts—including narrowly saving the client’s backups. The conversation also touches on CrowdStrike’s 2023 outage and key lessons learned from both incidents, including the importance of fundamentals like email security, air-gapped backups, and response readiness.</p><p><strong>About Adam Burns</strong></p><p>Adam Burns is the CEO of BlackVeil, a New Zealand-based company focused on simplifying email security for businesses of all sizes. With a career rooted in the MSP space, Adam has worked across support, engineering, and project delivery roles. Drawing on years of experience responding to cybersecurity incidents, he now helps organizations protect against common vulnerabilities—especially phishing and email-based threats.</p><p>BlackVeil Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.blackveil.co.nz">https://www.blackveil.co.nz</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1981314</link>
      <enclosure url="https://content.rss.com/episodes/266257/1981314/modern-cyber-with-jeremy-snyder/2025_04_10_14_18_22_02224d77-f85b-49b3-835c-7eaa15506841.mp3" length="22492844" type="audio/mpeg"/>
      <guid isPermaLink="false">5dea8079-4eb9-41f1-b6a0-41d9b8274738</guid>
      <itunes:duration>1405</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Apr 2025 16:01:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250410_020406_6fcf690a1ee270ba59d58caea07a1e44.png"/>
    </item>
    <item>
      <title><![CDATA[Breach Series 3 - Jeff Lyon of TheCyberWild]]></title>
      <itunes:title><![CDATA[Breach Series 3 - Jeff Lyon of TheCyberWild]]></itunes:title>
      <description><![CDATA[<p>In this special episode of the Modern Cyber Breach Series, we welcome back Jeff Lyon, CEO and Founder of TheCyberWild. Jeff shares a firsthand account of responding to a major ransomware attack on a hospital—one that unfolded just before the COVID-19 pandemic.From the initial emergency call to the recovery process, Jeff walks us through the critical decisions, the challenges of an unprepared IT team, and the difficulties of restoring operations while ensuring patient care. He also sheds light on lessons learned, including the importance of proactive security measures, incident response planning, and continuous monitoring.Join us as we dive deep into the realities of cybersecurity in healthcare, the risks of ransomware, and why no organization—regardless of size—can afford to be unprepared.</p><p>About Jeff Lyon</p><p>Jeff Lyon is a Business Information Security Advisor who empowers organizations to take control of their cybersecurity frontier. As the CEO and Founder of TheCyberWild, Jeff guides organizations through the intricacies of cyberspace. With a wealth of knowledge accumulated through years of hands-on experience and strategic leadership, he provides security awareness training, security assessments, 24x7x365 Security Monitoring and governance, risk, and compliance strategies and other cybersecurity solutions tailored to the unique needs of each client.</p><p>TheCyberWild Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://thecyberwild.com/">https://thecyberwild.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1971301</link>
      <enclosure url="https://content.rss.com/episodes/266257/1971301/modern-cyber-with-jeremy-snyder/2025_04_03_13_14_38_fc89f723-cb61-45b3-8f4e-edd565b6f3a8.mp3" length="20396783" type="audio/mpeg"/>
      <guid isPermaLink="false">df2f6e51-2724-403e-8bac-7b32992e4fd2</guid>
      <itunes:duration>1274</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 03 Apr 2025 20:18:10 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250403_010424_c8784c4f72441e9911645245e45df523.png"/>
    </item>
    <item>
      <title><![CDATA[Breach Series 2 with Mike McCabe of Cloud Security Partners]]></title>
      <itunes:title><![CDATA[Breach Series 2 with Mike McCabe of Cloud Security Partners]]></itunes:title>
      <description><![CDATA[<p>The second episode in Modern Cyber’s <em>Breach Series</em> features guest Mike McCabe, CEO of Cloud Security Partners, sharing a real-world security incident that unfolded due to a compromised G Suite admin account. Jeremy is back at the helm as Mike jumps into the guest's chair and walks us through the attack chain—from a simple phishing email to full database exfiltration via a Jenkins server exploit. They break down the critical security missteps, how the breach was ultimately detected, and the key lessons for securing cloud environments.</p><p><strong>About Mike McCabe:</strong></p><p>Mike McCabe is the founder and CEO of Cloud Security Partners, where he helps organizations design and implement secure cloud architectures. With a career spanning over two decades in cybersecurity and IT, Mike specializes in incident response, threat detection, and cloud security strategy. He has worked with enterprises across multiple industries to strengthen their security postures and is a frequent speaker on cloud and cybersecurity best practices.</p><p>Cloud Security Partners Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://cloudsecuritypartners.com/">https://cloudsecuritypartners.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1961124</link>
      <enclosure url="https://content.rss.com/episodes/266257/1961124/modern-cyber-with-jeremy-snyder/2025_03_27_21_01_46_d8c7b989-9b26-404a-92df-678e32efb907.mp3" length="15414291" type="audio/mpeg"/>
      <guid isPermaLink="false">567b0ba8-2923-403d-a7c5-32fe6d5597db</guid>
      <itunes:duration>963</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 28 Mar 2025 08:17:10 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250327_090331_51d3780ef7835e8f9502ecb1514a2805.png"/>
    </item>
    <item>
      <title><![CDATA[Breach Series 1 with Jeremy Snyder of FireTail]]></title>
      <itunes:title><![CDATA[Breach Series 1 with Jeremy Snyder of FireTail]]></itunes:title>
      <description><![CDATA[<p>The first episode in Modern Cyber’s new <em>Breach Series</em> turns the tables on regular host Jeremy Snyder as he sits in the guest chair, sharing one of his own breach stories. Guest host Mike McCabe, CEO of Cloud Security Partners, leads the discussion as Jeremy recounts a security incident from the early 2000s involving an FTP server vulnerability, an unexpected bandwidth bill, and the lessons learned. This episode kicks off the Breach Series with an insightful, real-world example of how security misconfigurations can lead to major consequences.</p><p><strong>About Jeremy Snyder</strong> Jeremy Snyder is the founder and CEO of FireTail, where he focuses on AI &amp; API security and securing modern cloud-native applications. With over 20 years of experience in cybersecurity, cloud computing, and IT operations, Jeremy previously worked at Rapid7, DivvyCloud, and AWS in various leadership roles.</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1950272</link>
      <enclosure url="https://content.rss.com/episodes/266257/1950272/modern-cyber-with-jeremy-snyder/2025_03_20_18_29_35_9af066c2-9b8c-44b1-a9f1-82c01efcddea.mp3" length="17331470" type="audio/mpeg"/>
      <guid isPermaLink="false">8799c53f-f66a-414a-9bfd-156aa64b6b2d</guid>
      <itunes:duration>1083</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Mar 2025 14:25:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250320_060319_77bf906cd7fcfb4a3a8c8a061b2144f2.png"/>
    </item>
    <item>
      <title><![CDATA[Shrav Mehta of Secureframe]]></title>
      <itunes:title><![CDATA[Shrav Mehta of Secureframe]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Shrav Mehta, founder and CEO of Secureframe, to explore the intersection of compliance, security, and automation. They discuss the challenges of compliance at scale, the role of automation in streamlining security frameworks like SOC 2, ISO 27001, HIPAA, and how AI is reshaping both compliance processes and security threats. Shrav also shares his journey of launching Secureframe at just 23 years old, along with insights into AI-driven compliance, risk assessments, and the future of passwordless security.</p><p><strong>About Shrav Mehta</strong></p><p>Shrav Mehta is the founder and CEO of Secureframe, which has quickly become a leading compliance automation platform helping thousands of organizations meet their security and privacy obligations. A lifelong entrepreneur, Mehta began developing mobile applications as a teenager, creating more than a dozen apps that amassed millions of downloads. Recognizing the need for a modern, streamlined approach to security and compliance, he launched Secureframe at just 23 years old. Under his leadership, the company continues to redefine the industry, simplifying complex compliance processes and empowering organizations of all sizes to navigate today’s evolving security landscape.</p><p>Secureframe Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://secureframe.com/">https://secureframe.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1938964</link>
      <enclosure url="https://content.rss.com/episodes/266257/1938964/modern-cyber-with-jeremy-snyder/2025_03_13_16_46_14_76073201-1c44-4530-b736-bf38ba0422cd.mp3" length="31157944" type="audio/mpeg"/>
      <guid isPermaLink="false">d658e510-b595-47ee-9b21-1bcc87321132</guid>
      <itunes:duration>1947</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Mar 2025 18:27:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250313_040346_d6a073d91a98aca5fc00149ed51d53b7.png"/>
    </item>
    <item>
      <title><![CDATA[Kristin Demoranville of AnzenSage]]></title>
      <itunes:title><![CDATA[Kristin Demoranville of AnzenSage]]></itunes:title>
      <description><![CDATA[<p>In this episode of <em>Modern Cyber</em>, Jeremy sits down with Kristin Demoranville, founder and CEO of AnzenSage and co-founder of AnzenOT, to explore the unique challenges of securing operational technology (OT) in industries like food production, agriculture, and manufacturing. They discuss the complexities of OT security, the importance of segmentation and asset management, and the critical need for empathy and resilience in cybersecurity. Kristin also shares fascinating insights from her past research on gorilla behavior and how it informs her security strategies today. </p><p><strong>About Kristin Demoranville</strong></p><p>Kristin Demoranville is a seasoned cybersecurity and risk management expert with 26 years of experience in the tech industry. She is the founder and CEO of AnzenSage, a firm dedicated to cybersecurity solutions in the food and agricultural sectors, and co-founder of AnzenOT, an innovative SaaS OT Cybersecurity Risk Intelligence solution. Kristin holds a degree in environmental management, and her studies included researching gorilla behavior, which brought a unique perspective to her work. She excels in crafting and implementing risk cybersecurity strategies, particularly within OT/ICS environments. As the host of the Bites &amp; Bytes Podcast, Kristin drives meaningful conversations at the intersection of food, technology, and cybersecurity.</p><p>AnzenOT Website -<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.anzenot.com/"> https://www.anzenot.com/</a></p><p>AnzenSage Website -<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.anzensage.com/">https://www.anzensage.com/</a></p><p>Kristin on Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/demoranvillekristin/">https://www.linkedin.com/in/demoranvillekristin/</a> </p><p>Bites &amp; Bytes Podcast - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bitesandbytespodcast.com/episodes">https://www.bitesandbytespodcast.com/episodes</a></p><p>‍</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1929075</link>
      <enclosure url="https://content.rss.com/episodes/266257/1929075/modern-cyber-with-jeremy-snyder/2025_03_06_16_59_10_1d36b25a-88f6-47a5-954e-801139961c03.mp3" length="43057256" type="audio/mpeg"/>
      <guid isPermaLink="false">ae57f0c9-8d95-48a4-ad35-7299e36e8aa1</guid>
      <itunes:duration>2691</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Mar 2025 18:59:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250306_040335_56f83c14023473ceda996048d16a7504.png"/>
    </item>
    <item>
      <title><![CDATA[Terry Ziemniak of TechCXO]]></title>
      <itunes:title><![CDATA[Terry Ziemniak of TechCXO]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Terry Ziemniak, a cybersecurity expert and fractional CISO at TechCXO. With over 25 years of experience in information security, Terry shares insights into the evolving role of a fractional CISO, the cybersecurity challenges facing SMBs, and how organizations can better manage cyber risks. The conversation covers real-world experiences, the importance of risk-based security strategies, and lessons learned from past breaches. Terry also discusses his academic research on AI and cybersecurity, including an innovative approach to identifying anomalous user behavior. </p><p><strong>About Terry Ziemniak</strong></p><p>Terry has over 25 years of experience in the information security field with work ranging from technical, compliance, and executive leadership. His recent positions include 10 years as Information Security Officer for multi-billion dollar organizations across the United States. Terry now works as a fractional cybersecurity executive, helping SMBs understand, manage, and reduce their cyber risks. </p><p>Terry on Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/terryziemniak/">https://www.linkedin.com/in/terryziemniak/</a> </p><p>TechCXO Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.techcxo.com/">https://www.techcxo.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1917020</link>
      <enclosure url="https://content.rss.com/episodes/266257/1917020/modern-cyber-with-jeremy-snyder/2025_02_27_15_28_14_bcdd850a-369d-4243-97b3-0d38a92096f9.mp3" length="38843793" type="audio/mpeg"/>
      <guid isPermaLink="false">bbbcaa56-ad68-4fa0-9465-21d0d90dc9ba</guid>
      <itunes:duration>2427</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 Feb 2025 18:50:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250227_030243_bd979575975ccd4800b87b2aa57574d0.png"/>
    </item>
    <item>
      <title><![CDATA[John Todd of Quad9]]></title>
      <itunes:title><![CDATA[John Todd of Quad9]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with John Todd, General Manager of Quad9, for a deep dive into the critical role of DNS in cybersecurity. They discuss how DNS has evolved, the increasing risks of DNS interception, encryption standards, and the challenges of maintaining a private, secure, and censorship-resistant Internet. </p><p>John shares insights into recursive DNS as a cybersecurity tool, the political and regulatory pressures on DNS providers, and why DNS-based censorship is a growing concern worldwide. Plus, they explore the role of Quad9 in protecting user privacy, the importance of trust in Internet infrastructure, and how governments and corporations are influencing DNS operations. </p><p>Tune in to understand why DNS security is more critical than ever and what the future of DNS might look like.</p><p><strong>About John Todd</strong></p><p>John Todd is the General Manager for Quad9. He has been involved in internet infrastructure, networking operations, and DNS-related roles for 35 years as an engineer, manager, and IP enthusiast.</p><p>Quad9 Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://quad9.net/">https://quad9.net/</a></p><p>DNS Haiku - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.cyberciti.biz/humour/a-haiku-about-dns/">https://www.cyberciti.biz/humour/a-haiku-about-dns/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1906744</link>
      <enclosure url="https://content.rss.com/episodes/266257/1906744/modern-cyber-with-jeremy-snyder/2025_02_20_12_46_07_92706d86-9ce5-447f-988e-b2f58ec71121.mp3" length="50999286" type="audio/mpeg"/>
      <guid isPermaLink="false">9e96f6d5-df6b-46bd-b616-431857698abd</guid>
      <itunes:duration>3187</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Feb 2025 10:13:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250220_120215_2d14b2d7ce629eae611b0cccfb423912.png"/>
    </item>
    <item>
      <title><![CDATA[Gemma Moore of Cyberis]]></title>
      <itunes:title><![CDATA[Gemma Moore of Cyberis]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is joined by Gemma Moore, Director of Cyberis, to dive into the world of red teaming and penetration testing. Gemma, an award-winning ethical hacker, explains the key differences between the two approaches and how organizations can use them to strengthen their security posture. They discuss the challenges of testing modern cloud-based environments, the ethical considerations of social engineering, and the importance of fostering collaboration between red and blue teams. Tune in for insights into how companies can identify and mitigate real attack pathways before adversaries do.</p><p><strong>About Gemma Moore</strong></p><p>Gemma Moore is a highly-experienced Red Teamer, Penetration Tester, and Technical Security Consultant. Her expertise lies in network and web application penetration testing, with an emphasis on adversary simulation and simulated attack strategies. She is a founding director of the information security consultancy, Cyberis.</p><p>Cyberis Blog: <a target="_blank" rel="noopener noreferrer nofollow" href="http://cyberis.com/blog">cyberis.com/blog</a></p><p>Gemma's LinkedIn:  <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/gemma-moore-9839921/">https://www.linkedin.com/in/gemma-moore-9839921/</a></p><p>Penetration Testing: A guide for business and IT managers : <a target="_blank" rel="noopener noreferrer nofollow" href="https://shop.bcs.org/store/221/detail/workgroup?id=3-221-9781780174082">https://shop.bcs.org/store/221/detail/workgroup?id=3-221-9781780174082</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1896192</link>
      <enclosure url="https://content.rss.com/episodes/266257/1896192/modern-cyber-with-jeremy-snyder/2025_02_13_14_18_39_ccfb7819-9cfe-455c-940c-e32538b74bf4.mp3" length="41355722" type="audio/mpeg"/>
      <guid isPermaLink="false">af27a4af-0975-4fb9-8f6f-3f369e861c45</guid>
      <itunes:duration>2584</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Feb 2025 18:36:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250213_020215_a3935ad188cb93dd854046ece21b3d9e.png"/>
    </item>
    <item>
      <title><![CDATA[Dave Sobel of MSP Radio]]></title>
      <itunes:title><![CDATA[Dave Sobel of MSP Radio]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Dave Sobel, host of The Business of Tech podcast and an expert in the MSP space. They explore how managed service providers (MSPs) approach cybersecurity, the evolving landscape of small business security needs, and the intersection of AI and IT service management. Dave shares insights on the biggest risks facing MSPs today, the gap between cybersecurity investment and real-world security outcomes, and the critical role of data management in AI adoption. Whether you're an MSP, a security professional, or just curious about how SMBs tackle cybersecurity, this episode is packed with valuable insights.</p><p><strong>About Dave Sobel</strong></p><p>Dave Sobel is the host of The Business of Tech podcast and owner of MSP Radio, where he provides expert analysis on IT services and managed service providers. A recognized industry leader, Dave operated an award-winning MSP for over a decade, was a finalist for Microsoft’s Worldwide Partner of the Year, and has held leadership roles at Level Platforms, GFI, LogicNow, and SolarWinds. He is also an author, co-host of the Killing IT podcast, and a frequent industry speaker. Based near Washington, D.C., Dave enjoys travel, craft beer, retro video games, and cheering for the Nationals and Capitals.</p><p>The Business of Tech Podcast: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.businessof.tech/">https://www.businessof.tech/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1874769</link>
      <enclosure url="https://content.rss.com/episodes/266257/1874769/modern-cyber-with-jeremy-snyder/2025_01_31_14_03_53_6a4da725-ba96-46d9-85a3-2f6d16509a5d.mp3" length="43332255" type="audio/mpeg"/>
      <guid isPermaLink="false">b12d83f0-d9de-4c3c-87be-f86355f863b3</guid>
      <itunes:duration>2708</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 31 Jan 2025 18:59:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250131_020120_acc4b7b9e737a1cb46de2af7dba6f244.png"/>
    </item>
    <item>
      <title><![CDATA[Kelvin Green of CyberSec And I]]></title>
      <itunes:title><![CDATA[Kelvin Green of CyberSec And I]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy chats with Kelvin Green of CyberSec And I. The discussion centers on artificial intelligence (AI)—its opportunities, risks, and ethical considerations in cybersecurity. Kelvin shares insights from his decades of experience, including working with AI for User and Entity Behavioral Analytics (UEBA), the challenges of contextualizing security alerts, and the role of guardrails in training AI responsibly. He also dives into healthcare and government AI adoption and offers practical advice on managing data in AI-driven environments. Don’t miss Kelvin’s reflections on technology gaps across industries and his unexpected journey as a game tester for Tetris!</p><p><strong>About Kelvin Green</strong></p><p>Kelvin Green is the Chief Cybersecurity Advisor and co-founder of CyberSec And I, an advisory firm specializing in User and Entity Behavioral Analytics (UEBA) and AI-driven security solutions. With over 20 years of experience in IT and cybersecurity, Kelvin has worked in diverse sectors, including healthcare, government, and SMBs. He has held notable roles such as Infrastructure and Operations Lead for the Kentucky Health Benefits Exchange and Lead Messaging Engineer for a behavioral health organization. Known for his practical expertise, Kelvin has delivered training sessions globally and provided cutting-edge solutions as a Solutions Architect for DHS. Outside of cybersecurity, he once worked as a game tester for Tetris and remains passionate about fostering accessible, robust security practices in a rapidly evolving digital landscape.</p><p>CyberSec And I Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://cybersecandi.com/">https://cybersecandi.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1861588</link>
      <enclosure url="https://content.rss.com/episodes/266257/1861588/modern-cyber-with-jeremy-snyder/2025_01_23_15_55_21_bbd16d4b-b615-4c6f-8faa-5c84fedf52b4.mp3" length="34918353" type="audio/mpeg"/>
      <guid isPermaLink="false">e629e558-3d2b-450e-902b-f9dc7a6b2106</guid>
      <itunes:duration>2182</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 24 Jan 2025 13:35:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250123_030113_3cdfadac4e03fa7567a5a3ab1133d043.png"/>
    </item>
    <item>
      <title><![CDATA[Leslie Daigle of the Global Cyber Alliance]]></title>
      <itunes:title><![CDATA[Leslie Daigle of the Global Cyber Alliance]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy Snyder sits down with Leslie Daigle, Chief Technical Officer and Director of the Internet Integrity Program at the Global Cyber Alliance (GCA).Together, they dive into the foundational elements of Internet integrity—names, numbers, and routes—and explore how these underpinning structures impact cybersecurity today. Leslie shares valuable insights on topics like routing security, domain name abuse, and combating malicious traffic. The conversation highlights the challenges of maintaining a cohesive and secure Internet while balancing the technical, economic, and policy dimensions.Leslie also discusses the Global Cyber Alliance’s collaborative initiatives, such as the MANRS project and its efforts to improve Internet infrastructure security at scale. Along the way, they reflect on the evolution of cybersecurity challenges, from scale and complexity to the systemic exploitation of technology by bad actors.Whether you’re interested in first principles of Internet architecture or how global collaborations are shaping the future of cybersecurity, this episode is a must-listen.</p><p><strong>About Leslie Daigle</strong></p><p>Leslie Daigle is the Chief Technical Officer and Director of the Internet Integrity Program at the Global Cyber Alliance (GCA), where she leads efforts to enhance global cybersecurity through practical solutions. With more than two decades of experience, Leslie has worked at the crossroads of technology, economics, and policy to address complex challenges in Internet security and <a target="_blank" rel="noopener noreferrer nofollow" href="http://architecture.In">architecture.In</a> addition to her role at GCA, Leslie is the principal at Thinking Cat Enterprises and co-host of the Tech Sequences podcast, where she examines the impacts of technology, including its unintended consequences. She holds an M.S. in Computing and Information Systems from the University of Guelph and a B.S. in Math and Computer Science from McGill University.Leslie is recognized as a thought leader in the cybersecurity community and is a passionate advocate for fostering trust, integrity, and inclusivity in the Internet’s infrastructure.</p><p>Useful Links</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://globalcyberalliance.org/">https://globalcyberalliance.org/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.techsequences.org/podcasts/">https://www.techsequences.org/podcasts/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://manrs.org/">https://manrs.org/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1850072</link>
      <enclosure url="https://content.rss.com/episodes/266257/1850072/modern-cyber-with-jeremy-snyder/2025_01_16_17_27_17_99823e1e-808e-4ad4-b274-0b0f9a51e0db.mp3" length="36091166" type="audio/mpeg"/>
      <guid isPermaLink="false">0599d0a9-6146-4660-8245-d1e3817fa438</guid>
      <itunes:duration>2255</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 Jan 2025 22:13:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250116_050152_1b1159cf3faa6ca8eb35a8b4f78bdfee.png"/>
    </item>
    <item>
      <title><![CDATA[Mikko Hypponen of WithSecure at the Museum of Malware Art]]></title>
      <itunes:title><![CDATA[Mikko Hypponen of WithSecure at the Museum of Malware Art]]></itunes:title>
      <description><![CDATA[<p>Watch the video for this episode here: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.io/modern-cyber-podcast/episode-42-mikko-hypponen-at-the-museum-of-malware-art">https://www.firetail.io/modern-cyber-podcast/episode-42-mikko-hypponen-at-the-museum-of-malware-art</a></p><p></p><p>In this episode of Modern Cyber, Jeremy travels to Helsinki, Finland to meet with cybersecurity legend Mikko Hypponen for a personal tour of WithSecure's Museum of Malware Art. Mikko takes Jeremy on an exclusive curator’s tour of the museum, showcasing the intersection of malware history, art, and technology. Explore stunning exhibits like sculptures inspired by infamous ransomware, interactive malware simulations, and visualized outbreaks of iconic viruses such as Love Letter and Melissa. Hear Mikko’s insights on the evolution of malware—from early viruses that were playful or visually striking to modern ransomware gangs with corporate-like branding. This episode celebrates cybersecurity’s rich history while examining the artistic lens through which these stories are now told.</p><p>About Mikko Hyppönen</p><p>Mikko Hyppönen is a globally recognized cybersecurity expert and the Chief Research Officer at WithSecure. With over 30 years of experience in the industry, Mikko has analyzed some of the most significant malware outbreaks in history, such as Love Letter, Melissa, and Stuxnet. He is a sought-after speaker at international conferences, a TED Talk veteran, and the author of the acclaimed book If It’s Smart, It’s Vulnerable. Passionate about cybersecurity education, Mikko has been a driving force behind initiatives like the Museum of Malware Art, showcasing how digital threats can inspire artistic creativity.</p><p></p><p>Mikko's Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://mikko.com/">https://mikko.com/</a></p><p>WithSecure Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.withsecure.com/en/home">https://www.withsecure.com/en/home</a></p><p>Mikko's Linkedin: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/hypponen/">https://www.linkedin.com/in/hypponen/</a></p><p>Mikko's X: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/mikko">https://twitter.com/mikko</a></p><p>Museum of Malware Art - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.withsecure.com/en/experiences/museum-of-malware-art">https://www.withsecure.com/en/experiences/museum-of-malware-art</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1840356</link>
      <enclosure url="https://content.rss.com/episodes/266257/1840356/modern-cyber-with-jeremy-snyder/2025_01_09_18_08_28_33043b12-1dd9-43c4-86d5-84f02219a22b.mp3" length="29470149" type="audio/mpeg"/>
      <guid isPermaLink="false">a6c0fc33-ba3a-43d9-9f8c-2a3257218f9e</guid>
      <itunes:duration>1841</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Jan 2025 20:19:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20250109_060111_0919403f8c503275d4e58f799a4d2e82.png"/>
    </item>
    <item>
      <title><![CDATA[Sounil Yu of Knostic AI on the role of a modern CISO]]></title>
      <itunes:title><![CDATA[Sounil Yu of Knostic AI on the role of a modern CISO]]></itunes:title>
      <description><![CDATA[<p>Join FireTail CEO Jeremy Snyder as he talks with Sounil Yu, co-founder of Knostic, about the evolving role of today’s CISO. They discuss how CISOs can adapt to emerging technologies, tackle technical debt, align security with business goals, and navigate personal liability in high-stakes environments. Gain actionable insights on building modern security programs in a rapidly changing landscape.</p><p><strong>About Sounil Yu</strong></p><p>Sounil Yu is the co-founder of Knostic AI and a highly respected thought leader in cybersecurity. Previously, he served as CISO and Head of Research at JupiterOne, as well as Chief Security Scientist at Bank of America. Sounil is best known for creating the Cyber Defense Matrix and the DIE Triad, two groundbreaking frameworks that are reshaping approaches to cybersecurity. He holds an MS in Electrical Engineering from Virginia Tech and dual BS and BA degrees in Electrical Engineering and Economics from Duke University. Sounil also serves as an Advisory Board Member for FireTail, bringing his wealth of experience to the forefront of API security innovation.</p><p>Knostic AI Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.knostic.ai/">https://www.knostic.ai/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1808695</link>
      <enclosure url="https://content.rss.com/episodes/266257/1808695/modern-cyber-with-jeremy-snyder/2024_12_19_12_13_34_6a4cda92-d03a-413a-a32f-4c22edec28df.mp3" length="23339967" type="audio/mpeg"/>
      <guid isPermaLink="false">e08e55c2-bae3-41e0-bd54-f26e0ca842aa</guid>
      <itunes:duration>1458</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Jan 2025 20:19:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241219_121218_e35aac9720e916c9691a98c745a01ac1.png"/>
    </item>
    <item>
      <title><![CDATA[Confidence Staveley of MerkleFence]]></title>
      <itunes:title><![CDATA[Confidence Staveley of MerkleFence]]></itunes:title>
      <description><![CDATA[<p>In this episode of <em>Modern Cyber</em>, Jeremy sits down with Confidence Staveley, founder of MerkleFence and the CyberSafe Foundation, and a globally recognized cybersecurity expert. The conversation delves into the evolving landscape of API security, including its intersection with AI and the rise of APIs as a top attack vector for social engineering. Confidence shares insights from her groundbreaking work in cybersecurity education, including her creative approach using culinary metaphors in the YouTube series <em>API Kitchen</em> and her best-selling book <em>API Security for White Hat Hackers</em>. They also explore the psychology of social engineering attacks, the importance of customized cybersecurity awareness training, and the unique challenges and opportunities for cybersecurity in Africa. Tune in to hear Confidence’s compelling perspectives on cybersecurity trends, human-centric strategies, and her advocacy for diversity and inclusion in the tech industry.</p><p><strong>About Confidence Staveley:</strong> </p><p>Confidence Staveley is a distinguished cybersecurity leader, founder of MerkleFence, and the driving force behind the CyberSafe Foundation. She is a best-selling author of <em>API Security for White Hat Hackers</em> and creator of the acclaimed YouTube series <em>API Kitchen</em>, which simplifies API security using culinary metaphors. Confidence has been recognized as one of the Top 40 Global Thought Leaders in Cybersecurity for 2024 and one of 150 Fascinating Females Fighting Cybercrime by <em>Women Know Cyber</em>. Through her initiatives, she has empowered thousands, including women in Africa via the Cyber Girls Fellowship, the continent’s largest cybersecurity training program for women. With a deep commitment to inclusion, education, and security innovation, Confidence is a trailblazer in the global fight against cyber threats.</p><p><strong>Links and Resources:</strong></p><ul><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=qTVdWJQv5Hk">Confidence's TED Talk</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=dEeP1qriAyk&amp;list=PLfi0VCyZDkUYDGYOQHxZybGGZjTbjng2B">API Kitchen Season 1</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://confidencestaveley.com/">Confidence's Personal Website</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://merklefence.com/">MerkleFence Website</a></li><li><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/confidencestaveley/">Connect with Confidence on LinkedIn</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1798476</link>
      <enclosure url="https://content.rss.com/episodes/266257/1798476/modern-cyber-with-jeremy-snyder/2024_12_12_13_12_32_f59fe4d5-6a4b-42e1-bcc4-e196e6097540.mp3" length="41781962" type="audio/mpeg"/>
      <guid isPermaLink="false">65ca9906-dc4d-4463-88f1-05f12ff9a3fd</guid>
      <itunes:duration>2611</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 Dec 2024 15:44:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241212_011259_b871fdd126499e030a83fae8b7e9c90b.png"/>
    </item>
    <item>
      <title><![CDATA[Richard Hollis of Risk Crew]]></title>
      <itunes:title><![CDATA[Richard Hollis of Risk Crew]]></itunes:title>
      <description><![CDATA[<p>In this insightful episode of Modern Cyber, Jeremy Snyder chats with Richard Hollis, Founder and CEO of Risk Crew. They explore the cybersecurity industry's persistent challenges, including the "circle of failure" in strategies, product design, and consumer expectations. Richard shares thought-provoking perspectives on risk management, consumer advocacy, and the critical importance of securing sensitive personal data. The episode offers a candid critique of current practices and a call for stronger accountability, innovation, and collaboration in cybersecurity. </p><p><strong>About Richard Hollis: </strong></p><p>Richard Hollis is the Founder and CEO of Risk Crew, a London-based consultancy specializing in cybersecurity risk management, ethical hacking, and user awareness training. With over 30 years of experience, Richard is a recognized expert in designing and testing secure IT systems. He is a passionate advocate for privacy rights and simplifying cybersecurity solutions. Known for his candid critiques and pragmatic approaches, Richard aims to drive meaningful change in how organizations protect sensitive information. </p><p>Risk Crew Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.riskcrew.com">https://www.riskcrew.com</a> </p><p>Circle of Failure White Paper - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.riskcrew.com/resources-2/cybersecurity-circle-of-failure/">https://www.riskcrew.com/resources-2/cybersecurity-circle-of-failure/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1786014</link>
      <enclosure url="https://content.rss.com/episodes/266257/1786014/modern-cyber-with-jeremy-snyder/2024_12_04_19_08_43_271ec589-9698-49ff-a51d-4f3321028f80.mp3" length="42689338" type="audio/mpeg"/>
      <guid isPermaLink="false">694e7ad5-de7b-4cee-88d4-0741b3057e85</guid>
      <itunes:duration>2668</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 Dec 2024 15:27:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241204_071216_611310194db46c02eba5f309ff6a8be6.png"/>
    </item>
    <item>
      <title><![CDATA[Simo Kohonen of Defused]]></title>
      <itunes:title><![CDATA[Simo Kohonen of Defused]]></itunes:title>
      <description><![CDATA[<p>In this fascinating episode of <em>Modern Cyber</em>, Jeremy welcomes <strong>Simo Kohonen</strong>, founder and CEO of <strong>Defused</strong>, to delve into the fascinating world of <strong>cyber deception technology</strong>. Simo shares insights into how deception techniques have evolved beyond honeypots to encompass innovative methods for misleading attackers, including emulated decoys and synthetic data. They discuss AI's potential in accelerating both defensive strategies and attacker methodologies, emphasizing early detection and the creative use of deception to neutralize threats. Tune in to explore the past, present, and future of deception in cybersecurity.</p><p>About Simo Kohonen</p><p><strong>Simo Kohonen</strong> is the founder and CEO of <strong>Defused</strong>, a cutting-edge cyber deception company that empowers organizations to outsmart attackers. With a background in computer science, Simo has transitioned from warehouse work to becoming a leader in deception technology. He is a guest lecturer at Cranfield University’s Ministry of Defense Cyber Program and has been featured in media outlets such as <em>The Wall Street Journal</em> and <em>Yahoo</em>. Simo’s expertise lies in deploying innovative deception strategies to enhance situational awareness and protect digital infrastructures.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://defusedcyber.com/">https://defusedcyber.com/ </a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/simokohonen">https://x.com/simokohonen</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1764955</link>
      <enclosure url="https://content.rss.com/episodes/266257/1764955/modern-cyber-with-jeremy-snyder/2024_11_21_11_20_52_ea56af01-5396-4bfa-9a14-75ea265b3928.mp3" length="34545395" type="audio/mpeg"/>
      <guid isPermaLink="false">3775bc8c-addf-429b-aa46-bd7057e16f16</guid>
      <itunes:duration>2159</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 21 Nov 2024 17:00:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241121_111130_19d7042767e5edab7e60198603c456f8.png"/>
    </item>
    <item>
      <title><![CDATA[Simon Wijckmans of c/side]]></title>
      <itunes:title><![CDATA[Simon Wijckmans of c/side]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy Snyder speaks with Simon Wijckmans, CEO and founder of c/side, about the hidden complexities of client-side security in web environments. They discuss real-world examples like the Polyfill attack, emphasizing the risks in client-side scripting and vulnerabilities in traditional tools like secure web gateways. Simon explains how browser security, inline scripts, and DNS intricacies present ongoing security gaps, proposing a proactive approach to script monitoring and standardization to enhance web protection.</p><p><strong>About Simon Wijckmans</strong></p><p>Simon Wijckmans is the CEO and founder of c/side, a company focused on client-side web security. With extensive experience in web and browser security, Simon is a key advocate for proactive defenses against client-side exploits. His approach with c/side emphasizes real-time monitoring and innovative browser capabilities. Passionate about bridging the gap between developers and security teams, Simon’s expertise continues to drive forward-thinking solutions for modern web security. </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://cside.dev/">https://cside.dev/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1754131</link>
      <enclosure url="https://content.rss.com/episodes/266257/1754131/modern-cyber-with-jeremy-snyder/2024_11_14_15_51_41_48230c63-ebbe-44ac-821b-13232cc43499.mp3" length="29298755" type="audio/mpeg"/>
      <guid isPermaLink="false">209698e2-f63c-46d1-bb9e-a9bfef85420a</guid>
      <itunes:duration>1831</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 14 Nov 2024 22:00:49 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241114_031121_0e11350dd3c2aad7d777a1231610e633.png"/>
    </item>
    <item>
      <title><![CDATA[Cory O'Daniel of Massdriver]]></title>
      <itunes:title><![CDATA[Cory O'Daniel of Massdriver]]></itunes:title>
      <description><![CDATA[<p>In this thought-provoking episode of Modern Cyber, Jeremy talks with Cory O'Daniel, Co-Founder and CEO of Massdriver, about the evolving world of infrastructure-as-code (IaC) and platform automation. Cory, known for his candid views on cloud operations and DevOps, shares Massdriver's approach to IaC, emphasizing simplicity, security, and efficiency in platform automation. From navigating challenges like Terraform’s hard fork to embracing a streamlined and developer-friendly module approach, Cory offers practical insights on creating a cloud environment where developers aren’t bogged down by complexity. The discussion also dives into the DevOps philosophy, addressing its ongoing challenges, and the promises (and pitfalls) of AI in cloud security. This episode is a must-listen for cloud practitioners looking to stay ahead in an era where securing cloud infrastructures is both critical and increasingly complex. </p><p><strong>About Cory O'Daniel</strong></p><p>Cory O'Daniel is the Co-Founder and CEO of Massdriver, an innovative platform dedicated to simplifying cloud infrastructure through secure, scalable, and easy-to-deploy solutions. With a career spanning cloud security and DevOps, Cory has become a prominent voice on topics like infrastructure-as-code and platform automation. He's the author of the blog post "DevOps is Bullshit," a critique that has sparked ongoing industry debate. Known for his hands-on expertise and down-to-earth approach, Cory leads Massdriver in creating practical solutions that streamline cloud operations, making it accessible and effective for development teams of all sizes. Outside his professional pursuits, Cory is a taco enthusiast and an RC car hobbyist. </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.massdriver.cloud/">https://www.massdriver.cloud/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.massdriver.cloud/blogs/devops-is-bullshit">https://www.massdriver.cloud/blogs/devops-is-bullshit</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/channel/UCfj8P7MJcdlem2DJpvymtaQ">https://www.youtube.com/channel/UCfj8P7MJcdlem2DJpvymtaQ</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1741362</link>
      <enclosure url="https://content.rss.com/episodes/266257/1741362/modern-cyber-with-jeremy-snyder/2024_11_07_13_28_38_64586266-69b7-499e-9298-5d296144dfc7.mp3" length="46327676" type="audio/mpeg"/>
      <guid isPermaLink="false">5f09170c-4195-430b-885e-ec4a949cd4b7</guid>
      <itunes:duration>2895</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 12 Nov 2024 11:55:41 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241107_011109_145d9d3904fd42bb93fcadac0501a483.png"/>
    </item>
    <item>
      <title><![CDATA[Wes Kussmaul of The Authenticity Institute]]></title>
      <itunes:title><![CDATA[Wes Kussmaul of The Authenticity Institute]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Wes Kussmaul, founder and CEO of the Authenticity Institute, to discuss the evolving landscape of digital identity and accountability. Wes explains his unique approach to creating "digital buildings" to provide accountability in online spaces, comparing the internet to an open, outdoor space that lacks the safety and structure of physical buildings. He argues for using Public Key Infrastructure (PKI) as the foundational "building material" for establishing digital accountability, offering a framework where individuals control their own data and identity. Jeremy and Wes explore how this model could address issues with data privacy, and reduce reliance on organizations exploiting personal data. Wes also shares insights from his early tech ventures, including his creation of the world's first online encyclopedia, which later evolved into the Delphi social network. This conversation provides a thought-provoking look at the intersections of technology, privacy, and accountability in a digitally-driven society.</p><p><strong>About Wes Kussmaul</strong></p><p>Wes Kussmaul is the founder and CEO of the Authenticity Institute, an organization that pioneers solutions in digital identity and PKI-driven accountability frameworks. With a background as a top-rated cybersecurity thought leader on Thinkers360’s list, Wes is also credited with creating the first online encyclopedia, which evolved into the Delphi social network. His career spans work with the International Telecommunication Union and the publication of his book <em>Quiet Enjoyment</em>, which addresses social media accountability. Known for his innovative perspective on digital spaces, Wes champions a more accountable and privacy-respecting internet built upon PKI technology.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.authenticityinstitute.com/">https://www.authenticityinstitute.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://weskussmaul.com/">https://weskussmaul.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/weskussmaul/">https://www.linkedin.com/in/weskussmaul/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1730368</link>
      <enclosure url="https://content.rss.com/episodes/266257/1730368/modern-cyber-with-jeremy-snyder/2024_10_31_16_31_37_e0b46155-ec68-427b-acc2-2148c31b4848.mp3" length="34949186" type="audio/mpeg"/>
      <guid isPermaLink="false">8a5c44ec-0fba-408c-88aa-6c2844e17e53</guid>
      <itunes:duration>2184</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 05 Nov 2024 11:05:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241031_041010_b571e325b479b3b17df92738243e8637.png"/>
    </item>
    <item>
      <title><![CDATA[Jeff Perry Author of the Intentional Engineer]]></title>
      <itunes:title><![CDATA[Jeff Perry Author of the Intentional Engineer]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy talks with Jeff Perry, a leadership and career expert specializing in helping engineering and technical professionals unlock their potential. They explore the importance of mindset in achieving organizational change, discussing how growth and outward mindsets can lead to better collaboration and success in cybersecurity. Jeff also shares insights on building high-performing teams, addressing burnout, and fostering engagement in high-stress environments. The conversation delves into career clarity and how individuals can create purpose-driven careers while helping organizations reduce churn and improve team dynamics.</p><p><strong>About Jeff Perry</strong></p><p>Jeff Perry is a leadership and career expert who helps engineers and technical professionals unlock their potential. He is the author of The Intentional Engineer, a guide to building purpose-driven careers. Jeff's work focuses on mindset, leadership, and organizational culture, helping both individuals and teams thrive in their environments.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://jeff-perry.com/">https://jeff-perry.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://arbinger.com/">https://arbinger.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.theintentionalengineer.com">https://www.theintentionalengineer.com</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1718607</link>
      <enclosure url="https://content.rss.com/episodes/266257/1718607/modern-cyber-with-jeremy-snyder/2024_10_24_14_24_57_fd8592fb-9b60-495b-83ae-ccfab1d7485b.mp3" length="42164602" type="audio/mpeg"/>
      <guid isPermaLink="false">b8a34ba5-7237-4389-8a6f-4b3b8f6fb2c0</guid>
      <itunes:duration>2635</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 24 Oct 2024 16:19:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241024_061019_176cb48ec9e7ff69cb24ab1f8cf258c9.png"/>
    </item>
    <item>
      <title><![CDATA[Jonathan Steele of Steele Fortress]]></title>
      <itunes:title><![CDATA[Jonathan Steele of Steele Fortress]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy speaks with Jonathan Steele, a family law attorney and cybersecurity expert, about the intersection of digital privacy, personal security, and legal disputes. Jonathan shares insights from his work at Steele Fortress, focusing on how common digital privacy concerns like shared passwords, iCloud accounts, and tracking devices can complicate family law cases, especially during divorces. They discuss emerging threats like stalkerware and misuse of AirTags, and the importance of compartmentalizing digital lives to avoid unintended access to personal data. Jonathan also offers practical advice for improving personal cybersecurity practices during legal disputes and emphasizes the importance of secure communication methods. </p><p><strong>About Jonathan Steele</strong></p><p>Jonathan Steele is a distinguished family law attorney and the founder of Steele Fortress, a leading privacy and cybersecurity consulting firm. As a partner at Beermann LLP in Chicago, Jonathan has a reputation for handling complex family law cases with innovative legal strategies. His dual expertise in law and cybersecurity uniquely positions him to provide invaluable insights into the intersection of these fields. </p><p>Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://steelefortress.com/">https://steelefortress.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1707885</link>
      <enclosure url="https://content.rss.com/episodes/266257/1707885/modern-cyber-with-jeremy-snyder/2024_10_17_13_29_05_ef4400f6-882d-4c67-900d-4723f623c299.mp3" length="40194760" type="audio/mpeg"/>
      <guid isPermaLink="false">6a5d0745-520a-49ce-9999-6142d416c73d</guid>
      <itunes:duration>2512</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 17 Oct 2024 18:12:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241017_011037_681fd393366f8852282691fd39d900d6.png"/>
    </item>
    <item>
      <title><![CDATA[Sounil Yu of Knostic on AI]]></title>
      <itunes:title><![CDATA[Sounil Yu of Knostic on AI]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber recorded earlier in 2024, Jeremy sits down with Sounil Yu, co-founder of <a target="_blank" rel="noopener noreferrer nofollow" href="http://Knostic.ai">Knostic.ai</a>, to discuss the growing implications of artificial intelligence (AI) in cybersecurity. Sounil shares his insights on the parallels between AI adoption and previous technological shifts, emphasizing the need for new frameworks to handle knowledge security and privacy. The conversation also explores how AI can be leveraged by both attackers and defenders, as well as the potential for regulatory frameworks to shape the future of AI technology.</p><p><strong>About Sounil Yu</strong></p><p>Sounil Yu is the co-founder of <a target="_blank" rel="noopener noreferrer nofollow" href="http://Knostic.ai">Knostic.ai</a> and a prominent figure in cybersecurity known for creating the Cyber Defense Matrix and the DIE Triad, which have become key frameworks in the industry. Previously, he served as the CISO and Head of Research at JupiterOne and as the Chief Security Scientist at Bank of America. Sounil holds an MS in Electrical Engineering from Virginia Tech and dual degrees in Economics and Electrical Engineering from Duke University. He is an advisory board member at FireTail and frequently speaks on the intersection of technology, security, and risk management. </p><p>Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.knostic.ai/">https://www.knostic.ai/</a> </p><p>LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/sounil/">https://www.linkedin.com/in/sounil/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1696443</link>
      <enclosure url="https://content.rss.com/episodes/266257/1696443/modern-cyber-with-jeremy-snyder/2024_10_10_18_06_54_0b014262-f715-4fe1-85d9-62e7a3365a0f.mp3" length="32368893" type="audio/mpeg"/>
      <guid isPermaLink="false">09435531-f9d3-4170-bc7a-2139f0707542</guid>
      <itunes:duration>2023</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 11 Oct 2024 10:41:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241010_051010_87ecd6690ffd70a5fabebdad08a99379.png"/>
    </item>
    <item>
      <title><![CDATA[Jeff Lyon of TheCyberWild]]></title>
      <itunes:title><![CDATA[Jeff Lyon of TheCyberWild]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy chats with Jeff Lyon, CEO and founder of The CyberWild, about the unique challenges of securing the healthcare industry. Jeff shares his journey from IT management to becoming a cybersecurity consultant and discusses his firsthand experience dealing with ransomware attacks in healthcare settings. He explains why legacy systems and a lack of resources make healthcare an attractive target for attackers, and how organizations can mitigate these risks. The episode dives into best practices for managing vulnerabilities on medical devices, developing incident response plans, and building a more resilient security posture.</p><p><strong>About Jeff Lyon</strong></p><p>Jeff Lyon is the CEO and founder of The Cyberwild, a cybersecurity firm specializing in helping small and mid-sized organizations protect their digital assets. With decades of experience in cybersecurity, including roles in healthcare and as a consultant for Fortune 50 companies, Jeff brings a wealth of knowledge to the table. He is a certified CISM, CISSP, and CCSP, and holds degrees in management information systems and computer engineering. Jeff is passionate about making advanced security solutions accessible to all organizations, regardless of size or industry.</p><p>The Cyberwild Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://thecyberwild.com">https://thecyberwild.com</a></p><p>LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/cyber-jeff/">https://www.linkedin.com/in/cyber-jeff/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1683937</link>
      <enclosure url="https://content.rss.com/episodes/266257/1683937/modern-cyber-with-jeremy-snyder/2024_10_03_12_47_57_2a7dbe81-18e6-4f80-86c1-7a1788f29c6c.mp3" length="37657330" type="audio/mpeg"/>
      <guid isPermaLink="false">868c51f1-65c4-4abe-890a-3cfd38cf13be</guid>
      <itunes:duration>2353</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 03 Oct 2024 12:51:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20241003_121025_1d5a414aa8e8a44d6aaed19d6258573d.png"/>
    </item>
    <item>
      <title><![CDATA[Trent Gander on Defense]]></title>
      <itunes:title><![CDATA[Trent Gander on Defense]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Trent Gander, a defense and security consultant, to explore the intersection of physical security and cybersecurity. Trent draws on his experience working in law enforcement and the military to highlight how cyber and physical threats are increasingly intertwined. They discuss the challenges that arise when organizations separate these domains and the potential vulnerabilities that emerge as a result. The conversation also touches on real-world examples, such as drone usage in modern warfare and the risks of improperly discarded hardware. Trent provides a compelling look at how the convergence of these fields will shape future security strategies.</p><p><strong>About Trent Gander:</strong></p><p>Trent Gander is a defense and security consultant with over eight years of experience working in the firearms, law enforcement, and military sectors. He specializes in making complex security issues more accessible and has contributed to multiple projects related to modern warfare. Trent is available for consulting work in the law enforcement and military space and can be found on LinkedIn and Upwork. </p><p><strong>Contact:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://x.com/Gentdeirreveren">https://x.com/Gentdeirreveren</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/trent-gander-944541aa/">https://www.linkedin.com/in/trent-gander-944541aa/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="mailto:secondageallanon@gmail.com">secondageallanon@gmail.com</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1673573</link>
      <enclosure url="https://content.rss.com/episodes/266257/1673573/modern-cyber-with-jeremy-snyder/2024_09_26_14_00_01_c766c225-42cc-48ce-b7ac-c3c079ef6fad.mp3" length="39971152" type="audio/mpeg"/>
      <guid isPermaLink="false">83e2c9b8-0ae2-4dcf-b060-c347fd3b70b2</guid>
      <itunes:duration>2498</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Sep 2024 14:03:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240926_010937_e9fb62d2b844530eade2aea960a90665.png"/>
    </item>
    <item>
      <title><![CDATA[Ani Chaudhuri of Dasera]]></title>
      <itunes:title><![CDATA[Ani Chaudhuri of Dasera]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy chats with Ani Chaudhuri, CEO of Dasera, discussing the growing importance of data security in today’s digital landscape. Ani shares his journey in founding Dasera and highlights the company’s mission to build a safer, data-driven world. They discuss key challenges such as visibility into data, insider threats, and the critical need for strong data governance practices. Ani also delves into the concept of cyber hygiene, emphasizing how good hygiene can reduce attack surfaces and improve security postures across organizations.</p><p><strong>About Ani Chaudhuri</strong></p><p>Ani Chaudhuri is the CEO of Dasera, a company dedicated to automating data security and governance for structured and unstructured data across cloud and on-prem environments. With a background in building successful tech companies such as eCircle, Opelin, and Whodini, Ani has a deep understanding of data protection and privacy. His experience spans roles at McKinsey, HP, and Tata Steel, and he’s passionate about creating solutions that foster trust between consumers and businesses.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.dasera.com/https://www.linkedin.com/in/anionline/https://www.dasera.com/blog/author/ani-chaudhurihttps://www.darkreading.com/author/ani-chaudhuri">https://www.dasera.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.dasera.com/https://www.linkedin.com/in/anionline/https://www.dasera.com/blog/author/ani-chaudhurihttps://www.darkreading.com/author/ani-chaudhuri">https://www.linkedin.com/in/anionline/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.dasera.com/https://www.linkedin.com/in/anionline/https://www.dasera.com/blog/author/ani-chaudhurihttps://www.darkreading.com/author/ani-chaudhuri">https://www.dasera.com/blog/author/ani-chaudhuri</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.dasera.com/https://www.linkedin.com/in/anionline/https://www.dasera.com/blog/author/ani-chaudhurihttps://www.darkreading.com/author/ani-chaudhuri">https://www.darkreading.com/author/ani-chaudhuri</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1663868</link>
      <enclosure url="https://content.rss.com/episodes/266257/1663868/modern-cyber-with-jeremy-snyder/2024_09_19_20_00_02_17a9d02e-396b-4a37-90c4-a1c8ca8002a3.mp3" length="29948491" type="audio/mpeg"/>
      <guid isPermaLink="false">05b397fc-89fd-44d5-be0a-1adb60a28ad4</guid>
      <itunes:duration>1871</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Sep 2024 20:15:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240919_070939_090b31d4f24671893a2d3683222a3dc5.png"/>
    </item>
    <item>
      <title><![CDATA[Rojan Rijal of Ophion & Jonathan Walker of SecurityRunners]]></title>
      <itunes:title><![CDATA[Rojan Rijal of Ophion & Jonathan Walker of SecurityRunners]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with two cybersecurity experts—Jonathan Walker, founder of Security Runners, and Rojan Rijal, founder of Ophion Security—live from fwd:cloudsec 2024. The trio discusses the importance of scanning in red teaming, managing attack surfaces, and how to handle large-scale cloud environments. They dive into the challenges of asset inventory, scaling security efforts, and the need for empathy when working with development teams on vulnerability remediation. Jonathan and Rojan also share insights from their latest projects, including open-source tools and live security exercises. This episode is packed with practical advice for organizations looking to strengthen their security posture. </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.ophionsecurity.com/">https://www.ophionsecurity.com/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.securityrunners.io/">https://www.securityrunners.io/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1653843</link>
      <enclosure url="https://content.rss.com/episodes/266257/1653843/modern-cyber-with-jeremy-snyder/2024_09_12_12_05_25_12efb64a-1854-4cbf-b361-2d93068be1ca.mp3" length="24640409" type="audio/mpeg"/>
      <guid isPermaLink="false">22295475-9949-4311-8551-78973e6b3159</guid>
      <itunes:duration>1539</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 Sep 2024 12:13:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240912_120909_d22bcb34b9334e6d4e09c1dabbbd55f7.png"/>
    </item>
    <item>
      <title><![CDATA[Dustin Lehr of Katilyst]]></title>
      <itunes:title><![CDATA[Dustin Lehr of Katilyst]]></itunes:title>
      <description><![CDATA[<p>In this episode, Jeremy talks with Dustin Lehr, co-founder and Chief Product and Technology Officer at Katilyst, about the role of security champion programs in fostering culture change within organizations. Drawing from his extensive background as a software engineer and application architect, Dustin shares insights on building effective security champions programs, why they're essential for companies, and how they facilitate cultural shifts towards better security practices. The discussion covers the use of gamification, fostering long-term engagement, and practical strategies to create a successful security culture.</p><p><strong>About Dustin Lehr</strong></p><p>Dustin Lehr is the co-founder and Chief Product and Technology Officer at Katilyst, where he focuses on helping companies drive cultural change through security champion programs. Prior to his leadership role in cybersecurity, Dustin spent over 13 years as a software engineer and application architect across various industries, including retail, defense, and video gaming. His experience in both development and security enables him to bridge gaps between engineering teams and security professionals. In addition to his work at Katilyst, Dustin co-founded "Let’s Talk Software Security," a global virtual meetup group, and authored the Security Champion Program Success Guide. He holds a computer science degree from Colorado State University and a variety of industry certifications. </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.meetup.com/lets-talk-software-security/">https://www.meetup.com/lets-talk-software-security/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://securitychampionsuccessguide.org/">https://securitychampionsuccessguide.org/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.katilyst.com/">https://www.katilyst.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1643752</link>
      <enclosure url="https://content.rss.com/episodes/266257/1643752/modern-cyber-with-jeremy-snyder/2024_09_05_12_46_56_857f1f3e-f716-4969-a5f1-cbb82a2f46e2.mp3" length="39532713" type="audio/mpeg"/>
      <guid isPermaLink="false">7d33aaf8-900b-419a-83ae-9757eb8125a9</guid>
      <itunes:duration>2470</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 Sep 2024 14:41:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240905_120934_cffb21526b3f38af57e8475407f6d208.png"/>
    </item>
    <item>
      <title><![CDATA[Zack Glick of Zatik Security]]></title>
      <itunes:title><![CDATA[Zack Glick of Zatik Security]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy Snyder speaks with Zack Glick, founder of Zatik Security, live from fwd:cloudsec 2024. Zack shares insights from his extensive experience in cloud incident response, including his time at AWS, where he handled major incidents like Heartbleed and Log4j. He discusses the importance of maintaining calm during high-pressure situations and the unique challenges of managing cloud-based incidents, emphasizing the role of the incident commander over the technical responder. The conversation also touches on Zack's transition to founding Zatik Security, a company offering fractional application security services tailored for small businesses, and the broader challenges and innovations in cloud security today. </p><p><strong>About Zack Glick</strong></p><p>Zack Glick is a co-founder and CTO at Zatik Security, a company providing fractional application security services for small and medium-sized businesses. Before starting Zatik, Zack spent eight years at AWS, where he played a key role in cloud incident response, handling some of the most significant security events in the industry. Zack's experience also includes time at New Relic, where he further honed his expertise in cybersecurity. He now focuses on helping small businesses build robust security strategies and navigate complex vendor management requirements. </p><p>Zatik Security Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.zatik.io/">https://www.zatik.io/</a> </p><p>Zack Glick LinkedIn - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/zglick/">https://www.linkedin.com/in/zglick/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1634033</link>
      <enclosure url="https://content.rss.com/episodes/266257/1634033/modern-cyber-with-jeremy-snyder/2024_08_29_13_18_41_efa623ca-aed5-4c7a-9d09-13c91cdcb802.mp3" length="21282525" type="audio/mpeg"/>
      <guid isPermaLink="false">cb253f0c-49a5-4c30-8cf4-23ed3bdff31c</guid>
      <itunes:duration>1330</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 29 Aug 2024 16:28:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240829_010823_bb192aa2a61472b2762e264f9c370ba2.png"/>
    </item>
    <item>
      <title><![CDATA[Dirk Schrader of Netwrix]]></title>
      <itunes:title><![CDATA[Dirk Schrader of Netwrix]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, host Jeremy Snyder talks with Dirk Schrader, VP of Security Research at Netwrix, and a seasoned expert with over 25 years in IT security. The conversation starts with the intriguing parallels between anti-submarine warfare and identity threat detection, exploring how tactics used to track submarines can inform cybersecurity strategies. Dirk also shares his insights on the importance of collaboration in cybersecurity, the challenges of detecting sophisticated threats, and the evolving landscape of cyber resilience. This episode is a must-listen for anyone interested in understanding how historical military strategies can provide valuable lessons for modern cybersecurity challenges.</p><p>About Dirk Schrader: </p><p>Dirk Schrader is the Vice President of Security Research at Netwrix, where he focuses on advancing cyber resilience as a modern approach to tackling cyber threats. He also holds the title of Resident CISO for EMEA. With over 25 years of experience in IT security, Dirk specializes in research for critical industries such as healthcare, energy, and finance—sectors that are frequently targeted by cyberattacks. He holds prestigious certifications including CISSP from ISC2 and CISM from ISACA. Dirk is known for his deep understanding of cybersecurity strategies, particularly in how traditional military tactics can be applied to modern cyber defense. </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.netwrix.com/">https://blog.netwrix.com/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://en.wikipedia.org/wiki/Anti-submarine_warfare">https://en.wikipedia.org/wiki/Anti-submarine_warfare</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://en.wikipedia.org/wiki/List_of_submarine_operators">https://en.wikipedia.org/wiki/List_of_submarine_operators</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1622660</link>
      <enclosure url="https://content.rss.com/episodes/266257/1622660/modern-cyber-with-jeremy-snyder/2024_08_22_12_08_35_d3dcc0de-b354-4755-935a-a0d47c863e5e.mp3" length="41994911" type="audio/mpeg"/>
      <guid isPermaLink="false">fcc8fb52-5115-490b-9d46-99d839226ecc</guid>
      <itunes:duration>2624</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Aug 2024 15:04:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240822_110835_2bd60ae3817b06962e042a01ea1cd1f5.png"/>
    </item>
    <item>
      <title><![CDATA[Javvad Malik of KnowBe4]]></title>
      <itunes:title><![CDATA[Javvad Malik of KnowBe4]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy chats with Javvad Malik, the Lead Security Awareness Advocate at KnowBe4, to discuss the intricacies of security awareness in today's cybersecurity landscape. Javvad, a seasoned IT security professional with over 20 years of experience, shares his unique insights on how security awareness goes beyond just training and compliance. He argues for a more behavioral and culturally-oriented approach, emphasizing the importance of storytelling and human-centered design in fostering a security-conscious environment. Touching on the shortcomings of traditional security training, the role of compliance, and the power of simplicity in security awareness, Javvad also describes the significance of building positive relationships between security teams and the broader organization to prevent issues like shadow IT and security fatigue.</p><p><strong>About Javvad</strong></p><p>Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, based in London, with over two decades of experience in IT security. His career spans roles as a security administrator, consultant, industry analyst, and advocate. Javvad is not only a multi-award-winning professional but also holds a Guinness World Record for the most views of a cybersecurity lesson on YouTube in 24 hours. He is passionate about helping organizations understand the value of security awareness and how it can be integrated into every facet of an organization. Through his engaging blog posts, videos, podcasts, and public speaking events, Javvad continues to influence the cybersecurity landscape. He holds key certifications, including SSCP and CISSP, and is known for his practical and human-centric approach to cybersecurity. </p><p>Guinness World Record - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=fI6s-NqbqPs">https://www.youtube.com/watch?v=fI6s-NqbqPs</a> </p><p>Javvad's YouTube Channel - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/InfosecCynic">https://www.youtube.com/InfosecCynic</a> </p><p>Deceptive Design - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.deceptive.design/">https://www.deceptive.design/</a></p><p>KnowBe4 - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.knowbe4.com/">https://www.knowbe4.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1613305</link>
      <enclosure url="https://content.rss.com/episodes/266257/1613305/modern-cyber-with-jeremy-snyder/2024_08_15_11_44_35_60ef9050-4cb6-4998-8ee5-0d5b0db005c1.mp3" length="34061209" type="audio/mpeg"/>
      <guid isPermaLink="false">46fa5c15-a630-4d54-9ca2-3080076b3178</guid>
      <itunes:duration>2128</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Aug 2024 17:10:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240815_110813_d91dcee56ea0b896d5299c65ba1e74c3.png"/>
    </item>
    <item>
      <title><![CDATA[Marina Segal of Tamnoon]]></title>
      <itunes:title><![CDATA[Marina Segal of Tamnoon]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy catches up with Marina Segal of Tamnoon at fwd:cloudsec 2024. Across the course of the conversation, the pair discuss Marina's long career in cloud security, the evolution of the threat landscape and the increasingly complex alphabet soup of security solutions in the market. Covering the challenges of managing misconfigurations, the importance of prioritizing risks, and the debate around automated remediation, Marina also offers valuable insights into striking the right balance between technology and human intervention in cloud security operations. This episode is packed with practical advice for security professionals aiming to navigate the complexities of cloud environments.</p><p><strong>About Marina Segal</strong></p><p>Marina Segal is the Founder and CEO of Tamnoon, a company dedicated to advancing cloud security. With a career spanning roles from a consultant at Deloitte to a key player in the development of cloud security technologies, Marina has been at the forefront of the industry. Her expertise includes working on CNAPP and CSPM tools, and she played a significant role in shaping cloud security best practices. Prior to founding Tamnoon, Marina contributed to the success of several cloud security initiatives, including Dom9 and Checkpoint, where she honed her skills in product management and cybersecurity strategy. Her passion for cloud security continues to drive her work at Tamnoon, where she focuses on solving the industry's most pressing challenges.</p><p>Tamnoon Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://tamnoon.io/">https://tamnoon.io/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1603399</link>
      <enclosure url="https://content.rss.com/episodes/266257/1603399/modern-cyber-with-jeremy-snyder/2024_08_08_16_08_09_97926393-ee01-4d9c-b4d8-c8fa81c2639c.mp3" length="22510907" type="audio/mpeg"/>
      <guid isPermaLink="false">e69d3463-ee98-4f79-add5-e85f1cca653f</guid>
      <itunes:duration>1406</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 08 Aug 2024 16:13:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240808_040850_b9aa303185c07be8b28e2b974f7f9d1f.png"/>
    </item>
    <item>
      <title><![CDATA[Johannes Wiklund of Jotform]]></title>
      <itunes:title><![CDATA[Johannes Wiklund of Jotform]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, host Jeremy sits down with Johannes Wiklund, the Head of Information Security at JotForm. Johannes shares his extensive expertise in the field of information security, detailing how he balances a wide range of responsibilities from application security to compliance functions, including HIPAA, SOC2, and FedRAMP. Learn about JotForm's approach to product security, the integration of bug bounty programs, and the implementation of static code analysis tools like Semgrep. Johannes also discusses the challenges of maintaining a secure SaaS platform used by millions, including major corporations, and shares his thoughts about Black Hat, B-Sides and DEF CON happening in Vegas this week. This episode is a must-listen for anyone interested in the intersection of cybersecurity and product management in the SaaS industry.</p><p>About Johannes Wiklund</p><p>Johannes Wiklund is the Head of Information Security at JotForm, a leading SaaS application for creating online forms. With close to three years at JotForm, Johannes has been instrumental in shaping the company's information security strategy and implementation. He oversees multiple teams, including AppSec, cloud infrastructure, incident response, and governance and compliance. Johannes brings a wealth of experience in leveling up security programs for late-stage startups and has a comprehensive background in managing compliance functions such as HIPAA, SOC2, and FedRAMP/StateRAMP. His approach to security includes integrating tools like Semgrep for static code analysis and running an invitation-only bug bounty program through HackerOne. Johannes is also known for his proactive stance on data security and his ability to guide product security decisions, making him a pivotal figure in the cybersecurity landscape.</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1600379</link>
      <enclosure url="https://content.rss.com/episodes/266257/1600379/modern-cyber-with-jeremy-snyder/2024_08_06_13_34_25_6e6b3a19-827d-461a-bd3e-1adbd40833b5.mp3" length="33268341" type="audio/mpeg"/>
      <guid isPermaLink="false">d24e9091-2996-438f-bd27-1c1146a8568a</guid>
      <itunes:duration>2079</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 06 Aug 2024 15:25:31 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240806_010859_c4116b40e5d59a77f8014a8c7381bef0.png"/>
    </item>
    <item>
      <title><![CDATA[Shauli Rozen of ARMO]]></title>
      <itunes:title><![CDATA[Shauli Rozen of ARMO]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy speaks with Shauli Rozen, co-founder and CEO of ARMO, the company behind Kubescape. They explore the evolving landscape of cloud security, delving into the complexities of Kubernetes security and the challenges of integrating various cloud security solutions. Shauli shares his expertise on the convergence of security products, the importance of contextual awareness in identifying attack patterns, and the reality versus the concept of platformization in cloud security. They also discuss the emerging buzzword CNAP, the potential pitfalls of bundling security solutions, and the need for greater awareness and concern regarding cloud security threats. Join us for a compelling conversation that sheds light on the current state and future of cloud security. </p><p><strong>About Shauli Rozen</strong></p><p>Shauli is the co-founder and CEO of ARMO, a pioneering company in cloud-native security solutions, and the driving force behind Kubescape, an open-source Kubernetes security platform. With a wealth of experience in the cloud security space, Shauli has a deep understanding of the challenges and intricacies of protecting modern cloud environments. His career is marked by a passion for product creation and innovation in security, focusing on developing solutions that integrate runtime and configuration security to enhance overall cloud security posture. Shauli is known for his practical approach to cybersecurity, emphasizing the importance of synergy between different security products and the need for continuous hardening and contextual awareness. He actively engages with the security community, sharing insights and fostering discussions on emerging trends and best practices in cloud security. </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.armosec.io/">https://www.armosec.io/</a> </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/kubescape/kubescape">https://github.com/kubescape/kubescape</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1571740</link>
      <enclosure url="https://content.rss.com/episodes/266257/1571740/modern-cyber-with-jeremy-snyder/2024_07_17_14_23_23_c840c515-837a-4e32-83fa-fe43245e6e8b.mp3" length="33730186" type="audio/mpeg"/>
      <guid isPermaLink="false">9ed2ce10-a4b7-4ad4-854e-0aa62a1f56f2</guid>
      <itunes:duration>2108</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 Aug 2024 15:56:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240717_020756_6dca0e7126c9b35f83c5f580fe47063a.png"/>
    </item>
    <item>
      <title><![CDATA[Noah McDonald of Google Cloud]]></title>
      <itunes:title><![CDATA[Noah McDonald of Google Cloud]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy meets with Noah McDonald from Google Cloud to talk about the intricacies and best practices of incident response in cloud environments. Noah shares valuable insights into identifying and mitigating cyber threats, the importance of understanding your environment's architecture, and the critical role of logging and threat modeling. The discussion covers the challenges of responding to breaches, the process of forensic analysis, and the importance of timely and transparent communication with clients. Filmed live at fwd:cloudsec 2024 in Arlington, Virginia, this is an episode you don't want to miss. </p><p><strong>About Noah McDonald</strong></p><p>Noah is an experienced security engineer at Google Clou where he helps clients optimize and secure their cloud environments. He is also an Advisory Board Member at Fulton-Montgomery Community College, contributing to cybersecurity education. Previously, he held key roles at Palo Alto Networks Unit 42 and EY, where he provided advanced digital forensics and cybersecurity consulting services. With a strong background in both technical and advisory capacities, Noah is a respected professional in the cybersecurity industry.</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1571633</link>
      <enclosure url="https://content.rss.com/episodes/266257/1571633/modern-cyber-with-jeremy-snyder/2024_07_17_12_40_07_cbdf899f-c7b7-48a0-a4fa-44d393f24842.mp3" length="30962042" type="audio/mpeg"/>
      <guid isPermaLink="false">d97255f3-c03f-4b4e-bd17-00d06eeac66b</guid>
      <itunes:duration>1935</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 30 Jul 2024 14:18:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240717_120742_babb35421b58a959844635fd42367acd.png"/>
    </item>
    <item>
      <title><![CDATA[Steve Stratton of Pratton Media]]></title>
      <itunes:title><![CDATA[Steve Stratton of Pratton Media]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy Snyder talks to Steve Stratton, a seasoned cybersecurity expert with a diverse background spanning military service, US Secret Service, and software development for classified data transfer. They discuss the evolution of technology from analog to digital, the emergence of early cyber threats, and the complexities of modern cybersecurity. Steve emphasizes the importance of adaptability, the role of social engineering in early cyber attacks, and the need for cybersecurity vendors to integrate seamlessly into the customer's environment. The conversation also delves into the nuances of cross-domain solutions, high assurance systems, and the cost challenges faced by private sector organizations in implementing these technologies.</p><p><strong>About Steve Stratton</strong></p><p>Steve Stratton has had an illustrious career in cybersecurity, beginning with his service in the military, where he worked in White House Communications and as a Special Forces Senior Weapons and Communications Sergeant. He later joined the US Secret Service before transitioning to develop software solutions for the warfighter and intelligence community. Steve holds a BA in Management and numerous technical certifications from Sun Microsystems, Novell, Cisco, and others. With extensive experience in cybersecurity, Steve is a respected advisor and author, contributing significant insights to the field, particularly in cross-domain solutions and high assurance systems.</p><p>Citibank Vax Hack: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.cybereason.com/blog/malicious-life-podcast-the-real-story-of-citibanks-10m-hack">https://www.cybereason.com/blog/malicious-life-podcast-the-real-story-of-citibanks-10m-hack</a></p><p>Shadow Tier: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/Shadow-Tier-SHADOW-TIER-Book-ebook/dp/B0CTXNC734/ref=sr_1_2?c[…]igital-text&amp;sprefix=steve+stratton%2Cdigital-text%2C70&amp;sr=1-2">https://www.amazon.com/Shadow-Tier-SHADOW-TIER-Book-ebook/dp/B0CTXNC734/ref=sr_1_2?c[…]igital-text&amp;sprefix=steve+stratton%2Cdigital-text%2C70&amp;sr=1-2</a> </p><p>Warrior’s Path: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.amazon.com/Warriors-Path-Lance-Origin-SHADOW-ebook/dp/B0D482MDHG/ref=sr_[…]igital-text&amp;sprefix=steve+stratton%2Cdigital-text%2C70&amp;sr=1-1">https://www.amazon.com/Warriors-Path-Lance-Origin-SHADOW-ebook/dp/B0D482MDHG/ref=sr_[…]igital-text&amp;sprefix=steve+stratton%2Cdigital-text%2C70&amp;sr=1-1</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1561498</link>
      <enclosure url="https://content.rss.com/episodes/266257/1561498/modern-cyber-with-jeremy-snyder/2024_07_09_09_44_02_d08496ff-057e-4dfd-a1f1-238cc8a929b6.mp3" length="38789999" type="audio/mpeg"/>
      <guid isPermaLink="false">6a881704-676a-4549-b7a8-45d53cce1d7e</guid>
      <itunes:duration>2424</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 Jul 2024 13:57:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240709_090735_baf7079a546c2684f30e0ad0156cf375.png"/>
    </item>
    <item>
      <title><![CDATA[Breach Alert at Authy]]></title>
      <itunes:title><![CDATA[Breach Alert at Authy]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy talks to Viktor Markopoulos, a security researcher, about a recent breach of the MFA service Authy. They discuss how the breach exposed over 33 million phone numbers and account details due to broken authentication and lack of rate limiting. They highlight the ongoing challenges in API security, especially concerning multi-factor authentication systems and the vulnerabilities they present. </p><p><strong>About Viktor Markopoulos</strong></p><p>Viktor Markopoulos is a security researcher with extensive experience in analyzing and mitigating cybersecurity threats. He specializes in API security and has contributed to numerous security incident reports, helping organizations understand and address their vulnerabilities. Viktor is known for his expertise in authentication issues and his ability to break down complex security breaches for broader audiences.</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1561496</link>
      <enclosure url="https://content.rss.com/episodes/266257/1561496/modern-cyber-with-jeremy-snyder/2024_07_09_09_40_03_ae333c31-f171-448c-9a3a-470ca7d422e9.mp3" length="8249304" type="audio/mpeg"/>
      <guid isPermaLink="false">cba628b3-2c83-4d04-b781-fdbdf1328495</guid>
      <itunes:duration>515</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 11 Jul 2024 09:08:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240709_090756_a5e81be1b7b8e625ede6128b30896925.png"/>
    </item>
    <item>
      <title><![CDATA[Stuart Seymour of VirginMedia O2]]></title>
      <itunes:title><![CDATA[Stuart Seymour of VirginMedia O2]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Stuart Seymour of VirginMedia O2 for an in-person chat about crisis management. Recorded live at Infosecurity Europe 2024, Stuart joins us fresh from a panel discussion on the Keynote stage about 'Responding to the Unimaginable'. Jeremy and Stuart dive into the importance of flexibility and empowerment when planning for and responding to a crisis. The pair discuss the changing regulatory environment, the new era on personal liability for Information Security leaders in the US, how different things define what might be considered a crisis from one organization to another and what Stuart has enjoyed most about Infosecurity Europe 2024.</p><p><strong>About Stuart Seymour</strong></p><p>Stuart is Group Chief Security Officer (Group CISO and CSO) at Virgin Media O2. Stuart is proudly dyslexic and a Cyber Security and Physical Security Leader with over 25 years of global remit and experience. Stuart has a proven track record of building Security Functions and teams globally at major multinationals. He was ranked #1 CISO at the CSO 30UK awards in 2023 and received an award for Diversity and Inclusion for his work on Neurodiversity the same year. Multilingual with global experience in security consultancy, physical security, cyber security, cyber incident response and all aspects of business resilience, Stuart has designed, managed and delivered complex, fiscally prudent physical and cyber security solutions / programs finding the balance between security, availability and business enablement. Stuart has an ability to lead a diverse and virtual workforce spread across four continents during periods of significant pressure, recognised for developing and mentoring staff to achieve more than is expected of them.</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1551124</link>
      <enclosure url="https://content.rss.com/episodes/266257/1551124/modern-cyber-with-jeremy-snyder/2024_07_01_11_00_39_0d9cd6a1-ecfd-433a-b849-1ac0072520a2.mp3" length="33876889" type="audio/mpeg"/>
      <guid isPermaLink="false">c1018b9e-c554-468e-95ad-d900655e5990</guid>
      <itunes:duration>2117</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 04 Jul 2024 08:33:49 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240701_110716_5f746aed1e0b28ac91960c70dce8b074.png"/>
    </item>
    <item>
      <title><![CDATA[Tanya Janca of Semgrep]]></title>
      <itunes:title><![CDATA[Tanya Janca of Semgrep]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy Snyder chats with Tanya Janca, the head of education and community at Semgrep. They delve into the concept of secure guardrails in application security, emphasizing how these mechanisms guide developers towards secure coding practices without disrupting their workflow. Tanya shares insights from her extensive experience, highlighting the balance between nudging developers with guardrails and enforcing critical controls to ensure security. The conversation covers real-world scenarios, including Tanya's adventures with guardrails at Microsoft and the importance of contextualizing security alerts to avoid alert fatigue among developers.</p><p><strong>About Tanya Janca</strong></p><p>Tanya Janca, also known as SheHacksPurple, is a renowned figure in cybersecurity with over 25 years of experience in IT and coding. She is the bestselling author of "Alice and Bob Learn Application Security" and an award-winning public speaker who has delivered hundreds of talks across six continents. As the head of education and community at Semgrep, Tanya focuses on creating and sharing content and training to promote secure software development. She is also an active blogger and a strong advocate for diversity, inclusion, and kindness in the tech community.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://semgrep.dev/https://shehackspurple.ca/">https://semgrep.dev/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://semgrep.dev/https://shehackspurple.ca/">https://shehackspurple.ca/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1538376</link>
      <enclosure url="https://content.rss.com/episodes/266257/1538376/modern-cyber-with-jeremy-snyder/2024_06_26_07_01_13_18cb9479-959c-4ce4-bde5-93b95b90d285.mp3" length="43665493" type="audio/mpeg"/>
      <guid isPermaLink="false">39dbeb24-0795-4a9e-8a29-82344b01e062</guid>
      <itunes:duration>2729</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 Jun 2024 11:13:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240625_090652_87bb1e0b618b3287aa559ca6aad7c830.png"/>
    </item>
    <item>
      <title><![CDATA[Alexey Sapozhnikov of Andeavour]]></title>
      <itunes:title><![CDATA[Alexey Sapozhnikov of Andeavour]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy talks to Alexey Sapozhnikov, CEO of Andeavour, about AI's role in cybersecurity. They discuss how AI can reduce workload in security operations, challenges of AI compliance with regulations like the European AI Act, and the future impact of AGI. Alexey highlights the necessity of ethical considerations in AI, the potential for AGI to revolutionize industries, and introduces Andeavour's AI-driven solutions for cybersecurity, sanctions compliance, and HR analytics.</p><p><strong>About Alexey Sapozhnikov</strong></p><p>Alexey Sapozhnikov is the CEO of Andeavour, specializing in organizational intelligence through AI. With a rich background in AI and data science, Alexey has developed solutions for cybersecurity, sanctions compliance, and HR analytics. He is a thought leader in AI compliance and the future of AGI, contributing valuable insights to the cybersecurity community.</p><p>Andeavour Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://andeavour.io/">https://andeavour.io/</a> </p><p>Alexey Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/alexey-sapozhnikov-%E2%98%81-88494a2/">https://www.linkedin.com/in/alexey-sapozhnikov-%E2%98%81-88494a2/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1530991</link>
      <enclosure url="https://content.rss.com/episodes/266257/1530991/modern-cyber-with-jeremy-snyder/2024_06_19_11_47_22_9357e128-2b95-439f-9891-aaf267e9795e.mp3" length="37972889" type="audio/mpeg"/>
      <guid isPermaLink="false">0118df48-5a78-406c-a8a5-2be0b0bb2e44</guid>
      <itunes:duration>2373</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 Jun 2024 15:42:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240619_110648_95b9ed925e2f6a4bb1142d900d856ea5.png"/>
    </item>
    <item>
      <title><![CDATA[Scott McCrady of SolCyber]]></title>
      <itunes:title><![CDATA[Scott McCrady of SolCyber]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy interviews Scott McCrady to explore the cybersecurity landscape in the US and Asia Pacific. They discuss the US's susceptibility to cyberattacks due to its market size and technological integration, compared to Asia's diverse and dispersed threat environment.</p><p>They highlight the differences in attack patterns, with the US facing more phishing and reconnaissance, while Asia encounters targeted DDoS attacks often linked to competitive tactics. This is an episode you don't want to miss. Check it out now.</p><p><strong>About Scott McCrady</strong></p><p>Scott is the CEO of SolCyber, with over 25 years of experience in the cybersecurity industry. He has held leadership roles at companies such as FireEye, IBM, and Symantec, focusing on driving growth and innovation in cybersecurity solutions. Scott has a strong background in managing global teams and developing strategic initiatives to enhance organizational security. He is passionate about the cybersecurity landscape in Asia, having spent significant time in the region, and is committed to improving cybersecurity practices worldwide. He is also the host of Security Shorts with Scott.</p><p><strong>Relevant links</strong></p><p>Security Shorts with Scott - <a target="_blank" rel="noopener noreferrer nofollow" href="https://open.spotify.com/show/0YRGrauXqhQRgFcqCCcm4e">https://open.spotify.com/show/0YRGrauXqhQRgFcqCCcm4e</a></p><p>SolCyber Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://solcyber.com/">https://solcyber.com/</a></p><p>Scott’s LinkedIn - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/scottmccrady/">https://www.linkedin.com/in/scottmccrady/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1522520</link>
      <enclosure url="https://content.rss.com/episodes/266257/1522520/modern-cyber-with-jeremy-snyder/2024_06_12_15_17_46_bdfbb4fd-d867-4c0a-b437-5b2525746dd2.mp3" length="23758933" type="audio/mpeg"/>
      <guid isPermaLink="false">0f1e1213-bf44-425b-8221-2a8f100bd0af</guid>
      <itunes:duration>1484</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Jun 2024 06:57:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240612_030624_501cf909d871f2e084f67fed4ef3c29b.png"/>
    </item>
    <item>
      <title><![CDATA[Steve Orrin of Intel]]></title>
      <itunes:title><![CDATA[Steve Orrin of Intel]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Steve Orrin, CTO and Senior PE at Intel Federal, to discuss organizational and technological strategies in cybersecurity. They explore the challenges of communication within organizations, the importance of product interoperability, and how NIST publications can guide cybersecurity practices. Steve emphasizes the need for clear communication across departments, the role of industry standards in product integration, and the practical use of NIST's various documents for effective cybersecurity implementation. He also highlights the significance of aligning security initiatives with business outcomes.</p><p><strong>About Steve Orrin</strong></p><p>Steve Orrin is a leading expert in cybersecurity with a focus on organizational and technological strategies. With extensive experience working on multiple security standards and guidance with NIST, Steve has a deep understanding of the challenges and solutions in the cybersecurity landscape. He is actively involved in various public sector initiatives and using commercial technologies to solve federal problems.</p><p>For more insights from Steve, see the links below...</p><p><strong>Relevant Links</strong></p><ul><li>Intel Public Sector <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.intel.com/content/www/us/en/government/public-sector-solutions-overview.html">https://www.intel.com/content/www/us/en/government/public-sector-solutions-overview.html</a></li><li>Steve on Linkedin: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/sorrin/">https://www.linkedin.com/in/sorrin/</a></li><li>NIST 800 Family of Documents: <a target="_blank" rel="noopener noreferrer nofollow" href="https://csrc.nist.gov/publications/sp800">https://csrc.nist.gov/publications/sp800</a></li><li>NIST CSF: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nist.gov/cyberframework">https://www.nist.gov/cyberframework</a></li><li>NIST 1800 Family of Documents: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.nist.gov/itl/publications-0/nist-special-publication-1800-series-general-information">https://www.nist.gov/itl/publications-0/nist-special-publication-1800-series-general-information</a></li><li>OCSF: <a target="_blank" rel="noopener noreferrer nofollow" href="https://schema.ocsf.io/">https://schema.ocsf.io/</a></li><li>FireTail Endpoint Security Blog: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.io/blog/i-was-wrong-about-endpoint-security">https://www.firetail.io/blog/i-was-wrong-about-endpoint-security</a></li></ul>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1505502</link>
      <enclosure url="https://content.rss.com/episodes/266257/1505502/modern-cyber-with-jeremy-snyder/2024_05_31_15_08_35_eacd24f2-ae15-4002-a60c-c919bf789e8b.mp3" length="31820948" type="audio/mpeg"/>
      <guid isPermaLink="false">87019e1c-a674-490c-8647-8b84a64e939f</guid>
      <itunes:duration>1988</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Jun 2024 08:54:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240531_030507_aba46eb7b22a4c18367181566ae59fd7.png"/>
    </item>
    <item>
      <title><![CDATA[Ryan Smith of QFunction]]></title>
      <itunes:title><![CDATA[Ryan Smith of QFunction]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Ryan Smith, founder of QFunction, to explore how combining AI with human expertise can streamline anomaly detection in cybersecurity. They discuss innovative AI models, ethical concerns around AI use, and the importance of transparency and collaboration in the tech industry. Ryan highlights the unique challenges faced by small to medium-sized businesses and underscores the potential for AI to drive positive change beyond profit-making. </p><p><strong>About Ryan Smith</strong></p><p>Ryan Smith is the founder of QFunction, a company dedicated to enhancing cybersecurity through the integration of AI and human expertise. With a background in computer science and extensive experience in cybersecurity for organizations like NASA JPL and Pfizer, Ryan has developed innovative solutions for anomaly detection and threat intelligence. He is passionate about making cybersecurity accessible to small and medium-sized businesses and advocates for ethical AI practices. </p><p>QFunction's website <a target="_blank" rel="noopener noreferrer nofollow" href="https://qfunction.ai">https://qfunction.ai</a> </p><p>Ryan on LinkedIn - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/ryan-smith-0390202b/">https://www.linkedin.com/in/ryan-smith-0390202b/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1498932</link>
      <enclosure url="https://content.rss.com/episodes/266257/1498932/modern-cyber-with-jeremy-snyder/2024_05_29_12_46_26_9f82e025-5171-4f27-8717-7dce01b5f94a.mp3" length="32308706" type="audio/mpeg"/>
      <guid isPermaLink="false">327de229-87c1-43d8-a93c-88553ac190d7</guid>
      <itunes:duration>2019</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 May 2024 16:01:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240529_120511_cf9e0d8cbd0faa5d061f9e4e6a8d1f82.png"/>
    </item>
    <item>
      <title><![CDATA[Craig Taylor of CyberHoot]]></title>
      <itunes:title><![CDATA[Craig Taylor of CyberHoot]]></itunes:title>
      <description><![CDATA[<p>In this episode of the Modern Cyber podcast, Jeremy talks to Craig Taylor of CyberHoot. The pair discuss critical aspects of cybersecurity, focusing on incident response, tabletop exercises, and the importance of regular testing and updating of backup systems. </p><p>Craig highlights the need for cyber literacy, emphasizing the frequent causes of breaches such as phishing, social engineering, and weak passwords. The discussion also touches on the role of AI in both aiding and combating cyber threats. AI helps hackers improve phishing emails and exploit vulnerabilities, but it also enhances intrusion detection systems by identifying anomalies quickly.</p><p>Craig shares an anecdote about a company where an HR employee was tricked into purchasing $26,000 worth of gift cards for a scammer posing as the CEO, highlighting the importance of cyber literacy training to prevent such incidents. He underscores that until cyber literacy is widely taught and enforced, phishing and social engineering will remain prevalent attack vectors. This is an episode you don't want to miss.</p><p><strong>About Craig Taylor</strong></p><p>Craig is a Certified Information Systems Security Professional (CISSP) since 2001, and a 25-year veteran in the field of cybersecurity. In 2014, he co-founded CyberHoot, a company dedicated to teaching cyber literacy skills through innovative training methods. Throughout his career, Craig has led cybersecurity efforts in various industries including web hosting (CSC), finance (JP Morgan Chase), and manufacturing (Vistaprint). Currently, he heads a cybersecurity consulting practice that delivers virtual Chief Information Security Officer (vCISO) services to over 40 companies.</p><p><strong>Relevant Links:</strong></p><p>LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/craigmtaylor/">https://www.linkedin.com/in/craigmtaylor/</a></p><p>CyberHoot Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://cyberhoot.com/">https://cyberhoot.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1490423</link>
      <enclosure url="https://content.rss.com/episodes/266257/1490423/modern-cyber-with-jeremy-snyder/2024_05_23_11_10_40_88f7ceee-51fc-48be-bbf4-f41e67b291da.mp3" length="40296742" type="audio/mpeg"/>
      <guid isPermaLink="false">933e17a5-5e6c-424c-a978-cb5136452cc8</guid>
      <itunes:duration>2518</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 May 2024 17:23:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240523_110513_872399c1d29f3c50debcdece7c53aa20.png"/>
    </item>
    <item>
      <title><![CDATA[Mikko Hypponen of WithSecure]]></title>
      <itunes:title><![CDATA[Mikko Hypponen of WithSecure]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy is at RSAC 2024 where he catches up in person with cybersecurity legend, Mikko Hypponen.</p><p>Fresh from his keynote on the 'First Decade of Corporate Ransomware', Mikko talks ransomware gangs, AI, quantum computing and the role of cyber in modern conflicts. This is an episode you don't want to miss.</p><p><strong>About Mikko Hypponen</strong></p><p>Mikko is a cybersecurity expert, speaker and author and currently the Chief Research Officer at WithSecure. He is well known for the Hypponen Law of IoT Security: "If It's Smart, It's Vulnerable," which is also the title of his latest book, which has been translated into five languages. During his long career - which has lasted over 30 years - he has accomplished many notable career achievements: he was selected as one of the 50 most important people on the web by the PC World magazine, and was included in Foreign Policy’s Top 100 Global Thinkers list. Mikko is an accomplished speaker, regularly presenting at prestigious conferences around the world like TED, SXSW, Black Hat, DEFCON, RSA, and more.</p><p>Mikko's Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://mikko.com/">https://mikko.com/</a></p><p>WithSecure Website: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.withsecure.com/en/home">https://www.withsecure.com/en/home</a></p><p>Mikko's Linkedin: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/hypponen/">https://www.linkedin.com/in/hypponen/</a></p><p>Mikko's X: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/mikko">https://twitter.com/mikko</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1480563</link>
      <enclosure url="https://content.rss.com/episodes/266257/1480563/modern-cyber-with-jeremy-snyder/2024_05_15_16_23_33_125b978b-e82b-4ebf-9cd4-f2924fafbb6f.mp3" length="38155955" type="audio/mpeg"/>
      <guid isPermaLink="false">d2a21dcc-7799-416d-a3e1-3de3907afb31</guid>
      <itunes:duration>2384</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 May 2024 12:34:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240516_120513_05c65c64991a7018a6b4a5e65c364041.png"/>
    </item>
    <item>
      <title><![CDATA[Breach Alert at Dell]]></title>
      <itunes:title><![CDATA[Breach Alert at Dell]]></itunes:title>
      <description><![CDATA[<p>In this special 'Breach Alert' episode of the Modern Cyber podcast, Jeremy talks to security researcher Viktor Markopoulos about a recent data breach at Dell.</p><p>The incident saw a threat actor gain access to a partner portal using dummy credentials. They then proceeded to scrape 49M records using a poorly secured API, requesting 5,000 records per hour for almost three weeks.</p><p>Watch the full episode as Jeremy and Viktor cover what want wrong and how to protect your APIs against similar attacks.</p><p>Subscribe to Modern Cyber with Jeremy Snyder to get instant access to all episodes including these 'Breach Alert' specials as they happen.</p><p><strong>Sources:</strong></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/">https://www.bleepingcomputer.com/news/security/dell-warns-of-data-breach-49-million-customers-allegedly-affected/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.pcworld.com/article/2328519/dell-data-breach-includes-your-id-and-detailed-hardware-info.html#:~:text=A%20hacker%20on%20the%20Dark,and%20order%20information%20was%20leaked">https://www.pcworld.com/article/2328519/dell-data-breach-includes-your-id-and-detailed-hardware-info.html</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://techcrunch.com/2024/05/09/dell-discloses-data-breach-of-customers-physical-addresses/#:~:text=Dell%20wrote%20that%20the%20information,malicious%20outsiders%20or%20inadvertent%20error">https://techcrunch.com/2024/05/09/dell-discloses-data-breach-of-customers-physical-addresses/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.securityweek.com/dell-says-customer-names-addresses-stolen-in-database-breach/">https://www.securityweek.com/dell-says-customer-names-addresses-stolen-in-database-breach/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1478694</link>
      <enclosure url="https://content.rss.com/episodes/266257/1478694/modern-cyber-with-jeremy-snyder/2024_05_14_12_14_04_d87e3abb-c636-4c8d-b4d8-84ed4c5b89c2.mp3" length="14807084" type="audio/mpeg"/>
      <guid isPermaLink="false">035ca7af-2a05-4303-bac1-9b4126ea6bd4</guid>
      <itunes:duration>925</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 14 May 2024 16:22:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240514_040517_66726d471f7e26dfd315e1cea3ee72bf.png"/>
    </item>
    <item>
      <title><![CDATA[Evgeniy Kharam of EK Cyber]]></title>
      <itunes:title><![CDATA[Evgeniy Kharam of EK Cyber]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy talks to cybersecurity veteran Evgeniy Kharam, about a broad range of industry topics including the complexities of managed security services and the importance of soft skills. Evgeniy also offers fascinating insights into the startup space, the factors driving technology adoption, and the evolving cybersecurity landscape. And Jeremy learns a bit about Evgeniy's upcoming book that covers soft skills, voice improvement, and overcoming burnout. Don't miss this highly entertaining and informative discussion. </p><p><strong>About Evgeniy Kharam</strong></p><p>With decades of cybersecurity experience, Evgeniy Kharam has worn many hats during his long and storied career. Beginning on the technical frontlines as a firewall deployment engineer, Evgeniy has served as cybersecurity architect, VP, CISO, evangelist, consultant, advisor and speaker. Evgeniy is also the co-founder and host of both the Security Architectures Podcast and Cyber Inspiration Podcast as well as organizing the unique 'Ski &amp; Snowboard Cybersecurity Conference'. </p><p>LinkedIn - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/ekharam/">https://www.linkedin.com/in/ekharam/</a> </p><p>SSCC Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://thesscc.ca/">https://thesscc.ca/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1472239</link>
      <enclosure url="https://content.rss.com/episodes/266257/1472239/modern-cyber-with-jeremy-snyder/2024_05_09_12_39_18_6945bc98-a4f6-4b7d-ad9d-6fdab6433ba1.mp3" length="36060308" type="audio/mpeg"/>
      <guid isPermaLink="false">21e0114c-54d7-4b0c-99db-e8bd2e672534</guid>
      <itunes:duration>2253</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 May 2024 18:43:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240509_120552_acad3b2d46bbaacb93caf2bd1bb56739.png"/>
    </item>
    <item>
      <title><![CDATA[Joe Saunders of RunSafe Security]]></title>
      <itunes:title><![CDATA[Joe Saunders of RunSafe Security]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, Jeremy sits down with Joe Saunders, CEO of RunSafe Security, to discuss what it to takes to prevent attackers from exploiting vulnerabilities. Joe highlights the prevalence of memory safety issues across critical infrastructure and discusses how RunSafe's unique technology offers a seamless solution without the need for hardware or code changes. With insights into the challenges of vulnerability management and the evolving threat landscape, this episode provides valuable perspectives on the future of cybersecurity.</p><p>About Joe Saunders</p><p>Joe Saunders is the CEO of RunSafe Security, a cybersecurity company specializing in protecting critical infrastructure against memory-based vulnerabilities. With an extensive background in cybersecurity, Joe leads RunSafe in its mission to make the world a safer place by fundamentally changing the economics of cyber defense.</p><p>RunSafe Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://runsafesecurity.com/">https://runsafesecurity.com/</a></p><p>Joe Saunders Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/joesaunders/">https://www.linkedin.com/in/joesaunders/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1460928</link>
      <enclosure url="https://content.rss.com/episodes/266257/1460928/modern-cyber-with-jeremy-snyder/2024_05_01_14_26_26_efc2f919-6af9-4b2b-8b71-5721ad38f871.mp3" length="35045712" type="audio/mpeg"/>
      <guid isPermaLink="false">f85639ca-2482-4e72-9f19-753cc3d9dc9d</guid>
      <itunes:duration>2190</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 02 May 2024 08:48:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240501_020506_e76e41474fd054af88b590a39f170809.png"/>
    </item>
    <item>
      <title><![CDATA[Sounil Yu of Knostic on NIST CSF Update & Governance]]></title>
      <itunes:title><![CDATA[Sounil Yu of Knostic on NIST CSF Update & Governance]]></itunes:title>
      <description><![CDATA[<p>In this episode of the Modern Cyber Podcast, Jeremy Snyder, CEO of FireTail, sits down with Sounil Yu, Co-founder of Knostic. With extensive experience as a former CISO and cybersecurity expert, Sounil discusses the recent update to the NIST Cybersecurity Framework and its impact on industry practices.</p><p>Join the conversation as Sounil shares insights into the complexities of cybersecurity governance and risk management. Learn how organizations can adapt to evolving threats and build robust cybersecurity frameworks tailored to their needs.</p><p><strong>About Sounil Yu:</strong></p><p>Sounil Yu is a cybersecurity luminary with a rich background as a former CISO and chief security scientist at Bank of America. He is renowned for his groundbreaking work in reshaping cybersecurity approaches, notably creating the Cyber Defense Matrix and the DIE triad.</p><p>As the Co-founder of Knostic, Sounil continues to push boundaries in the industry, offering innovative solutions to cybersecurity challenges. His expertise and thought leadership have earned him recognition as a leading figure in the cybersecurity community.</p><p>Knostic Website:  <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.knostic.ai/">https://www.knostic.ai/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1442376</link>
      <enclosure url="https://content.rss.com/episodes/266257/1442376/modern-cyber-with-jeremy-snyder/2024_04_18_13_02_08_bb45c53e-12e8-48bc-acfd-9c64a713f83f.mp3" length="22087097" type="audio/mpeg"/>
      <guid isPermaLink="false">e165ee74-7254-4145-a5f3-dc91cf96138b</guid>
      <itunes:duration>1380</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Apr 2024 09:12:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240418_010445_bfa00a17740a95f9519ba6c510049310.png"/>
    </item>
    <item>
      <title><![CDATA[Toby Amodio of MF&A]]></title>
      <itunes:title><![CDATA[Toby Amodio of MF&A]]></itunes:title>
      <description><![CDATA[<p>FireTail CEO Jeremy Snyder is joined by Toby Amodio, Director and Government Cyber Delivery Lead at MF &amp; Associates, for a lively discussion around cyber security topics such as risk, compliance, maturity and more.</p><p>Today’s episode of the Modern Cyber podcast will examine the Essential 8 in the context of cyber security to see how relevant it is today. Listen as they compare and contrast the E8 to the ISM in terms of what they address and what they lack.</p><p>Stay tuned to hear about how breaches can actually help team’s bolster their security postures and learn the best things you can do for your security posture, per Jeremy and Toby’s expertise. Whether a seasoned cybersecurity expert or a novice, this episode offers fresh cybersecurity perspective.</p><p>About Toby Amodio</p><p>Toby has previously held the Chief Information Security Officer roles at Australian Parliament House (Department of Parliamentary Services) and Australian Taxation Office. He is currently consulting with MF and Associates a Fujitsu company into Federal Government. Toby is a father to two young kids and is constantly trying to balance work, life and compliance.</p><p>Toby’s LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/toby-amodio-a58041b4/">https://www.linkedin.com/in/toby-amodio-a58041b4/</a></p><p>MF &amp; Associates: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.mfassociates.com.au/about-us">https://www.mfassociates.com.au/about-us</a></p><p>About Jeremy Snyder</p><p>Jeremy is founder and CEO at FireTail, an end-to-end API security platform that offers the inline, real-time, application-layer data needed to deliver true API security. Prevent breaches and protect your APIs from code to cloud with FireTail.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.io">https://www.firetail.io</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1442372</link>
      <enclosure url="https://content.rss.com/episodes/266257/1442372/modern-cyber-with-jeremy-snyder/2024_04_18_12_58_14_d3705ddc-f955-4324-a09d-0f4175b37e1d.mp3" length="41944337" type="audio/mpeg"/>
      <guid isPermaLink="false">8e131b3e-76ff-47c0-bac9-53a239819400</guid>
      <itunes:duration>2621</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 19 Apr 2024 16:35:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240418_120453_e8273112eed48a0e7d1717cf7b6bbb85.png"/>
    </item>
    <item>
      <title><![CDATA[Dan Grzelak of Plerion]]></title>
      <itunes:title><![CDATA[Dan Grzelak of Plerion]]></itunes:title>
      <description><![CDATA[<p>In the this episode of Modern Cyber, Jeremy is 'down under' in sunny Australia for an in-person chat with Daniel Grzelak. Dan is the Chief Innovation Officer at Plerion, an agentless cloud platform that allows clients to identify, prioritize and remediate the risks that matter most.</p><p>Jeremy and Dan discuss Dan's journey in cloud security, finding unintended and interesting uses for technology, modern attack paths, dealing with incidents when they happen and the importance of principles.</p><p><strong>About Dan Grzelak:</strong></p><p>Dan Grzelak is Chief Innovation Officer at Plerion where he leads technical security reasearch and evangelism for the cloud security platform. A seasoned CISO, Dan previously worked at Linktree and Atlassian.</p><p>Dan's Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/danielgrzelak/">https://www.linkedin.com/in/danielgrzelak/</a></p><p>Plerion Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://plerion.com/">https://plerion.com/</a></p><p>Plerion Blog - <a target="_blank" rel="noopener noreferrer nofollow" href="https://blog.plerion.com/">https://blog.plerion.com/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1442367</link>
      <enclosure url="https://content.rss.com/episodes/266257/1442367/modern-cyber-with-jeremy-snyder/2024_04_18_12_55_05_1e813777-693d-4cfe-904d-d4186df87fb3.mp3" length="35715492" type="audio/mpeg"/>
      <guid isPermaLink="false">da72ed22-8791-4583-9c9d-6e1e8b84f8a1</guid>
      <itunes:duration>2232</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 19 Apr 2024 16:35:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240418_120444_95fa69762da489de6ae406cd2bdaaad6.png"/>
    </item>
    <item>
      <title><![CDATA[Ian McKay of Kablamo]]></title>
      <itunes:title><![CDATA[Ian McKay of Kablamo]]></itunes:title>
      <description><![CDATA[<p>Join host Jeremy Snyder as he digs into the fascinating world of AWS and cybersecurity with none other than Ian McKay, a distinguished AWS Community Hero and Cloud Principal at Kablamo. Covering the dynamic intersection of cloud infrastructure, cybersecurity, and API protection, this episode covers the latest trends, innovative tools, and groundbreaking research reshaping the future of cloud security.</p><p><strong>About Ian McKay</strong></p><p>Ian McKay is not only a revered AWS Community Hero but also serves as a Cloud Principal at Kablamo, where he leads the charge in driving cloud transformation and security initiatives. With years of hands-on experience and a passion for innovation, Ian is on a mission to revolutionize the cybersecurity landscape. As the mastermind behind Forma 2, IAM Live, Permissions Cloud, and IAM Dataset, Ian's groundbreaking open-source projects are setting new standards in cloud security. Stay connected with Ian on social media and explore his thought-provoking research on his blog.</p><p>Connect with Ian:Twitter: <a target="_blank" rel="noopener noreferrer nofollow" href="https://twitter.com/IANN0036">https://twitter.com/IANN0036</a></p><p>LinkedIn: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/ian-mckay-431408156/">https://www.linkedin.com/in/ian-mckay-431408156/</a></p><p>GitHub: <a target="_blank" rel="noopener noreferrer nofollow" href="https://github.com/IANN0036">https://github.com/IANN0036</a></p><p>Explore Ian's Research:</p><p>Blog: <a target="_blank" rel="noopener noreferrer nofollow" href="https://onecloudplease.com/">https://onecloudplease.com/</a></p><p>Tune in now to gain invaluable insights from Ian's expertise as a Cloud Principal at Kablamo and unlock the secrets to fortifying your digital infrastructure against evolving threats. Don't miss out on this enlightening conversation shaping the future of cloud security!</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1442365</link>
      <enclosure url="https://content.rss.com/episodes/266257/1442365/modern-cyber-with-jeremy-snyder/2024_04_18_12_53_07_d05fcc08-51de-49ff-b697-0610f8170165.mp3" length="38758653" type="audio/mpeg"/>
      <guid isPermaLink="false">519a4ad3-135a-4533-bbd9-42bc0f323502</guid>
      <itunes:duration>2422</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 19 Apr 2024 16:35:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240418_120429_75348b2e770bb1787ef1bdff295eb191.png"/>
    </item>
    <item>
      <title><![CDATA[Christine Bejerasco of With Secure]]></title>
      <itunes:title><![CDATA[Christine Bejerasco of With Secure]]></itunes:title>
      <description><![CDATA[<p>In this episode of Modern Cyber, host Jeremy Snyder sits down with Christine Bejerasco, Chief Information Security Officer at WithSecure, to dive deep into the world of exposure management, cybersecurity, and the implications of regulatory frameworks like NIS 2. With insights spanning multiple parts, this conversation covers everything from the importance of asset inventory and third-party risk management to the potential impact of new directives on organizational security postures.</p><p>Join Jeremy and Christine as they explore the evolving landscape of cybersecurity, sharing valuable perspectives and practical advice for businesses looking to navigate the complexities of modern security challenges. Whether you're a seasoned cybersecurity professional or just starting out in the field, this episode offers valuable insights and actionable strategies to help you stay ahead in today's cyber-threat landscape.Don't miss out on this engaging discussion packed with expert insights and real-world examples. Tune in now to gain a deeper understanding of exposure management, regulatory compliance, and the future of cybersecurity in the digital age.</p><p><strong>About Christine Bejerasco</strong></p><p>Christine is the Chief Information Security Officer at WithSecure and a member of the Forbes Technology Council. She previously served as CTO at WithSecure and she has more than 20 years in the cybersecurity industry. Coming from a technical malware/threat-analysis background, Christine has always remained 'hands-on' in cybersecurity.  She's seen the threat landscape evolve and she has worked as a researcher and a leader of diverse global teams with really varied backgrounds.</p><p>Christine Bejerasco Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/christinebejerasco/">https://www.linkedin.com/in/christinebejerasco/</a></p><p>WithSecure Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.withsecure.com/en/home">https://www.withsecure.com/en/home</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXNpZ0lMQTB6Mk92SkxuQmp6QjJmUUVfMDdDd3xBQ3Jtc0tsNnZucURRbFpaY204Z3M1QnJyQ0ttQXFQNFN5MWZnZmNIVm02Z3BhOEpRbmNzTWRVdjlONHhrNjgweTVNSERPcVNZdDV1YXpwa1IxbEdoaEphQ0k1bVNTV002UXAzandUeEhBVDhOMXZqdl9lQnJSZw&amp;q=https%3A%2F%2Fwww.withsecure.com%2Fen%2Fhome&amp;v=ACn3D7gzG6o">‍</a>Why 2024 Will Be The Year Of Exposure Management by Christine Bejerasco for Forbes - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.forbes.com/sites/forbestechcouncil/2024/02/13/why-2024-will-be-the-year-of-exposure-management/">https://www.forbes.com/sites/forbestechcouncil/2024/02/13/why-2024-will-be-the-year-of-exposure-management/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqazlvRUQ0Z2JRSURjeWlreHpwUnBZTGRIa0Itd3xBQ3Jtc0tsQW9XN1JvRm1XZTN2cTdVYWNZYTN1cWtYR2JWcEdDeXoyMEcxZFdoSUh0YlVSRUFyUnpYRHFLal9weVVWd1lHVUxYY3FadVRmOV9RbjhUTndsaWZTcW5NU1lnTExrOUExV1Y1MUxSa25RdEdjOG1fbw&amp;q=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fforbestechcouncil%2F2024%2F02%2F13%2Fwhy-2024-will-be-the-year-of-exposure-management%2F&amp;v=ACn3D7gzG6o"><strong>‍</strong></a><strong>About Jeremy Snyder</strong></p><p>Jeremy is founder and CEO at FireTail, an end-to-end API security platform that offers the inline, real-time, application-layer data needed to deliver true API security. Prevent breaches and protect your APIs from code to cloud with FireTail.</p><p>‍<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.io">https://www.firetail.io</a></p><p></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1442362</link>
      <enclosure url="https://content.rss.com/episodes/266257/1442362/modern-cyber-with-jeremy-snyder/2024_04_18_12_50_20_fc92788c-4332-4bbb-b1ce-423da8050759.mp3" length="37063410" type="audio/mpeg"/>
      <guid isPermaLink="false">a89d5b4a-3cce-4c9e-be22-42621ac24132</guid>
      <itunes:duration>2316</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 19 Apr 2024 16:35:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240418_120458_f2b35a4a2530ef2d602bebf494986469.png"/>
    </item>
    <item>
      <title><![CDATA[Anthony Johnson of Delve Risk]]></title>
      <itunes:title><![CDATA[Anthony Johnson of Delve Risk]]></itunes:title>
      <description><![CDATA[<p>Welcome to the debut episode of Modern Cyber with Jeremy Snyder, where cybersecurity experts discuss the latest trends, challenges, and innovations shaping the industry. In this episode, Jeremy sits down with Anthony Johnson, CEO of Delve Risk, to dive deep into the complexities of cybersecurity in the modern era.</p><p>From discussing real-world examples of cyber threats to exploring the impact of political decisions on global cybersecurity landscapes, Jeremy and Anthony cover it all. They delve into the intricacies of cybersecurity for small to medium-sized businesses (SMBs), highlighting the challenges faced by these organizations in the face of evolving cyber threats.Join the conversation as they explore the trade-offs between best-in-breed and best-of-suite cybersecurity solutions, the accelerating trend of consolidation in the cybersecurity space, and the importance of integrating security into the fabric of business operations.Don't miss out on valuable insights into the ever-changing world of cybersecurity and how organizations can stay ahead of the curve.</p><p><strong>About Anthony Johnson</strong></p><p>Anthony Johnson is a former CISO at multiple Fortune 100 companies, Fannie Mae, JP Morgan Chase Corporate Investment Bank and GE Treasury included. He's currently a Managing Partner at Delve Risk, a market research firm focused on cybersecurity and innovative technologies.He's a sitting board member of multiple companies, a mentor and coach to multiple Fortune 500 CISOs, and an active advisor and investor to a number of cybersecurity startups.Antony Johnson</p><p>Linkedin - <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/anthony-johnson-delverisk/">https://www.linkedin.com/in/anthony-johnson-delverisk/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbnhJSy13RzE3eFc3bl9ibVc2M0c3NnRDSWMtd3xBQ3Jtc0trSFBBdUI1OGVvNld1QUg4NnVaMTVDZGh2TTFpUEJENDU4M0x3WmlQOHNkd002cEpuYS1NeXFpdUUxaUtmMGZVZVBjaDVDNW04ZlpBVko5aFo4RzFQMVBXX3MwN1JuUGxSMS0xZG5JUVR5ZXhiOGJQbw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fanthony-johnson-delverisk%2F&amp;v=bzmkuejMvzw">‍</a>Delve Risk Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://delverisk.com/">https://delverisk.com/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbVlTUXRCdDNiZ3NBbUNoeWhQWkJ2RzhGWXMwQXxBQ3Jtc0tsWElGT3hRRllRVHJQSUhhdlNmUGtjMEdqRENyeHlsSVFRempjZ1gzS3pRR2hleDdsTE4tVkNEOTdIZFNCbHNYd3dzTGQ2bWxneFdleWF3NG1NbXVYZ2tUekhXdVRORnNud0ptTmZhT0RfcVRlYlJkZw&amp;q=https%3A%2F%2Fdelverisk.com%2F&amp;v=bzmkuejMvzw"><strong>‍</strong></a><strong>About Jeremy Snyder</strong></p><p>Jeremy is founder and CEO at FireTail, an end-to-end API security platform that offers the inline, real-time, application-layer data needed to deliver true API security. Prevent breaches and protect your APIs from code to cloud with FireTail. ‍<a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.io">https://www.firetail.io</a></p><p>‍</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1441088</link>
      <enclosure url="https://content.rss.com/episodes/266257/1441088/modern-cyber-with-jeremy-snyder/2024_04_17_17_12_08_3bc55cff-a509-40ab-b145-aade16978b2e.mp3" length="35310907" type="audio/mpeg"/>
      <guid isPermaLink="false">d1a2a8ed-6c3b-434e-ba99-ab24abccde63</guid>
      <itunes:duration>2206</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 Apr 2024 13:04:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240418_120432_f78eaf844ebba1b18d7879017d6ef5cb.png"/>
    </item>
    <item>
      <title><![CDATA[Noora Ahmed-Moshe of Hoxhunt]]></title>
      <itunes:title><![CDATA[Noora Ahmed-Moshe of Hoxhunt]]></itunes:title>
      <description><![CDATA[<p>In this special in-person episode of Modern Cyber, recorded in Helsinki, Jeremy Snyder sits down with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt, for a critical discussion on the evolving human risk in cybersecurity. Noora shares her unique perspective on the intersection of human psychology, technological advancement, and defense, stressing that people are not the <em>problem</em>, but the final, essential layer of defense. The conversation dives into Hoxhunt's research, which revealed that AI-powered phishing agents have become significantly more effective than elite human red teams at creating successful spear phishing attacks. Noora discusses how Hoxhunt is fighting AI with AI, using gamification and positive reinforcement, rather than fear and punishment, to train users against increasingly sophisticated threats like deepfakes and highly personalized social engineering. Finally, she offers guidance on how organizations must abandon compliance-only training and embrace change to build a strong, psychologically safe security culture that can withstand the accelerating AI threat landscape.</p><p>Guest Bio – Noora Ahmed-Moshe</p><p>Noora is the Vice President of Strategy and Operations at Hoxhunt, where she works with internal teams, customers, and partners to develop the future of Human Risk Management. With a strong focus on the human side of cybersecurity, she is an advocate for the importance of culture in driving secure behaviours, and in bridging the gap between technology and human interaction. Noora’s career spans 20 years of digital product and strategy development across industries in the UK and in Finland. </p><p>Hoxhunt Website - <a target="_blank" rel="noopener noreferrer nofollow" href="https://hoxhunt.com/">https://hoxhunt.com/</a></p><p>AI Powered Phishing Outperforms Elite Cybercriminals in 2025- <a target="_blank" rel="noopener noreferrer nofollow" href="https://hoxhunt.com/blog/ai-powered-phishing-vs-humans">https://hoxhunt.com/blog/ai-powered-phishing-vs-humans</a></p><p>‍</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2249697</link>
      <enclosure url="https://content.rss.com/episodes/266257/2249697/modern-cyber-with-jeremy-snyder/2025_10_02_16_08_19_cd46e9e4-0c42-474c-bc9e-33ebf3624444.mp3" length="40047104" type="audio/mpeg"/>
      <guid isPermaLink="false">70b216b9-0542-4a0a-87fb-026b30a4c7eb</guid>
      <itunes:duration>2502</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 Oct 2025 04:55:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20251002_041050_126b6a251469240f8efc354011afd78f.png"/>
    </item>
    <item>
      <title><![CDATA[Sounil Yu on FCC Consent Decrees and API Security]]></title>
      <itunes:title><![CDATA[Sounil Yu on FCC Consent Decrees and API Security]]></itunes:title>
      <description><![CDATA[<p>In this special episode of Modern Cyber, Jeremy chats with Sounil Yu about a recent consent decree from the FCC that specifically calls for improved API security. They discuss what consent decrees are, their seriousness, and the potential consequences for companies that fail to comply. Sounil also provides insights into best practices for API security and the role of standards like NIST and OWASP in guiding organizations.</p><p><strong>About Sounil Yu:</strong></p><p>Sounil Yu is a cybersecurity luminary with a rich background as a former CISO and chief security scientist at Bank of America. He is renowned for his groundbreaking work in reshaping cybersecurity approaches, notably creating the Cyber Defense Matrix and the DIE triad. As the Co-founder of Knostic, Sounil continues to push boundaries in the industry, offering innovative solutions to cybersecurity challenges. His expertise and thought leadership have earned him recognition as a leading figure in the cybersecurity community. </p><p>In the News 1 - <a target="_blank" rel="noopener noreferrer nofollow" href="https://therecord.media/tracfone-16-million-to-settle-fcc-investigation">https://therecord.media/tracfone-16-million-to-settle-fcc-investigation</a> </p><p>In the News 2 - <a target="_blank" rel="noopener noreferrer nofollow" href="https://cyberscoop.com/fcc-tracfone-wireless-reach-16m-cyber-and-privacy-settlement/">https://cyberscoop.com/fcc-tracfone-wireless-reach-16m-cyber-and-privacy-settlement/</a> </p><p>The Full Consent Decree : <a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.fcc.gov/public/attachments/DA-24-481A1.pdf">https://docs.fcc.gov/public/attachments/DA-24-481A1.pdf</a> </p><p>FCC Statement: <a target="_blank" rel="noopener noreferrer nofollow" href="https://docs.fcc.gov/public/attachments/DOC-404156A1.pdf">https://docs.fcc.gov/public/attachments/DOC-404156A1.pdf</a></p><p>OWASPI API Top 10: <a target="_blank" rel="noopener noreferrer nofollow" href="https://owasp.org/API-Security/editions/2023/en/0x11-t10/">https://owasp.org/API-Security/editions/2023/en/0x11-t10/</a></p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/1582320</link>
      <enclosure url="https://content.rss.com/episodes/266257/1582320/modern-cyber-with-jeremy-snyder/2024_07_25_09_43_14_746b02ad-a8ba-482f-857d-5e4a313b8bbe.mp3" length="9132870" type="audio/mpeg"/>
      <guid isPermaLink="false">a91f6b9a-c13f-4bdf-b8a1-003e94f6cacf</guid>
      <itunes:duration>570</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Jul 2024 13:54:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20240725_090705_ebdf2ebfa9b26b371741416e8fa0ce61.png"/>
    </item>
    <item>
      <title><![CDATA[This Week in AI Security - 19th February 2026]]></title>
      <itunes:title><![CDATA[This Week in AI Security - 19th February 2026]]></itunes:title>
      <description><![CDATA[<p>In this episode of <strong>This Week in AI Security</strong> for February 19, 2026, Jeremy covers an action-packed week with eight major stories exploring the fragile nature of AI safety alignment, critical platform hacks, and geopolitical AI developments.</p><p><strong>Key Stories &amp; Developments:</strong></p><ul><li><strong>G-Obliteration Attack:</strong> Microsoft security researchers discovered a one-prompt training technique that strips safety alignment from LLMs. By leveraging Group Relative Policy Optimization (GRPO), attackers can use a single mild prompt to cause cross-category generalization of harm. This effectively removes guardrails across 15 open-source models while preserving their utility.</li><li><strong>Orchids Vibe-Coding Hack:</strong> A BBC reporter was hacked on Orchids, a popular "vibe-coding" platform. A security researcher demonstrated a malicious code injection that compromised the user's development environment.</li><li><strong>AI vs. Legacy Email Security:</strong> AI-powered cyberattacks are successfully bypassing 88% of legacy email security systems. Attackers are utilizing LLMs to generate highly authentic phishing and impersonation content at scale.</li><li><strong>AI Doctors Evade Privacy Rules:</strong> AI-powered health services are not subject to the same strict privacy regulations as traditional healthcare facilities. This raises concerns around data leaks and medical hallucinations.</li><li><strong>OpenClaw Info Stealer:</strong> A variant of the Vidar info-stealer is targeting the OpenClaw ecosystem. The attack aims to exfiltrate configuration files and gateway authentication tokens.</li><li><strong>OpenClaw Founder Joins OpenAI:</strong> Peter Steinberger, the creator of the OpenClaw framework, has joined OpenAI. The OpenClaw project will transition to an open-source foundation supported by OpenAI.</li><li><strong>Claude's Geopolitical Role:</strong> Reports indicate that Anthropic's Claude was utilized via the Palantir platform during a US military raid in Venezuela. This raid led to the capture of Nicolas Maduro.</li><li><strong>ASIS AI Safety Report 2026:</strong> The International AI Safety Report highlights three emerging risks. These include the lowered barrier for biological weapons, the surge in deepfakes and fraud, and the difficulty of safety research.</li></ul><p>Worried about AI security? Get Complete AI Visibility in 15 Minutes. Discover all of your shadow AI now. Book a demo of Firetail's AI Security &amp; Governance Platform: <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.firetail.ai/request-a-demo">https://www.firetail.ai/request-a-demo</a></p><p></p><p><strong>Episode Links</strong></p><p>https://www.microsoft.com/en-us/security/blog/2026/02/09/prompt-attack-breaks-llm-safety/</p><p>https://www.bbc.com/news/articles/cy4wnw04e8wo</p><p>https://www.cpapracticeadvisor.com/2026/02/09/study-ai-powered-cyber-attacks-hit-88-of-legacy-email-security-systems/177694/</p><p>https://cyberscoop.com/ai-healthcare-apps-hipaa-privacy-risks-openai-anthropic/</p><p>https://thehackernews.com/2026/02/infostealer-steals-openclaw-ai-agent.html</p><p>https://techcrunch.com/2026/02/15/openclaw-creator-peter-steinberger-joins-openai/</p><p>https://www.theguardian.com/technology/2026/feb/14/us-military-anthropic-ai-model-claude-venezuela-raid</p><p>https://www.asisonline.org/security-management-magazine/latest-news/today-in-security/2026/february/2026-international-safety-report/</p>]]></description>
      <link>https://rss.com/podcasts/modern-cyber-with-jeremy-snyder/2559349</link>
      <enclosure url="https://content.rss.com/episodes/266257/2559349/modern-cyber-with-jeremy-snyder/2026_02_18_23_54_48_f500d522-25d8-478f-8bfd-c7d6be0d96c7.mp3" length="12351883" type="audio/mpeg"/>
      <guid isPermaLink="false">2031e546-2c54-45cb-9d1b-e2a084995e1e</guid>
      <itunes:duration>771</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Feb 2026 08:12:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/modern-cyber-with-jeremy-snyder/ep_cover_20260218_110238_d6e53f3f3e8f5b245bbc545dbc1b5c3b.png"/>
    </item>
  </channel>
</rss>