Security Now (Audio) SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026
42 snips
Mar 5, 2026 Live coverage from a security conference about how internal networks have become the primary attack surface. They trace the rise of extortion via cryptocurrency and evolving authentication failures. Practical defenses like IP whitelisting, segmentation, nondefault ports and least-privilege endpoints are highlighted. They also explore continuous reauthentication, passkeys, and AI agents that warn users in real time.
AI Snips
Chapters
Transcript
Episode notes
Internal Security Is The New Frontier
- The security frontier has shifted from perimeter defense to internal threats as attackers exploit internal access and weak segmentation.
- Steve Gibson and Leo Laporte argue decades of design built excessive trust inside networks, making internal breaches the dominant risk.
Crypto Created A Ransom Economy
- Cryptocurrency changed attackers' incentives by enabling anonymous extortion, turning opportunistic hacks into profitable ransomware.
- Steve Gibson links crypto payments to the rise of targeted extortion and persistent enterprise attacks.
Assume Authentication Will Fail
- Assume authentication can fail and add IP filtering or whitelist connections to reduce attack surface.
- Steve Gibson enforces firewall rules allowing only specific office IPs to reach enterprise services as his primary defense.
