

Risky Business Features
Risky Business Media
Join reformed CTO James Wilson as he dives deep on cybersecurity topics through an enterprise lens. From solo content and interviews with CISOs and researchers to vendor and startup deep dives, James does a bit of everything.
Episodes
Mentioned books

Apr 8, 2026 • 52min
What happens after North Korea infiltrates?
Geoff White, investigative journalist who co-created the Lazarus Heist series, unpacks North Korea’s IT infiltration scheme. He describes interview tricks, deepfakes and laptop farms. He outlines how hires funnel work to hacker units, launder salaries and route funds toward regime priorities. The picture is more methodical and diabolical than headlines suggest.

Apr 3, 2026 • 19min
Why CISOs need to be more flexible in the AI era
Brad Arkin, experienced cybersecurity leader and former CISO at Adobe, Cisco and Salesforce, shares perspectives on supply-chain risks and AI-driven threats. He discusses how AI accelerates attackers more than defenders. He explores trade-offs like patch timing versus supply-chain risk. He highlights prevention, stronger egress controls, and new tools like syscall sandboxing and network-layer defenses.

Mar 31, 2026 • 56min
A Risky Biz Experiment: Hunting for iOS 0day with AI
Karina Klaur, an OpenClaw AI assistant acting as a technical thinking partner for vulnerability analysis. She inspects WebKit, hunts a suspected audio decode bug, then uncovers an SVG buffer overflow. Short, sharp scenes cover chaining primitives, sandbox and PAC hurdles, JIT corruption theory, refusal to produce exploit code, and a walkthrough of the multi‑stage Karuna chain.

Mar 27, 2026 • 15min
Interview: Former NSA and CIA cyber leaders on offensive AI
Andy Boyd, former CIA cyber leader now CEO of Red Lattice, talks insider threat and defensive readiness. Rob Joyce, former NSA exec, explains offensive cyber ops and how AI shifts attack scaling. They discuss AI automating discovery, cloud scanning at scale, attacker augmentation, and why exploit leaks feel routine.

Mar 23, 2026 • 40min
When disaster strykes
Brad Arkin, experienced security executive and former CISO who advises on incident response and identity risks. They review the Stryker attack and how Intune was weaponized to wipe devices. Discussion covers phishing of powerful admin creds, hardening high‑power access, inventorying fleet tools, AI guardrails, rate‑limiting destructive actions, and recovery challenges after mass wipes.

Mar 18, 2026 • 37min
MCP is Dead
A contrarian take that the Model Context Protocol has lost relevance and why that matters for AI tooling. A look at how models are skipping structured tool protocols in favor of direct shell and CLI interactions. A rundown of the security tradeoffs as agents move from managed MCP servers to raw shell access. Practical advice on where to focus access controls and auditability.

Mar 12, 2026 • 32min
They don't break in, they log in. What's an enterprise to do?
In this podcast James Wilson chats with Brad Arkin about how enterprises can better deal with attackers logging in with valid credentials. Stolen identities, weak special-use credentials, and over-scoped API keys are the new zero-day and they’re abundantly available to attackers. Sadly, the solution here isn’t as simple as deploying phishing resistant MFA. Fixing this takes an enterprise identity strategy.
Show notes

Mar 11, 2026 • 1h 18min
A ridiculously deep dive into the Coruna Exploits
A solo deep dive tracing an exploit kit from watering-hole JavaScript to full device compromise. Technical breakdowns cover WebKit exploit paths, JIT and type confusion tricks, and intricate heap grooming. Detailed chain shows read/write primitives, PAC and ASLR workarounds, WebAssembly trampolines, sandbox escapes, kernel escalation, and persistence techniques used to deploy crypto-stealing implants.

Mar 6, 2026 • 32min
Being a wartime CISO
Brad Arkin, seasoned security leader and former CISO at Adobe, Cisco and Salesforce, shares wartime CISO realities. He covers who belongs in crisis decision rooms. He weighs keeping office internet for displaced staff against cutting connectivity. He talks through playbooks for shutting down or preserving key material, cloud/data center disaster choices, vendor exposure and using disaster playbooks for rapid coordination.

Feb 27, 2026 • 28min
What to do about North Korean remote workers
Brad Arkin, former CISO at Adobe, Cisco and Salesforce, brings hands-on cybersecurity and risk management experience. He describes North Korea’s fake IT worker industry. Short segments cover how fake identities and laptop farms operate. They explore detection headaches, legal limits, cross-team controls, and how AI supercharges interview fraud.


