David Bombal

David Bombal
undefined
Mar 31, 2026 • 15min

#572: How Cisco Protects AI Agents in Modern Data Centers

Dave West, Senior Cisco executive with 25 years leading global specialist teams, explains Cisco’s OneCisco platform and AI-ready data center stacks. He covers secure networking as the foundation. He describes AI infrastructure partnerships, micro-segmentation, Zero Trust, Splunk-driven visibility, and agentic operations for hybrid work. Practical architecture and containment strategies get center stage.
undefined
Mar 31, 2026 • 1h 8min

#571: Google Big Sleep: The End of Human Hackers?

Stephen Sims, an offensive security researcher and SANS instructor, returns with sharp takes on AI in cybersecurity. He unpacks offensive vs adversarial AI, prompt injection and jailbreak techniques. Vector databases, agentic automated testing, Google Project Zero’s Big Sleep, and AI-driven patch diffing get clear, bite-sized treatment. Practical career and governance implications wrap up the conversation.
undefined
Mar 31, 2026 • 36min

#570: 100 Terabit Smart Switches: What You Need to Know

Will Eatherton, a Cisco networking executive focused on data center and AI infrastructure, discusses the rise of 100 Tbps smart switches powered by Cisco Silicon One G300. He covers optics tradeoffs like co-packaged vs linear packaged, DPUs and smart NICs enforcing security, Ethernet vs InfiniBand for AI clusters, and the shift toward higher-bandwidth interfaces and operational tools.
undefined
Mar 31, 2026 • 37min

#568: 5-Minute Cyber Hacks Everyone Should Know (2026)

Rayton Li, Linux security expert who demos sudo misconfigurations and quick root tricks. David Smith, Windows specialist showing Alternate Data Streams for hiding executables. Jacob Meyer, researcher revealing LNK shortcut hijacks and LinkItUp. Kenneth Walker, red team operator abusing Steam profiles as C2. Alex Benton, practitioner demonstrating the Sticky Keys rename exploit and defenses.
undefined
Mar 30, 2026 • 1h 16min

#569: Why Vibe Hacking Is a Big Cybersecurity Threat in 2026

Pascal Geenens, Radware researcher and cybersecurity expert behind the Global Threat Analysis Report, explains the 2025–2026 shift where AI supercharges attackers. He breaks down vibe hacking, agentic AI and MCP risks. Short takes cover AI-driven DDoS resurgence, vulnerable APIs, indirect prompt injection, and how automation hands novices powerful attack tools.
undefined
Mar 28, 2026 • 20min

#567: Why Power Is Becoming a Major Problem for AI in 2026

Nathan Jokel, Head of Corporate Strategy at Cisco who leads long-term AI and security partnerships, discusses the future of AI data centers. He covers Cisco and NVIDIA's work to remove networking bottlenecks with 1.6T ports and G300 silicon. Topics include Secure AI infrastructure, observability and security (Splunk, eBPF, HyperShield), power constraints for data centers, and preparations for post-quantum and quantum networking.
undefined
Mar 25, 2026 • 26min

#566: Stop buying AI security tools until you watch this

Danny Jenkins, a cybersecurity practitioner at ThreatLocker focused on application control and zero trust, cuts through AI hype. He warns against treating AI as a cure and talks about agentic AI risks, treating agents like users, mixing AI with rule-based controls, and pragmatic steps like default-deny app control, closing open ports, and restricting cloud app access.
undefined
Mar 25, 2026 • 30min

#565: Stop the AI Hype: What Enterprise Teams Are Really Building

Carlos Pereira, Cisco Fellow and Chief Architect for Customer Experience, explains why enterprise value comes from agentic AI that executes B2B workflows, not consumer chatbots. He walks through how teams narrow hundreds of ideas to a few ROI-backed use cases. Discussion covers evaluations, input guards, latency and data sovereignty, and how embedding AI into workflows drives real adoption.
undefined
Mar 23, 2026 • 38min

#564: Hackers can bypass Your MFA In 2026 (And How To Stop It)

Rob Allen, Senior ThreatLocker rep and cybersecurity expert, explains why SMS MFA and reused passwords are risky. He outlines how attackers use reverse-proxy cookie theft and SIM swapping to bypass protections. The conversation covers authenticator apps, hardware keys, zero trust cloud access, proxying Office 365 traffic, and locking down internal networks with deny-by-default approaches.
undefined
Mar 23, 2026 • 33min

#563: Securing LLMs and fighting Prompt Injection with Algorithmic Red Teaming

Rick Miles, VP of Product at Cisco and former military cybersecurity operator, explains the shift from static firewalls to distributed "firewalling." He highlights the 6100 series hardware leap, eBPF-powered visibility and virtual patching, and the risks around prompt injection and poisoned models. He outlines algorithmic red teaming and the rise of agentic security as a force multiplier for engineers.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app