CyberWire Daily

N2K Networks
undefined
8 snips
Feb 10, 2026 • 29min

A spyware swiss army knife.

Omer Akgul, PhD, researcher at RSA Conference studying LLM evaluation. He discusses measuring LLM consistency and using those metrics in cybersecurity. Short takes: what consistency means for model reliability. How automated metrics compare to human judgment. Practical calibration steps before deploying LLMs in critical workflows.
undefined
Feb 10, 2026 • 55min

Bringing it all together. [CISO Persepctives]

Ethan Cook, a writer and researcher at N2K who offers an outsider’s take on cybersecurity, reflects on the season’s conversations. He discusses fear and opportunity in hiring, why entry-level roles are misread, and the case for skills-based hiring. They debate trade versus profession pathways, diversity’s role in problem solving, and practical fixes like state programs and community college routes.
undefined
17 snips
Feb 9, 2026 • 26min

Your phone works for them now.

Ben Yelin, Program Director for Public Policy & External Affairs at UMD’s Center for Cyber Health and Hazard Strategies, explains administrative subpoenas and legal limits on surveillance. The conversation hits global zero‑day alerts, telecom intrusions, zero‑click LLM risks, ransomware outages, and troubling Chrome extension leaks. Short, sharp, and topical.
undefined
14 snips
Feb 8, 2026 • 9min

Simone Petrella: Fake it, until you make it. [CEO] [Career Notes]

Simone Petrella, CEO of CyberVista and former DoD threat intelligence analyst, built a company to bridge the cybersecurity skills gap. She discusses career pivots from counterterrorism to cyber, hiring for analytical potential over tech pedigree, empowering teams to own work, and the mantra of faking it until you make it.
undefined
14 snips
Feb 7, 2026 • 26min

The phishing kit that thinks like a human. [Research Saturday]

Piotr Wojtyla, Head of Threat Intelligence at Abnormal AI, explains InboxPrime AI, an AI-powered phishing kit. He covers how it uses Gmail, templates, and AI to craft polished, believable emails. Discussion includes its low one-time price, scalability features, and the shift toward autonomous, industrialized phishing tools.
undefined
7 snips
Feb 6, 2026 • 27min

Patch or pull the plug.

Mike Carr, Field CTO at Xona, a specialist in event logistics and cybersecurity for large-scale events. He discusses securing temporary networks at the 2026 Winter Olympics. Shortcomings from vendor shortcuts and undocumented hotspots create gaps. He outlines what attackers often go after and why real-world constraints force risky compromises.
undefined
32 snips
Feb 5, 2026 • 32min

The quietest weapon in America’s loudest strike.

Tony Scott, former U.S. federal CIO and current CEO of Intrusion, shares his perspective as a seasoned technology and cybersecurity leader. He discusses rapid two-factor adoption after major breaches. He talks about continuous monitoring, modern infrastructure, and rebuilding institutional expertise. He raises concerns about staffing cuts and outsourcing in government cybersecurity.
undefined
Feb 4, 2026 • 28min

A softer touch on cyber.

Zach Edwards, senior threat researcher at Silent Push who tracks internet-scale scans and bulletproof hosting. He explains what bulletproof hosting is and how peers and ASNs let bad actors persist. He talks about using peering and sanctions to disrupt criminals. He also covers how defenders can spot and block malicious hosting.
undefined
Feb 3, 2026 • 27min

The algorithm gets questioned.

Aaron Isaksen, AI research and engineering lead at Palo Alto Networks focused on applying AI to cybersecurity. He discusses why engineering excellence must come before ethical debates. He explores adversarial AI reshaping defenses. He warns about risks when human checks are removed and how AI changes code quality and lifecycle practices.
undefined
Feb 3, 2026 • 41min

Mid season reflection with Kim Jones. [CISO Perspectives]

Kim Jones, season host and cybersecurity leader with decades in intelligence and security, reflects on the season's arc. She revisits talent challenges, hiring driven by fear and urgency, and why developing pipelines beats poaching. Conversations touch on diversity boosting critical thinking, the limits of certifications, and whether cybersecurity is a trade or a profession.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app