Risky Business

Risky Business Media
undefined
47 snips
Feb 18, 2026 • 1h 3min

Risky Business #825 -- Palo Alto Networks blames it on the boogie

Adam Poynton, CEO of Knock Knock, a maker of SSO-firewall integration and legacy OS agents. He discusses building agents for Solaris/SPARC and HPUX, a new Windows agent, and self-defending hosts. The conversation also covers orchestration across cloud and SaaS allow-lists, vendor trust and supply-chain tradeoffs, and why old-school platforms still matter.
undefined
78 snips
Feb 11, 2026 • 56min

Risky Business #824 -- Microsoft's Secure Future is looking a bit wobbly

Brandon Dixon, founder and CEO of Ent.AI and serial security entrepreneur, joins to discuss AI’s role in protecting endpoints. He digs into endpoint-centric world models and embeddings. Short takes cover contextual detection, AI-generated explanations, and neurosymbolic autonomous defenses. The conversation sketches how language-based understanding and deterministic safeguards could reshape security.
undefined
34 snips
Feb 4, 2026 • 56min

Risky Business #823 -- Humans impersonate clawdbots impersonating humans

Fletcher Heisler, CEO and co-founder of Authentik, talks about an open-source IDP and a new endpoint agent. James Wilson, technologist and enterprise tech editor, breaks down AI-agent chaos and supply-chain drama. They cover Notepad++ compromises, Moltbook/Clawdbot risks, agent safety vs encryption, and a string of high-severity infrastructure flaws.
undefined
78 snips
Jan 28, 2026 • 1h 4min

Risky Business #822 -- France will ditch American tech over security risks

Brian Baskin, threat research lead at Sublime Security, explains how AI is supercharging email impersonation and thread-hijacking. Short takes on deepfakes undermining voice/video verification. Discussion of attackers abusing legitimate services to evade detection. Practical focus on why layered email defenses matter as AI-driven scams scale.
undefined
67 snips
Jan 21, 2026 • 1h 5min

Risky Business #821 -- Wiz researchers could have owned every AWS customer

Joe Tidy, BBC World Service's cybersecurity correspondent and author of Control Alt Chaos, dives into the complexities of U.S. cyber operations and their implications. He discusses the evolving teen hacker culture shaped by social media and cryptocurrency. Haroon Meer, founder of Thinkst, shares insights on deception tools and their recent acquisition efforts, alongside the exciting work at the South African Computer Olympiad. Together, they explore the future of cybersecurity, the risky world of Amazon Web Services exploits, and the challenges of communicating these themes to the public.
undefined
75 snips
Jan 14, 2026 • 59min

Risky Business #820 -- Asian fraud kingpin will face Chinese justice (pew pew!)

David Cottingham, co-founder of Airlock Digital and expert in cybersecurity, discusses the risks associated with Microsoft’s ClickOnce application deployment. He explains how attackers exploit ClickOnce to load malicious code and the effectiveness of allow-listing in mitigating these threats. The conversation also dives into the challenges EDR technologies face in detecting such attacks. Additionally, there's a fascinating debate on the potential for AI to enhance allow-list management while maintaining human oversight.
undefined
32 snips
Jan 6, 2026 • 1h 4min

How the World Got Owned Episode 1: The 1980s

Jon Callas, a former software engineer at Digital Equipment Corporation, discusses the early social norms of the ARPANET and the communal spirit among early hackers. Mark Rasch, who prosecuted the Morris Worm case, highlights the challenges in establishing new computer crime laws. Tony Sager shares insights on NSA's initial ambivalence toward hacking and its eventual embrace of cybersecurity. They explore the 414s’ curious exploration, the media's role in shaping public perception, and the Cuckoo's Egg, which tracks espionage by German hackers.
undefined
58 snips
Dec 17, 2025 • 54min

Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack

Josh Kamdjou, CEO of Sublime Security, dives into the evolving landscape of phishing, particularly focusing on calendar invite threats. He uncovers how these invites can bypass traditional email defenses, turning into a medium for malware distribution. Kamdjou also discusses Sublime's innovative solutions to combat these attacks and enhance user safety. The conversation highlights the alarming rise in industrial control systems phishing and the need for agile responses in a rapidly changing threat environment.
undefined
31 snips
Dec 11, 2025 • 43min

Risky Biz Soap Box: Graph the planet!

In a captivating discussion, Jared Atkinson, CTO of SpecterOps and a key player behind BloodHound, dives into the fascinating world of cross-platform attack path enumeration. He reveals how OpenGraph can identify intricate vulnerabilities, like linking GitHub accounts to Active Directory breaches. Jared shares insights into modeling permissions and discusses the importance of extending defenses beyond traditional platforms. He also highlights innovative community extensions and real-world examples of thwarting cyber threats, underscoring why an expansive view of attack surfaces is essential.
undefined
55 snips
Dec 10, 2025 • 58min

Risky Business #818 -- React2Shell is a fun one

Adam Boileau, a seasoned cybersecurity commentator, joins Simon Onyons, Managing Director at Kroll's Cyber and Data Resilience, to tackle the latest in cybersecurity. They dive into the alarming React2Shell vulnerability—scoring a CVSS 10—that's quickly exploited by Chinese APTs. Simon shares insights on demystifying cyber risk for boards and how to communicate it effectively. The episode also touches on Linux's PCIe encryption support and a controversial GrapheneOS case, illustrating the ongoing battle between security and exploitation.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app