Podcasts


Podcasts
The infinite eye: How AI threat intelligence gives defenders an asymmetric edge
Tod Beardsley, HD Moore, and Jonathan Cran discuss how AI-powered threat intelligence is providing defenders with a much-needed advantage.
Podcasts
Perimeters and pathways: Protecting the complete attack surface
Tod Beardsley, Jared Atkinson, Zakir Durumeric, and HD Moore discuss the perimeters and pathways that connect internal networks to the global...

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

Podcasts
Bug bounties in the age of AI
In this session, Tod Beardsley and Casey Ellis explore the evolving role of bug bounties in a world increasingly shaped by artificial intelligence.
Podcasts
The network edge: EOL and exploitation
Tod Beardsley is joined by Kimber Duke & Patrick Garrity of VulnCheck to discuss the critical intersection of EOL hardware and cybersecurity...
Podcasts
Mute the sirens: Prioritizing vulnerability noise
In this session, Tod Beardsley and Mark Lambert discuss the escalating challenge of managing vulnerability noise in the era of AI.
Podcasts
Force multiplied: Community-powered vuln detection
Tod Beardsley & Rishi Sharma discuss the origins of Nuclei, an open-source framework that has revolutionized how security teams validate...
Podcasts
From risk to resilience: Navigating OT security in a converged world
Rob King, Patrick Gillespie and Mary Gannon explore the complex world of OT security in an increasingly converged environment.
Podcasts
On the frontlines of investigative journalism in cybersecurity: An insider's perspective
Tod Beardsley talks with investigative journalist Joseph Menn to discuss his long career covering the intersection of technology, crime, and...
Podcasts
Signal vs slop: Journalists on the evolution of research-driven reporting
Tod Beardsley is joined by security journalists Steve Ragan, Dennis Fisher, and Bill Brenner to talk about investigative reporting in the age of AI...
Podcasts
Predicting exploitation: A practitioner's guide
Tod Beardsley sits down with Jay Jacobs, a co-creator of the EPSS, to explore the science and practice of predicting vulnerability exploitation.
Podcasts
A CVE quagmire: Quality versus quantity
Tod Beardsley and Jerry Gamblin dive into the "CVE Quagmire," exploring the tension between the sheer volume of vulnerability reports and the...
Podcasts
OT: Segmented Today, Breached Tomorrow (HD Moore at RSAC)
HD Moore talks about the converging worlds of IT and OT, where traditional network segmentation falls short and exposing risks in critical...