Safe Mode Podcast
Podcast image
When iPhone exploits turn into commodities
35 mins; March 26, 2026
Behind the scenes of the Socksescort takedown
34 mins; March 19, 2026
What comes next for Trump's cybersecurity plan?
28 mins; March 12, 2026
A plea to improve quantum security in the federal government
17 mins; March 05, 2026
Is the 'Shields Up' era of CISA over?
33 mins; February 26, 2026
Should you still trust your password manager?
36 mins; February 19, 2026
No exceptions: How Amazon killed the password and unified security
36 mins; February 12, 2026
What leaders can learn from the WEF's Cybersecurity Outlook
36 mins; February 05, 2026
Opportunistic by Default: How OT gets pulled into the blast radius
34 mins; January 29, 2026
How do you win a conflict most Americans can’t see?
35 mins; January 22, 2026
What's powering the 'Steroid Era' of cybercrime?
52 mins; January 15, 2026
The Access‑Trust Gap: Why security can’t see what work depends on
32 mins; December 18, 2025
How AI has complicated enterprise mobile security
38 mins; December 11, 2025
Breaking down the latest era of Chinese cyberespionage with Booz Allen's Nate Beach-Westmoreland
29 mins; December 04, 2025
How Visa's CISO turns a 'paranoid and pessimisitic mindset' into positive security outcomes
46 mins; November 20, 2025
What security teams should do to prepare for the quantum computing future
40 mins; November 13, 2025
How MSP's are dealing CISA changes
32 mins; November 06, 2025
Mobilizing Main Street: Inside the Cyber Civic Engagement Program
30 mins; October 30, 2025
A reset on information sharing
35 mins; October 23, 2025
Rethinking resilience with WatchTowr CEO Benjamin Harris
35 mins; October 16, 2025
What's it like to go through the FedRAMP process?
31 mins; October 09, 2025
Andesite's Brian Carbaugh on how lessons from the CIA can power an AI-powered SOC
27 mins; October 02, 2025
Censys’ Silas Cutler on how adversaries chain vulns together for big attacks
26 mins; September 25, 2025
Veracode’s Chris Wysopal on the security issues with AI code development
32 mins; September 17, 2025
Phosphorus’ Sonu Shankar on IoT Vulnerabilities and Salt Typhoon Tactics
23 mins; September 11, 2025
Halcyon’s Cynthia Kaiser on the state of ransomware
29 mins; September 04, 2025
What happens if CISA 2015 lapses?
24 mins; August 28, 2025
Dave DeWalt on how to get a board to buy in on cybersecurity
31 mins; August 21, 2025
Are enterprises having the right AI security conversations?
45 mins; August 14, 2025
What is CISA’s focus moving forward
34 mins; August 07, 2025
Inside the AI Action Plan with Dreadnode’s Daria Bahrami
33 mins; July 31, 2025
NetRise’s Tom Pace on why telecom’s Salt Typhoon problem may never go away
30 mins; July 24, 2025
Kemba Walden and Devin Lynch on securing the AI Stack
66 hours 31 mins; July 17, 2025
Valence Security’s Yoni Shohet on the growing risk tied to SaaS applications
33 mins; July 10, 2025
Intel471’s Will Dixon goes behind the scenes on the DanaBot takedown
32 mins; July 03, 2025
DARPA’s Andrew Carney on AIxCC’s quest for truly autonomous AI
52 mins; June 26, 2025
RSA CEO Rohit Ghai on the promise and peril of passkeys
41 mins; June 12, 2025
MIND’s Eran Barak
33 mins; June 05, 2025
Bishop Fox’s Rob Ragan and Iron Man Suit for pen testers
30 mins; May 29, 2025
Olivia Rose on why the CISO role may not be the pinnacle of security work
44 mins; May 22, 2025
Semperis CEO Mickey Bresman on the power of tabletop exercises
35 mins; May 15, 2025
Expel CEO Dave Merkel on the impact of AI & Automation in modern SOCs
31 mins; May 08, 2025
Recorded Future’s Alexander Leslie on the ‘MarkoPolo’ traffer team
32 mins; May 01, 2025
Verizon’s Alex Pinto on the takeaways from the 2025 DBIR
38 mins; April 24, 2025
Will Pearce on the ever-changing field of offensive AI security
40 mins; April 17, 2025
Lior Div on how security teams should be using AI agents
34 mins; April 10, 2025
Ken Bagnall on how companies can work with governments to take down malicious infrastructure
32 mins; April 01, 2025
Edera’s Alex Zenla on how to make cloud computing and AI secure-by-design
47 mins; March 26, 2025
Allie Bohan on how to handle the non-technical side of a ransomware attack
35 mins; March 19, 2025
Discover’s Sunil Mallik on the ever-changing roles of the CISO
38 mins; March 11, 2025
Chainguard’s Dan Lorenc on the next decade of software supply chain security
28 mins; March 05, 2025
Virtru’s John Ackerly on how the feds are keeping data secure and interoperable
34 mins; February 26, 2025
FBI’s Cynthia Kaiser on Salt Typhoon’s ‘indiscriminate’ data collection
20 mins; February 19, 2025
Chainalysis’ Jackie Burns-Koven on the drop in ransomware payments
32 mins; February 12, 2025
Google’s John Hultquist on how APTs are using generative AI
27 mins; February 05, 2025
Hugh Thompson on what the SEC got right (and wrong) with its cyber incident reporting mandate
43 mins; January 28, 2025
Gabrielle Hempel on AI regulation on the federal and state level
39 mins; January 23, 2025
Guidepoint Security’s Jason Baker on lessons learned from negotiations with ransomware groups
51 mins; January 16, 2025
Phil Venables on the State of the CISO
40 mins; January 08, 2025
Vik Phatak on the inherent issues in native cloud firewalls
32 mins; December 18, 2024
Emily Crose on the government’s long history with hackers
50 mins; December 10, 2024
GreyNoise’s Andrew Morris on using AI to find zero-days
44 mins; December 04, 2024
The evolution of Microsoft’s Digital Crimes Unit
61 hours 41 mins; November 20, 2024
Securing the Skies: Aerospace Cybersecurity with David Brumley
35 mins; November 13, 2024
What will GenAI regulation look like in 2025?
27 mins; November 06, 2024
Special CyberTalks Edition with National Cyber Director Harry Coker
31 mins; October 31, 2024
DomainTools’ Sean McNee on how China is watching the Russia-Ukraine conflict
31 mins; October 24, 2024
ReversingLabs’ Saša Zdjelar on the ‘black box’ of commercial software
29 mins; October 17, 2024
Cal-Berkeley’s Elijah Baucom on how students are helping nonprofits avoid spyware
28 mins; October 10, 2024
Mandiant’s Michael Barnhart on the North Korean IT worker crisis
38 mins; October 03, 2024
Trellix’s John Fokker on the latest cybercriminal snapshot
40 mins; September 26, 2024
How organizations are handing AI security
42 mins; September 19, 2024
We’re back! RunSafe CEO Joe Saunders on secure-by-design in IoT devices
30 mins; September 12, 2024
Ted Schlein on the cybersecurity industry and the latest twist in the Trump-Iran hacking saga
46 mins; August 22, 2024
Hack-and-leak op targets Trump; a technical deep dive with John Hammond on the CrowdStrike outage
32 mins; August 15, 2024
A deep dive with Tim Starks on the Biden administration's cybersecurity initiatives
44 mins; August 08, 2024
Sara Hooker on compute thresholds for AI; CrowdStrike breaks the internet
45 mins; July 25, 2024
Dewey Murdick on enabling principles for AI governance; a landmark breach at AT&T
39 mins; July 18, 2024
Allan Liska on why it’s time to ban ransomware payments; Russian info ops
38 mins; July 11, 2024
Selena Larson on e-crime matching nation state hackers; Disinfo before the Supreme Court
44 mins; June 27, 2024
Protecting teens against sextortion; threats to election workers
35 mins; June 20, 2024
Keeping Ukraine’s grid up and running amid war; Snowflake customers under attack
30 mins; June 12, 2024
Josh Harguess on AI red-teaming; an Israeli info op targets the U.S.
36 mins; June 06, 2024
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations
47 mins; June 03, 2024
Joe Sullivan on his legal battle with the feds; the latest on Russian influence operations
47 mins; May 30, 2024
Omkhar Arasaratnam on open source security; AI dogfighting
36 mins; May 23, 2024
The FBI’s Brett Leatherman on LockBitSupp’s unmasking; a spyware reckoning in Poland
33 mins; May 16, 2024
Stefan Soesanto on Ukrainian hack and leak ops; cyberattack in Georgia
41 mins; May 02, 2024
Rumman Chowdhury on AI red-teaming; a Sisense supply chain attack
49 mins; April 17, 2024
Sayash Kapoor on AI risk; Federal agencies affected by Russian breach of Microsoft
43 mins; April 11, 2024
Dave Aitel on ‘secure by design’; CISA’s rules for cyber incident reporting
46 mins; April 04, 2024
Byron Tau on data brokers; US sanctions, indicts Chinese hackers
43 mins; March 26, 2024
Sherrod DeGrippo on APT groups experimenting with AI
40 mins; March 21, 2024
Kiersten Todt on the cybersecurity policy landscape; AI training for election officials
39 mins; March 14, 2024
David Haber breaks down the AI security industry; ALPHV snarls U.S. health care
47 mins; March 07, 2024
Robert M. Lee on critical infrastructure attacks; and is LockBit back?
44 mins; February 29, 2024
LockBit’s very bad day; Adam Meyers on Israel-Gaza cyber ops
35 mins; February 22, 2024
The future of the TIC program amid the shift to zero trust
28 mins; February 20, 2024
Legal aid for hackers; Big Tech wants action on commercial spyware
33 mins; February 15, 2024
How the Pentagon is embracing AI; election officials’ concerns going into 2024
45 mins; February 08, 2024