The Adversarial Podcast Titelbild

The Adversarial Podcast

The Adversarial Podcast

Von: Jerry Perullo Sounil Yu Mario Duarte
Jetzt kostenlos hören, ohne Abo

Über diesen Titel

Join former ICE:NYSE CISO Jerry Perullo, former Snowflake CISO Mario Duarte, and former JupiterOne CISO and Bank of America leader Sounil Yu as they dive into the good, the bad, and the ugly in the latest cybersecurity news. Each week, we discuss the most pressing headlines, offer candid commentary, and share unique insights from our extensive experience in the field.

Adversarial Risk Management
Ökonomie
  • S4E13 – Munich Security Conference, Gemini used by criminals, priority shifts at CISA
    Feb 18 2026

    GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use Google’s threat team distills red-team learnings from sophisticated experimentation as it hardens defenses and anticipates adversarial AI backdoors.

    New Trump Cyber Strategy Prompts Companies to Mull Legal Limits The administration’s aggressive cyber doctrine is forcing firms to reconsider how far they can legally follow the offensive playbook.

    The Trump Administration’s Cyber Strategy Fundamentally Misunderstands China’s Threat | Council on Foreign Relations CFR analysis warns that the new strategy oversimplifies China’s capabilities and risks misaligning priorities.

    CISA will shutter some missions to prioritize others. CISA’s Cybersecurity Division is reorganizing to better match a layered threat-response posture.

    Google TIG disrupts “world’s largest residential proxy network” The threat-intel team dismantled a sprawling residential proxy operation that was selling access to anonymized traffic, curbing a major enabler of fraud and abuse.

    Hosts: Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    Mehr anzeigen Weniger anzeigen
    1 Std. und 13 Min.
  • Adversarial Podcast S4E12 – Curl shuts down bug bounty program, most expensive security control that gave zero security
    Feb 5 2026

    The end of the curl bug bounty program. Curl’s creator Daniel Stenberg announced the shutdown of the project’s bug-bounty program because overwhelming volumes of low-quality and AI-generated reports, coupled with bad-faith security submissions, impose excessive mental and time costs while providing little real improvement to the software.

    Changing Federal Reserve Regulations. The memo directs Federal Reserve supervisory staff to shift toward a more risk-focused, judgment-driven, and proportionate supervisory model that prioritizes material financial risks, relies more on other regulators’ and firms’ internal audit work, reduces procedural and duplicative oversight, and sharpens the clarity and impact of supervisory findings and enforcement.

    Reddit: "What is the most expensive security control you added that gave zero security." An online discussion thread about security controls.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    Mehr anzeigen Weniger anzeigen
    1 Std. und 18 Min.
  • Adversarial Podcast S4E11 – Iran Internet blackout, threat intelligence briefings, cyber framework alignment
    Jan 20 2026

    00:00 Intro

    01:40 Iran's Internet blackout

    48:06 U.S. Weighs Expanding Private Companies’ Role in Cyberwarfare

    57:35 Aligning cybersecurity programs to frameworks

    There's an internet blackout in Iran. How are videos and images getting out? During Iran’s nationwide internet blackout imposed amid widespread anti-government protests, some citizens have been using Elon Musk’s Starlink satellite service to bypass state-controlled communication blackouts and share information with the outside world despite government efforts to restrict or jam such access.

    Lawmakers to Restart Efforts to Revive Lapsed Cyber Intel Bill. U.S. lawmakers are preparing to revive and reauthorize the lapsed Cybersecurity Information Sharing Act, a key bill that facilitates sharing of cyber threat intelligence between the federal government and the private sector, with bipartisan momentum to include it in broader funding legislation as concerns grow about rising cyber threats and gaps left by the law’s expiration.

    U.S. Weighs Expanding Private Companies’ Role in Cyberwarfare. The U.S. administration is considering a significant shift in cyber strategy that would allow private companies, beyond their current contractor roles, to directly participate in offensive cyber operations against foreign adversaries—a move that would require new legal authorities and raises legal, ethical and oversight concerns.

    Should Our Security Controls Be More Like North Korea or Norway? Security programs work better when they resemble Norway’s balanced, trust-based model rather than North Korea’s heavy-handed, surveillance-first approach.

    Hosts:

    Jerry Perullo (Founder, https://adversarial.com/)

    Sounil Yu (Founder, https://www.knostic.ai/)

    Mario Duarte (Founder, stealth startup)

    Producer: Tillson Galloway (Founder, http://githoundexplore.com/)

    Mehr anzeigen Weniger anzeigen
    1 Std. und 15 Min.
Noch keine Rezensionen vorhanden