Folgen

  • Crystal Penguins and AI Chaos: What Could Go Wrong in 2026?
    Jan 14 2026

    We’re predicting what 2026 has in store for AI and cybersecurity. We explore the wild possibilities of AI integration gone wrong, from people accidentally connecting their AI to sensitive file systems to blaming their AI agents for losing critical data. The conversation takes a thoughtful turn as they debate which jobs might fall to AI automation and if the human touch is still irreplaceable? Examining real examples like the "Y'allbot" weather monitoring system and photorealistic AI actress Tilly Norwood to illustrate how rapidly AI is transforming industries.Tune in and learn how to navigate the AI-powered future responsibly.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    40 Min.
  • The Cost of Knowing: How Cybersecurity Professionals View Innovation Differently
    Dec 3 2025

    We’re pulling back the curtain on the technology industry to reveal what life looks like when you're constantly aware of what can go wrong. From the loss of childlike wonder when encountering new tech to the ethical dilemmas posed by autonomous vehicles, we discuss the unique burden of seeing technology's darker possibilities. We’re examining how years of witnessing security breaches and system failures shape a professional outlook that balances innovation with caution.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    31 Min.
  • The Roller Coaster of Risk: A Threat Modeler's Perspective
    Nov 26 2025

    What do roller coasters and threat modeling have in common? More than you'd think. In this episode, we explore how security professionals view risk differently than everyone else—and why that matters. From roller coaster anxiety to the ethics of identifying danger, we dive into the unique mindset that comes with being a threat modeler. Because once you learn to see threats everywhere, there's no going back.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    46 Min.
  • Can AI Replace Security Teams? The Software Quality Debate
    Nov 19 2025

    Is the cybersecurity industry facing a security problem or a software quality problem? In this episode, we’re tackling the controversial claim that AI advancements could make security teams obsolete—and uncover the deeper issues plaguing software development. The conversation reveals an uncomfortable truth: software companies often transfer the risk of vulnerabilities to customers, creating a system where there's little incentive to invest in security by design. Can AI bridge this gap, or do we need fundamental changes in how we approach software development and regulation?

    Article: Ex-CISA head thinks AI might fix code so fast we won't need security teams




    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    37 Min.
  • The Debate: Is the CIA Triad Truly Dead?
    Oct 22 2025

    We’re debating an online article claiming that the CIA Triad (Confidentiality, Integrity, Availability) is a relic and needs to be updated for 21st-century threats. The discussion includes whether new properties like authenticity, accountability, and resilience should be incorporated into modern security models. And we delve into the use of analogies, system properties versus values, and the role of ethical considerations in cybersecurity. Listen along to our discussion on whether the foundational elements of security need a refresh.

    The CIA Triad is Dead




    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    30 Min.
  • Don’t Forget the Beauty of Simplicity: Exploring Shifts in Software Development
    Oct 8 2025

    We’re debating the concepts of 'Shift Left' and 'Shift Down' in the world of cybersecurity. We explore the intricacies of developer responsibility, the impact of modern AI on code security, and the delicate balance between innovation and secure coding practices. Join us for a thought-provoking discussion that ranges from keeping our digital world secure, efficient and, most importantly, simple.

    The Modernization Imperative: Shifting Left is for Suckers. Shift Down Instead.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    34 Min.
  • More Cowbell: Security and Speed in Agile
    Oct 1 2025

    We’re diving into the relevance and execution of threat modeling within agile development environments. We dissect the claims, explore the true integration of agile practices with threat modeling, and address the misconceptions and challenges commonly faced. Check out the episode to find out if threat modeling is indeed slowing down agile processes or if it can be seamlessly integrated for better security outcomes.

    The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile




    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    49 Min.
  • Privateering the Cyber Seas: New Legislation on Cybercrime
    Sep 24 2025

    We’re discussing the intriguing world of cyber privateers and the concept of 'hacking back' against cyber criminals. The discussion centers around a proposed bill in the U.S. Congress, H.R. 4988, that aims to authorize private individuals to pursue cyber criminals with the full backing of government-issued letters of marque. We explore the historical context of privateers, the potential legal and ethical implications, and the modern-day ramifications of such measures. And debate whether bringing back this old concept could be a solution to modern cyber threats or if it opens the door to more significant risks and unintended consequences.

    US bill proposes 21st-century privateers to take on cybercrime

    H.R. 4988 - Scam Farms Marque and Reprisal Authorization Act of 2025





    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    Mehr anzeigen Weniger anzeigen
    36 Min.