Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
…
continue reading
Cyber Defense Group Podcasts
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Founded in 1990 by Marc Lee, former Managing Director of FT Business Enterprises who established and ran the Financial Times global conference business, Cityforum has for many years been acknowledged as a major contributor to public policy debate. Cityforum comprises a small, trusted, fully independent group of experienced individuals, respected for their intellectual honesty, knowledge and extensive contacts across every level of the private, public and not-for-profit sectors, at home and a ...
…
continue reading
On Moody’s Talks - Behind the Bonds, hosts Tania Hall and Jeff Pruzan join analysts from Moody’s corporate finance group worldwide to discuss the market forces shaping credit across industries - from airlines to telecoms and everything in between. These forces include the uneven recovery from the coronavirus pandemic, digital transformation, cyber risk, climate-change imperatives and much more. Please join us as we connect the dots on corporate credit quality.
…
continue reading
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
…
continue reading

1
Curiosity as a Sales Advantage - Jacob Friedman - Channel Security Secrets - Episode #9
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32What if the single most important skill for success in cybersecurity sales wasn’t technical knowledge, but relentless curiosity? Get insider strategies from Jacob Friedman, Strategic Account Director at 3 Tree Tech, who shares how curiosity, mentorship, and trust are the keys to thriving in cybersecurity sales. You’ll discover how to navigate the v…
…
continue reading

1
Defend Against Hacktivist Groups like APT Handala | The Cyber Security Podcast
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32Hacktivists don’t need zero-days to hurt you—they weaponize people. Host Lieuwe Jan Koning sits down with Yuri Wit (SOC analyst) and Rob Maas (Field CTO) to dissect APT Handala: how they hunt targets, deliver wipers, and brag about leaks. We map their moves to the Lockheed Martin Kill Chain and turn it into a Zero Trust defense playbook you can act…
…
continue reading

1
Avoiding Strategic Insolvency at the Pentagon
47:37
47:37
Play later
Play later
Lists
Like
Liked
47:37America’s military faces extraordinary threats — and when resources lag, missions can fail. Guest host Bradley Bowman is joined by Krista Auchenbach of CSIS to discuss her forthcoming report, alongside Rear Adm. (Ret.) Mark Montgomery, as they unpack how presidents convey orders, how the Pentagon manages risk, and how to avoid a dangerous ends-mean…
…
continue reading

1
Tampered Chef: When Malvertising Serves Up Infostealers
11:22
11:22
Play later
Play later
Lists
Like
Liked
11:22Imagine downloading a PDF Editor tool from the internet that works great...until nearly two months later, when it quietly steals your credentials. That’s the reality of “Tampered Chef,” a malvertising campaign that preyed on users searching for everyday software. In this episode, Nick Biasini explains how cybercriminals are investing in "malvertisi…
…
continue reading

1
The Business of Client Trust - Eric Ludwig - Channel Security Secrets - Episode #8
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05How do trusted advisors build credibility and deliver meaningful impact in IT and cybersecurity? In this episode of Channel Security Secrets, I sit down with Eric Ludwig, Co-Founder of RISE Technology Advisors, to explore the principles and practices that drive success in technology advisory services. Eric shares insights on the value of integrity,…
…
continue reading

1
Promptlock – The First AI-Powered Malware | The Cyber Security Podcast
19:10
19:10
Play later
Play later
Lists
Like
Liked
19:10First documented case: AI inside the breach. Promptlock marks the first time malware has used AI during execution, not just in preparation. In this Threat Talks deep dive, Rob Maas (Field CTO, ON2IT) sits down with Yuri Wit (SOC Analyst, ON2IT) to break down how it works: a Go loader calling an attacker’s LLM in real time, generating fresh payloads…
…
continue reading

1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading

1
The War Against the West Has a Long Way to Go
1:11:28
1:11:28
Play later
Play later
Lists
Like
Liked
1:11:28On the 24th anniversary of the September 11, 2001 attacks, Cliff May sits down with Amb. Edmund Fitton-Brown, former British ambassador to Yemen and UN terrorism monitor, now a senior fellow at FDD, to assess what we’ve learned — and failed to learn — about global jihad. From Hamas leaders living lavishly in Qatar, the Houthis’ missile attacks, al …
…
continue reading

1
Beyond Transactional Selling - Dan Gill - Channel Security Secrets - Episode #7
51:35
51:35
Play later
Play later
Lists
Like
Liked
51:35With over 30 years of experience driving growth and innovation in the technology channel, Dan Gill has seen it all, and he’s sharing his playbook for success. In this episode of Channel Security Secrets, I sit down with Dan, CEO at Amplix, to explore his four pillars of growth and how they’re transforming the way trusted advisors succeed. From cust…
…
continue reading

1
Data Bouncing: How HTTP Headers Leak Data | The Cyber Security Podcast
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Your tools say “secure.” Your headers say “leaking.” In this Threat Talks Deep Dive, ON2IT’s Luca Cipriano (CTI & Red Team Lead) exposes Data Bouncing—a stealthy exfiltration trick that hides inside HTTP headers and abuses DNS lookups through trusted third parties. We show the demo, decode the psychology of the attack, and translate it into Zero Tr…
…
continue reading

1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading
For fifty years, the United Nations has waged a war on Israel—not with rockets or tanks, but with words: resolutions branding Zionism as racism, false charges of apartheid, fabricated famine, and now even cries of genocide. It’s a propaganda war that empowers Hamas and delegitimizes Israel on the world stage. On this episode of Foreign Podicy, host…
…
continue reading

1
Own the Cybersecurity Conversation, Drive Sales - Alex Ryals - Channel Security Secrets - Episode #6
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32How can trusted advisors and channel leaders turn cybersecurity challenges into growth opportunities? In this episode of Channel Security Secrets, I sit down with Alex Ryals, Chief Information Security Officer at MicroAge, to explore actionable strategies for aligning sales, security, and continuous learning. Alex shares how matching sales skills w…
…
continue reading

1
Inside the Black Hat NOC: Lessons in Securing One of the Wildest Networks
23:05
23:05
Play later
Play later
Lists
Like
Liked
23:05How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica Oppenheimer, Director of Security Operations at Cisco, about the ten years she's spent in the Black Hat Network Operations Center (NOC). Explore the technical challenges of segmenting and monitoring a n…
…
continue reading

1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading

1
AI, Play It Safe: Why CISOs Are Wrong to Ban AI
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54Playing it safe with AI sounds smart, but is banning it really how you prevent data leaks? In this episode of Threat Talks, ON2IT’s Lieuwe Jan Koning (ON2IT Co-Founder) sits down with Rob Maas, Field CTO at ON2IT, to tackle the hard question: How can CISOs and security leaders embrace AI safely—without exposing their organization to destructive dat…
…
continue reading

1
The Shadows Moscow Casts Over Historian Mark Galeotti
59:20
59:20
Play later
Play later
Lists
Like
Liked
59:20The world’s most endangered democracies—Taiwan, South Korea, Israel, and Ukraine—face relentless threats from the Axis of Aggressors: Beijing, Pyongyang, Tehran, and Moscow. With Ukraine locked in an existential war, host Cliff May welcomes British historian Mark Galeotti, host of In Moscow’s Shadows, for an unflinching look at Russia’s ambitions, …
…
continue reading

1
Mastering the Fundamentals - Stephen Semmelroth - Channel Security Secrets - Episode #5
56:24
56:24
Play later
Play later
Lists
Like
Liked
56:24Take your cybersecurity knowledge to the next level with expert insights on how trusted advisors can confidently navigate security conversations and build lasting client relationships. In this episode of Channel Security Secrets, I sit down with Stephen Semmelroth, Vice President of Cloud Resilience at Avant Communications. Stephen breaks down the …
…
continue reading

1
Zero Trust step 5A: Stop Breaches—Inspect Every Event Now | The Cybersecurity Podcast
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Zero Trust step 5A is where monitoring turns raw logs into decisive action. Hosts Lieuwe Jan Koning and Rob Maas (Field CTO, ON2IT) expose why MDR alone isn’t protection—and how context closes the gap. Learn to inspect every event, use Indicators of Good/Compromise, and set Rules of Engagement that stop lateral movement and alert fatigue. (00:00) -…
…
continue reading

1
Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
…
continue reading

1
Exodus or Endurance: The Plight of Egypt’s Christians
54:51
54:51
Play later
Play later
Lists
Like
Liked
54:51Not every U.S. strategic partner is a democracy, but those receiving American aid should not trample such basic freedoms as religious liberty. Years ago in Egypt, Coptic Patriarch Pope Tawadros II told host Cliff May that discrimination was diminishing under President Sissi. Today, USCIRF reports show the opposite: systemic repression of religious …
…
continue reading

1
Leading with Integrity - Stacey Horne - Channel Security Secrets - Episode #4
51:59
51:59
Play later
Play later
Lists
Like
Liked
51:59Want to build stronger client relationships while navigating the complexities of modern cybersecurity? In this episode of Channel Security Secrets, I sit down with Stacey Horne, President at Stillwater Ecosystem, to talk about the human side of cybersecurity, trust, empathy, and communication. Stacey shares how humility and relationship-building ar…
…
continue reading
In this episode of Simply Offensive, Phillip Wylie is joined by Tyler Ramsbey, a penetration tester and content creator. Learn about Tyler's unique journey into cybersecurity, the importance of soft skills, and the value of teaching and content creation. Tyler shares insights on maintaining mental health, balancing family life, and his upcoming ven…
…
continue reading

1
From Stealth to Wipers: Inside Russia’s APT 44 AKA Seashell Blizzard | The Cybersecurity Podcast
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11Russia’s most notorious cyber unit—Seashell Blizzard (also known as Sandworm, APT 44 and Iron Viking)—has taken down shipping giants, Olympic systems, and Ukraine’s power grid. In this Threat Talks deep dive, Lieuwe Jan Koning, Yuri Wit (Red Team), and Rob Maas (Blue Team) reveal exactly how these attacks unfold, why they’re so hard to stop, and ho…
…
continue reading

1
Cyber Defense Radio - Vince Crisler - Celerium - Hotseat Podcast - 2025
15:14
15:14
Play later
Play later
Lists
Like
Liked
15:14Hosted by Gary Miliefsky, Publisher of Cyber Defense Magazine, this insightful episode features Vince Crisler, a proven cybersecurity leader helping organizations modernize how they prepare for, defend against, and respond to threats. Celerium delivers advanced capabilities for real-time threat intelligence sharing, incident response support, and o…
…
continue reading

1
Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention. Rob shares expert insights on: Proactive vs. Reactive cybersecurity — why a balanced security s…
…
continue reading

1
Nvidia Games: China v. the US in AI Arms Race
35:43
35:43
Play later
Play later
Lists
Like
Liked
35:43America’s edge in artificial intelligence may rest on one decision now facing Washington: whether to keep our most advanced chips out of Beijing’s hands. President Trump has moved to lift the export ban on Nvidia’s H20 processors—a move some warn could supercharge China’s AI ambitions and military power—arming the Chinese Communist Party for domina…
…
continue reading

1
Proactive Cyber Defense - Tony Pietrocola - Channel Security Secrets - Episode #3
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06What does it really take to earn a customer's trust in today’s cybersecurity landscape? In this episode of Channel Security Secrets, I sit down with Tony Pietrocola, President at AgileBlue, to explore how a customer-obsessed mindset drives long-term success, not just in sales, but in lasting partnerships. Tony unpacks how Trusted Advisors can build…
…
continue reading

1
Navigating the Cybersecurity Landscape with Tim Shipp
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33In this episode of Simply Offensive, Phillip Wylie is joined by Tim Shipp to discuss various aspects of cybersecurity, including the evolution of the field over the past 25 years, the importance of offensive security, and the challenges faced by both red and blue teams. Tim shares his extensive background in cybersecurity, touching on incident resp…
…
continue reading

1
Signal Gate: One Wrong Number Triggered the Largest U.S. Gov Data Leak | The Cybersecurity Podcast
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45One mis-typed contact detonates Signal Gate, turning “secure” messaging into a classified-data leak.Host Lieuwe Jan Koning (Co-founder, ON2IT) and Thomas Manolis (Security Officer, AMS-IX) lay out the breach blow-by-blow—then drop the Zero Trust, Shadow IT and information-governance tactics every CISO needs before the next incident hits.High stakes…
…
continue reading
Adm. Mark Montgomery has been on the road again – along with Craig Singleton and Matt Pottinger. All three FDD scholars just returned from a visit to Japan and Taiwan, two American allies increasingly threatened by Xi Jinping, the very ambitious Chinese Communist ruler. Mark joins host Cliff May for a debrief.…
…
continue reading

1
The Trusted Advisor Advantage - Rick Mischka - Channel Security Secrets - Episode #2
46:09
46:09
Play later
Play later
Lists
Like
Liked
46:09Ready to demystify cybersecurity and lead stronger, smarter conversations with clients? In this episode of Channel Security Secrets, I sit down with Rick Mischka, Cybersecurity SME at AVANT Communications and former U.S. Army Special Forces professional. Rick brings a unique perspective on translating complex security concepts into business-aligned…
…
continue reading

1
Splinternet Reality Check: Zero Trust Strategies for a Fragmenting Web
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31ON2IT’s Lieuwe Jan Koning goes one-on-one with AMS-IX CEO Peter van Burgel to expose why the once-open internet is splintering into rival, firewalled regions. Discover the geopolitical forces fueling this cybersecurity trend. Learn the Zero Trust resilience moves CISOs must deploy to stay sovereign in the future of the internet.Key Topics Covered• …
…
continue reading

1
Leveraging Offensive Security for Better Defense with Catherine Ullman
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45In this episode of Simply Offensive, Phillip Wylie is joined by Cathy Ullman, a principal technology architect in cybersecurity. Join us as we discuss Cathy's journey in the cybersecurity field, the evolution of security tools and threats, the importance of understanding offensive security, and the value of purple teaming. Cathy shares insights on …
…
continue reading

1
Why Your CISO Needs a “Shut Up, Boss” Button
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09What if GitHub sucks for security detections—and AI is finally good enough to replace it? Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks. Aaron doesn’t hold back. From ranting about…
…
continue reading
In 2005, Vladimir Putin said the fall of the Soviet Union was the “greatest political catastrophe of the 20th century.” As Sen. Mitch McConnell pointed out, that should have told us everything we needed to know about this ex-KGB lieutenant colonel. He made the remark at an event in the U.S. Senate discussing a new report on Putin’s war in Ukraine. …
…
continue reading

1
Breaking Down Chaos: Tactics and Origins of a New RaaS Operation
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s l…
…
continue reading

1
Decoding Channel Success - Kameron Olsen - Channel Security Secrets - Episode #1
53:23
53:23
Play later
Play later
Lists
Like
Liked
53:23Ready to unlock long-term success in the channel? In this episode of Channel Security Secrets, I sit down with Kameron Olsen, President at The Channel Advisors, to explore what it takes to thrive in today’s cybersecurity landscape. Kameron shares the critical mindset shifts needed to succeed, from adopting an ownership mentality to bridging the cyb…
…
continue reading

1
Cyber Defense Radio – Karthik Krishnan – Concentric.ai – Hotseat Podcast – 2025
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03🚨 New Episode of Cyber Defense Radio is LIVE! 🎙️ Hosted by Annabelle Thomas, Cybersecurity Champion of @CyberDefenseMag In this must-hear episode, Karthik Krishnan, Founder & CEO of Concentric.ai, dives into how their AI-powered data risk discovery platform is revolutionizing autonomous data security for enterprises. We explore how Concentric.ai he…
…
continue reading

1
The Power of Proactive Security with Rob Allen
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30In this episode of Simply Offensive, Phillip Wylie interviews Rob Allen, Chief Product Officer at ThreatLocker. Learn about the importance of proactive security measures, particularly in the context of ransomware prevention. Rob shares his journey to ThreatLocker and the company's unique approach of 'deny by default' in endpoint security. The conve…
…
continue reading

1
Zero Trust Step 4B: How to Secure Admin Access
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55Administrative accounts come with serious power – and serious power, comes with serious risk. In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access. They explore: 1) Why admins are a high-v…
…
continue reading

1
Why Jack in the Box Might Have the Best Security Team in Fast Food
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of Simply Defensive, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals. Chris shares his journey from Windows NT and dot-matrix printer…
…
continue reading