• Cybersecurity Awesomeness Podcast - Episode 154
    Apr 24 2026

    In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the radical evolution of exploit triage following the RSAC 2026 conference. They highlight Anthropic’s "Mythos," a sophisticated red-teaming AI capable of autonomously discovering and chaining vulnerabilities without human oversight. Unlike traditional hacking methods that rely on static kits, modern AI toolkits can scan massive IP ranges for every vulnerability in history—essentially automating the "needle in a haystack" search for attackers. This shift is particularly dangerous for legacy environments—essentially creating "Terminator" moments for infrastructure—where Windows XP embedded is still found in modern EV chargers.

    Citing Shodan statistics, the hosts reveal the alarming presence of public-facing legacy systems: approximately 5,000 instances of Windows Vista/Server 2008, 2,000 Windows Server 2003 systems, and 4 public Windows XP servers running IIS. Steffen and Buckler conclude that we have entered an "AI arms race" where automated adversaries outpace manual defenses, making continuous scanning and robust cyber hygiene vital for survival.

    Mostra di più Mostra meno
    15 min
  • Cybersecurity Awesomeness Podcast - Episode 153
    Apr 17 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler dive into the FCC’s 2026 ban on foreign-made routers and the growing national security risks lurking in consumer hardware. The hosts break down how Russian intelligence (GRU) is currently weaponizing unpatched home routers to execute DNS hijacking. By silently altering DNS settings, attackers can monitor your traffic or redirect you to spoofed websites to harvest banking and social media credentials.

    The discussion highlights that cybersecurity hygiene isn't just for "high-value targets." Even if you aren't guarding state secrets, opportunistic threat actors use these vulnerabilities for high-volume ransomware and blackmail schemes. To combat this, the hosts advocate for:

    -- Firmware vigilance: Updating router software and changing default passwords immediately.

    -- DNS Sovereignty: Manually configuring devices to use secure public providers like Cloudflare (1.1.1.1), Google (8.8.8.8), or Quad9 (9.9.9.9).

    Ultimately, this episode serves as a candid reminder: your "toy" hardware is a gateway, and it’s time to lock the door.

    Mostra di più Mostra meno
    14 min
  • Cybersecurity Awesomeness Podcast - Episode 152
    Apr 10 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore Google’s recent quantum computing milestone, which significantly accelerates the timeline for "Q-Day." Google’s research suggests that the physical qubit requirement to crack a Bitcoin signature could be slashed from millions to just 500,000, with scalable systems potentially arriving by 2029. While the hosts clarify that today’s blockchain remains secure for now, the announcement underscores an urgent need for organizations to adopt Post-Quantum Cryptography (PQC).

    The discussion highlights how traditional computing is hitting physical barriers, making quantum specialized power the next logical step for high-intensity tasks. Beyond security risks, Steffen and Buckler discuss the "Star Trek-esque" benefits of quantum, including near-instant DNA sequencing for personalized medicine and the potential for zero-latency deep-space communication via quantum entanglement. Ultimately, the episode serves as a crucial call to action: PQC is no longer a distant science project but a looming requirement. Security professionals must educate themselves and demand quantum-readiness strategies from their vendors to ensure long-term data protection.

    Mostra di più Mostra meno
    12 min
  • Cybersecurity Awesomeness Podcast - Episode 151
    Apr 3 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler offer a comprehensive recap of RSAC 2026, cutting through the noise of 40,000 attendees to deliver critical takeaways from the industry’s "Super Bowl." While AI dominated nearly 80% of vendor booths, the hosts differentiate between "marketecture" and meaningful innovation. They emphasize that deploying agentic AI without robust Data Security Posture Management (DSPM) is a recipe for unmanaged data sprawl and "Shadow AI" risks, where sensitive proprietary information is accidentally leaked into public models.

    A significant portion of the discussion focuses on the maturation of identity management, noting a shift toward granular guardrails for AI agents to prevent overprivileged access. The duo also debunks the myth of AI as a headcount replacement for SOC analysts, highlighting its lack of "tribal knowledge" and innovative problem-solving. Beyond the AI hype, the conversation touches on the urgency of Post-Quantum Cryptography (PQC) and the evolving role of the CISO—transitioning from a "head nerd" to a strategic risk manager under new regulatory mandates. Ultimately, the episode serves as a reminder that foundational data governance remains the true anchor in a high-velocity threat landscape.

    Mostra di più Mostra meno
    16 min
  • Cybersecurity Awesomeness Podcast - Episode 150
    Mar 20 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the 2026 RSAC in San Francisco. Dubbed the "Super Bowl" of security, the event expects over 45,000 attendees and 600 vendors at the Moscone Center. Chris, managing a schedule of nearly 40 meetings, joins Ken to navigate the overwhelming noise of the show floor.

    The duo identifies Agentic AI and autonomous solutions as the dominant—yet potentially distracting—themes of the year. They caution against the "silver bullet" mentality, urging leaders to focus on securing AI agents against hallucinations and IP leaks rather than viewing them as total replacements for human staff. Beyond the AI hype, they highlight the critical arrival of "Q-Day" and the necessity of Post-Quantum Cryptography (PQC) readiness. The hosts encourage listeners to visit the Innovation Sandbox and Early Stage Expo for emerging tech while maintaining a steadfast commitment to foundational cyber hygiene. Ultimately, they embrace the conference theme, "The Power of Community," emphasizing that face-to-face networking remains the industry’s most valuable asset.

    Mostra di più Mostra meno
    15 min
  • Cybersecurity Awesomeness Podcast - Episode 149
    Mar 13 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the RSA Conference (RSAC), often described as the "Super Bowl" of cybersecurity by talking about the EMA Vendor Vision report. To help attendees navigate the overwhelming presence of over 600 exhibitors, the hosts break down EMA’s "Vendor Vision" report, which spotlights ten essential innovators. The discussion covers a broad technological spectrum, ranging from Straker’s cutting-edge adversarial AI in the Early Stage Expo to Sky High Security’s leadership in Data Security Posture Management (DSPM).

    Key highlights include AWS’s unified cloud security suite, Acalvio's deception technologies, F5’s API-driven AI protections, and the evolving identity landscape spearheaded by Yubico and SailPoint. The hosts also examine the maturation of Privileged Access Management through Delinea and Keeper Security, alongside Proofpoint’s focus on human-centric vulnerabilities and business email compromise. By filtering the noise of the Moscone Center, this episode provides a strategic roadmap for identifying the technical trends that will define the industry for the coming months. It serves as an indispensable guide for anyone looking to maximize their impact and insight during the conference.

    Mostra di più Mostra meno
    15 min
  • Cybersecurity Awesomeness Podcast - Episode 148
    Mar 6 2026

    In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the shifting priorities of Chief Information Security Officers (CISOs) as they navigate the transition from rapid AI adoption to a more disciplined, risk-aware strategy. As of 2026, the "deploy first, secure later" mentality is facing a reckoning, particularly regarding autonomous or agentic AI. The discussion highlights alarming real-world incidents—such as an AI agent deleting a production database during a code freeze and another wiping a Meta executive's inbox despite repeated "stop" commands—to illustrate the volatility of unmanaged AI.

    The conversation characterizes AI as a paradox: a tool with "graduate-level intelligence but the gullibility of an eight-year-old." The hosts argue that marginal productivity gains cannot justify catastrophic risks like data destruction or unauthorized access. Ultimately, the episode emphasizes that AI should not be pursued at the expense of foundational security pillars like identity management. CISOs are urged to apply existing human-centric guardrails to AI agents, ensuring these tools remain business enablers rather than liabilities.

    Mostra di più Mostra meno
    13 min
  • Cybersecurity Awesomeness Podcast - Episode 147
    Feb 27 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore the looming reality of quantum computing and its inevitable collision with modern encryption standards. The discussion centers on Q-Day—the theoretical point at which quantum processors reach approximately 100,000 qubits, making current AES-256 encryption vulnerable to near-instantaneous decryption. The hosts emphasize the Harvest Now, Decrypt Later strategy, where adversaries stockpile encrypted sensitive data today in anticipation of tomorrow’s quantum capabilities.

    While acknowledging the Quantum Dividend—the massive potential for breakthroughs in medicine and engineering—the conversation serves as an urgent call to action for security professionals. Organizations must move beyond traditional binary mindsets to adopt quantum-resistant algorithms, as the transition is a multi-year endeavor rather than an overnight fix. Even for those skeptical of the timeline, the push toward quantum readiness represents a necessary evolution in global security standards. Ultimately, the episode underscores that being quantum ready is no longer a futuristic luxury but a foundational requirement for protecting long-term intellectual property and state secrets in an increasingly complex digital landscape.

    Mostra di più Mostra meno
    13 min