The Cyber Why Podcast
The Cyber Why Podcast

The Cyber Why Podcast

TCW: Where Security & Snark Collide!

Overview
Episodes

Details

TCW Pod is a verbal sparring match on the topics covered by the monthly TCW newsletter. In each segment, we will dissect, discuss, and debate the past few weeks' most critical cybersecurity and cyberbusiness stories with both expert and armchair opinions. We hope you will enjoy getting to know the hosts better, absorb a bit about how we see the world of cybersecurity, and maybe learn a little something with the launch of each episode. www.thecyberwhy.com

Recent Episodes

G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
JUL 30, 2024
G-Wiz, RockYou2024, SEC and Chevron Deference, and Ransom Payments - TCW EP5
<p>Welcome to TCW Pod #5, where we serve up the latest in cybersecurity with a side of snark and wit. In today's episode, we belatedly discuss the acquisition of Wiz by Google (until it wasn’t), the RockYou2024 password list is a nothing burger, the debate around cybersecurity being “full,” some political chat around the SEC weakening the state of cyber in the US along with the death of Chevron Deference, and how paying a ransom happens and the conflicts of interest within. All this and more as we blend serious insights with a splash of humor, making the world of cybersecurity both enlightening and entertaining. Let’s dive in!</p><p><p>Subscribe here for more The Cyber Why! It’s FREE so why not?!</p></p><p></p><p>TCW POD #5 SHOW NOTES</p><p>On this episode, hosts Tyler Shields, Katie Teitler-Santullo, & Adrian Sanabria tackle the following key points:</p><p><strong>01:04 - Introductions and Cold Open</strong></p><p>Welcome to The Cyber Why! Let’s goooooo!</p><p><strong>03:40 - Show Sponsor - Material Security</strong></p><p><strong><em>Get the most from your security team’s email alert budget</em></strong></p><p>Relying on built-in controls or traditional blockers will inevitably lead to more noise than your incident response team can handle.</p><p><a target="_blank" href="https://material.security/?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240801-the-cyber-why"><strong>Material Security</strong></a> takes a pragmatic approach to email security – stopping new flavors of phishing and pretexting attacks before reaching the user’s mailbox, while searching through everyone else’s mailbox for similar messages in a campaign. What gets surfaced to your team are the highest-value cases to investigate with all the context and reach consolidated into a single view. </p><p>Free up more of your alert budget so your team can spend it on what really matters. <a target="_blank" href="https://material.security/?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240801-the-cyber-why">See how much time you can give back to your security team with Material.</a></p><p><strong>04:30 G-Wiz - Wiz in Talks to be Acquired by Google (Until It Wasn’t)</strong></p><p>It’s crazy how fast the markets move. The $23B+ acquisition is a massive play by Google to push harder into the cybersecurity market. This pod was recorded on July 14th, the day that the acquisition rumors spread on the Internet. By the time we got to push this pod live, the story was already out of date. Less than two weeks later, Wiz called off the marriage, citing goals to pursue an IPO. Listen to check out our initial coverage of the announcement and see how it compares to how things ended up. Hindsight being 20/20, this is quite an interesting discussion. </p><p>20:20 RockYou2024 Datadump is a Nothing Burger!</p><p>The RockYou2024 massive password data dump is a waste of time. We’ll waste our breath on this podcast, so you don’t have to. If you are wasting time using this enormously large text file as a password list, you are not being nearly as effective as possible. Is the RockYou2024 file a troll attempt, or is it just someone’s bad attempt at valuable research? You decide. </p><p>34:40 Cybersecurity is Full (or is it)?</p><p>The link cyberisfull.com sparked a bunch of discussion and debate in the Twittersphere and Linkedin universe two weeks ago. Contrary to the marketing headlines that come around every six months, according to the website cyberisfull.com, cybersecurity does not have any entry-level jobs remaining. It’s becoming increasingly more challenging to enter the cybersecurity field as even the “entry-level jobs” require many years of experience and advanced certifications and degrees. The panel debates if cyber is genuinely full and, if so, how we solve the hiring and job issues within the cyber industry.</p><p>50:11 SEC is Weakening The Cybersecurity Posture of the United States</p><p>The panel responds to an essay written by well-known cyber analyst and former CISO Ed Amoroso. The article argues that the SEC's current actions weaken the United States' cybersecurity posture by placing undue pressure on CISOs. This has led to several negative behaviors, including minimizing written communication, increased legal consultations, scrutiny of past decisions, mandatory filings leading to stressful SEC interactions, and deterring talent from the CISO profession. The author urges the SEC to shift its focus from CISOs to CEOs to better protect national cybersecurity without compromising the effectiveness of cybersecurity professionals. What do you think? Is the CISO role safe and desirable for top cyber leaders, or is there way too much risk in making the job a career goal?</p><p>1:04:34 WTF is Chevron Deference and Why Does it Matter to Cyber?</p><p>Q: How do the herring fishing industry, Supreme Court rulings, and cybersecurity unite to make the world a better place? Answer: it doesn’t, but I learned much about these topics from this segment. The team, led by Katie’s research and knowledge, discusses how the recent “Chevron Deference” Supreme Court ruling limited the importance of expert witnesses and the impact on the CISO role. The herring fishing discussion is a cool chat on the history of the term Chevron Deference, so we have that going for us as well.</p><p>1:14:11 How Do Companies Go About Paying A Ransom</p><p>What does the process of paying a ransom look like? Do you put $24M into a bunch of suitcases and swap vans under a bridge? Obviously, that isn’t how the funds transfers happen in the world of cryptocurrency and digital hacking (but the visual is funny). Adrian helps break down the process of paying a ransom, using a ransom negotiator, how that business model works, and some of the inherent conflicts of interest that might exist here.</p><p>1:22:22 Story #5 - Free AIM VR Shoes</p><p><a target="_blank" href="https://www.freeaim.com/">Free Aim VR shoes</a> are funky treadmill boots that remove the need for an omnidirectional treadmill when in VR. Gotta check out the video to get a good understanding of what these things are. It’s only a few thousand dollars to look like a goofball.</p><p><p>Share TCW with your friends. Baby kittens will thank you!</p></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://www.thecyberwhy.com?utm_medium=podcast&#38;utm_campaign=CTA_1">www.thecyberwhy.com</a>
play-circle icon
86 MIN
Cyber arrests, Death of SIEM, MS Total Recall, Getting Snowflaked, and the Gili Ra'anan Model - TCW EP4
JUN 20, 2024
Cyber arrests, Death of SIEM, MS Total Recall, Getting Snowflaked, and the Gili Ra'anan Model - TCW EP4
<p>Welcome to TCW Pod #4, where we serve up the latest in cybersecurity with a side of snark and wit. In today's episode, we unravel the frosty Snowflake attack, navigate the labyrinth of SIEM's future, and dig into the spicy Gilli Ra'anan model. We also dish out tales of Scattered Spider arrests and the quirks of getting a job sans network. Buckle up as we blend serious insights with a splash of humor, making the world of cybersecurity both enlightening and entertaining. Let’s dive in!</p><p>TCW POD #4 SHOW NOTES</p><p>On this episode, hosts Tyler Shields, Rick Holland, Katie Teitler-Santullo, & Adrian Sanabria tackle the following key points:</p><p><strong>00:42 - Introductions and Cold Open</strong></p><p>Crime hasn’t been solved in other fields… so why should we be special? — Adrian Sanabria</p><p><strong>03:42 - Show Sponsor - Material Security</strong></p><p><strong>Does your email security solution fit your alert budget?</strong></p><p>Relying on built-in controls or traditional blockers will inevitably lead to more noise than your incident response team can handle.</p><p><a target="_blank" href="https://material.security/?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240606-the-cyber-why"><strong>Material Security</strong></a> takes a pragmatic approach to email security – stopping new flavors of phishing and pretexting attacks before reaching the user’s mailbox, while searching through everyone else’s mailbox for similar messages in a campaign. What gets surfaced to your team are the highest-value cases to investigate with all the context and reach consolidated into a single view. </p><p>Remediations are a breeze with Material – try it out for yourself at <a target="_blank" href="https://material.security/?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240606-the-cyber-why">material.security</a>.</p><p><strong>04:27 Have You Been Snowflaked?</strong></p><p>In this segment, we dive into the icy depths of the Snowflake attack. It starts with a chilling recount of the breach details, where info stealers had a field day, and customers found themselves compromised. The infamous Shiny Hunters make an appearance, shining a light on the murky world of cyber threats.</p><p>The conversation then melts into a discussion about partner compromise and the ever-looming fourth-party risk, like a game of cybersecurity Jenga waiting to topple. We hear about shared responsibility, where Snowflake tries to play the role of a responsible neighbor but ends up with a "Not in My Backyard" situation when infrastructure issues and media blame come knocking. Finally, things heat up with a discussion on credential security and the many flavors of Multi-Factor Authentication (MFA), leaving everyone pondering how to keep their digital igloos safe from the next big thaw.</p><p>25:25 Is SIEM Dead - If So What’s Next?</p><p>The future of SIEM is a labyrinth of challenges and labor intensity. The team explores the reinvention of SIEM, predictive analytics, and the inevitable evolution of security technologies. Amidst this, a debate on whether we should replace our SIEMs or embrace the challenges they bring unfolds, sprinkled with market trends and future forecasts.</p><p>38:30 Microsoft Recall Gets a TOTAL Recall</p><p>Microsoft Recall swoops in, bringing privacy and security concerns to the forefront. The discussion pivots to the marketing and user perception of Microsoft's latest move, wrapping up with insights that leave us all reconsidering the tech giant's role in our digital lives. If Recall had been released as an Apple product, would it have been so poorly received? After getting slapped by cyber folks worldwide, Microsoft throws in the towel and executes a “Total Recall of Recall.”</p><p>50:47 Job Hunting Without a Network - Is It Possible</p><p>In this segment, Katie shares the rollercoaster ride of landing a job without a robust network. Spoiler alert: she cheated a bit. With a new gig at Ox Security, Katie spills the tea on how her extensive network fast-tracked her through the hiring process like a VIP at a cyber nightclub. Her network of connections, cultivated over years of schmoozing at conferences and trading favors, turned the grueling job hunt into something easier. Katie's journey underscores the reality that in the cybersecurity world, it’s often not what you know but who you know.</p><p>Katie’s article, “Finding a Cyber Job Without a Network,” struck a chord with readers, setting LinkedIn message boxes ablaze. She acknowledges her privilege, highlighting the plight of the less-connected masses who prefer a clear divide between work and personal life. Her candid reflection reveals the industry's bias towards the well-networked, leaving the heads-down, do-the-work folks in the dust. It’s a stark reminder: in the land of cybersecurity, your network is your net worth. ​</p><p>58:40 Scattered Spider and Law Enforcement Actions</p><p>This segment spins a web of intrigue as the team dives into the latest Scattered Spider arrest. Tyler B., not to be confused with our own beloved Tyler S., gets nabbed in Spain, shaking up the cybercrime community. Rick breaks down how these cyber villains often meet their fate while globetrotting, unlike their Russian counterparts who wisely stay put. Scattered Spider stands out in the ransomware crowd, a hodgepodge of English speakers mingling with Russian groups, showing that cybercrime truly transcends borders.</p><p>Rick adds a sprinkle of Hollywood flair with a nod to Jeff Goldblum's "cybercrime finds a way" quip, highlighting the resilience of these digital miscreants. From targeting MGM to causing a ruckus earlier in the year, Scattered Spider’s antics have kept law enforcement busy. This discussion underscores the relentless game of cat and mouse between cyber criminals and the authorities, reminding us all that in the world of cybercrime, there’s always another villain waiting in the wings.</p><p>63:00 The Gilli Ra’anan Model</p><p><strong>SPICY TAKE!</strong> The team dives into the controversial "Gilli Ra'anan Model," named after the founder of CyberStarts, Gilli Ra'anan. Known for his uncanny knack for success, Ra'anan's stats are almost too good to be true. A former member of Israel's elite 8200 unit and the man behind CAPTCHA (yes, he's the reason you’re identifying traffic lights to prove you're human), Ra'anan has made waves in the cybersecurity investment world.</p><p>The spotlight is on his venture capital firm, CyberStarts, and its innovative yet eyebrow-raising Sunrise program. While applauding his impressive track record, the discussion doesn't shy away from the spicy takes and potential conflicts of interest that come with such a unique approach to venture capital. As the story unfolds, the team highlights the fine line between groundbreaking success and the murky waters of ethical dilemmas in the cyber investment landscape.</p><p>75:00 My Money Don’t JIGGLE JIGGLE - It Folds! Employment Scams and Mouse Jigglers</p><p>The conversation takes a quirky turn as the team delves into the world of employment scams and mouse jigglers. Anecdotes fly, and the ethical dilemmas of multi-job stacking come to light. With humorous commentary, the discussion reveals the creative lengths people go to in the name of remote work shenanigans, proving once again that truth is stranger than fiction.</p><p>95:00 So Long, And Thanks For All The JIGGLES!</p><p>With the final notes of gratitude, the podcast concludes. The team thanks the participants, sponsors, and the dedicated production crew at Dead Inside Media. With heartfelt waves and cheerful goodbyes, they wrap up another enlightening episode of the Cyber Why podcast, leaving listeners eager for the next round.</p><p><p>Share TCW with your friends. Baby kittens will thank you!</p></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://www.thecyberwhy.com?utm_medium=podcast&#38;utm_campaign=CTA_1">www.thecyberwhy.com</a>
play-circle icon
81 MIN
TCW Big Heads, Laceworks Deal, SiSense Redux, MSFT CSRB Tear Down, $100 Security Budget, and Exoskeletons - TCW EP3
MAY 5, 2024
TCW Big Heads, Laceworks Deal, SiSense Redux, MSFT CSRB Tear Down, $100 Security Budget, and Exoskeletons - TCW EP3
<p><strong>Welcome back to episode #3 of The Cyber Why Pod.</strong> The show where the okay-est four hosts in podcasting history tackle last month’s top cybersecurity and technology stories. Check out this episode as we cover some killer topics, including the new Big Head TCW team, Lacework’s potential fall from grace, Chrome finally taking a bite out of cookie theft, SiSense and the results of SaaS big data breaches, the impact of the US ban on non-competes, a Microsoft Meta-Review and CSRB tear down, the continuing NVD backlog issues, what would you do with a $100 security budget, and a real live exoskeleton. </p><p>Read below to jump to your favorite parts, or watch it straight through from start to finish. Remember—we love you! Please click subscribe and share with your friends if you want to see more!</p><p>TCW POD #3 SHOW NOTES</p><p>On this episode, hosts Tyler Shields, Rick Holland, Katie Teitler-Santullo, & Adrian Sanabria tackle the following key points:</p><p><strong>00:42 - Introductions</strong></p><p><strong>03:17 - Show Sponsor - Material Security</strong></p><p><a target="_blank" href="https://material.security/phishing-protection?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240404-the-cyber-why">Are you wasting your email security budget?</a></p><p>When every dollar counts, you want to make sure you make the most of what you get. You (hopefully) get funds for anti-phishing tools, but the threat landscape extends beyond the inbox.</p><p>With more sophisticated attack flavors at higher volumes than ever, email security must also encompass insider risk scenarios, account takeover protection, and data loss prevention.</p><p>See why <a target="_blank" href="https://material.security/phishing-protection?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240404-the-cyber-why">Material Security</a> is the preferred choice for organizations looking to protect more areas of their Microsoft 365 or Google Workspace footprint under a unified toolkit… and a single line item in the budget.</p><p><strong>04:19 Meet The TCW Big Head Crew</strong></p><p>Tyler unveils the new TCW Big Head crew. The reactions are priceless; each squad member will have their own Big Head to play with at home!</p><p><strong>06:35 Lacework’s Fall From Grace</strong></p><p>The crew discusses the fall of Lacework, a once high-valued startup in the cloud security industry. The potential acquisition by Wiz for a fraction of its previous value raises questions about the future of cloud security startups and the overall market. The deal also highlights the trend of consolidation in the industry. Details include the impact on Lacework's employees and customers, the long-term implications for competition and innovation, and whether consolidation will benefit or harm the cloud security industry. The deal fell apart shortly after recording this POD, and Laceworks is back on the market.</p><p><strong>16:30 Chrome to Fight Cookie Theft</strong></p><p>For a while, Google has been trying to replace cookies for user tracking with initiatives like FLoC. Now, they are introducing Device-bound Security Cookies (DBSC) to combat cookie theft. DBSC uses cryptographic keys bound to the device and requires explicit website usage. However, it may not fully address malware that steals login credentials. The team raises questions about the effectiveness of DBSC, the balance between user privacy and effective advertising, and the broader implications of storing credentials in plain text.</p><p><strong><em>Rick also sings C is for Cookie from Sesame Street - A MUST-SEE MOMENT</em></strong></p><p><strong>27:30 SiSense Breach and Other Big Data SaaS Security Issues</strong></p><p>SiSense, a business intelligence and data analytics platform, has experienced a data breach. The exact nature of the breach and the affected data are not yet known, but reports suggest millions of credentials may have been compromised. SiSense customers are urged to reset passwords and credentials, and law enforcement is involved in the investigation. The breach raises questions about the scope and impact, security weaknesses in BI platforms, recommendations for affected customers, attribution and motives of the attackers, long-term ramifications for data security and BI platform usage, lessons learned for other companies, future advancements in BI platform security, and the role of regulatory bodies in setting data security standards.</p><p><strong>43:00 Potential Impacts as US Bans Non-Compete Agreements</strong></p><p>The recent ban on non-compete agreements in the US is expected to have mixed impacts on startups. It will provide access to a larger talent pool and potentially foster innovation. Still, it may also make it harder to retain key employees and expose startups to poaching by larger companies. The ban could also pressure established companies to offer competitive wages. The decision aims to promote worker mobility and increase wages, but its effect on startups will depend on various factors.</p><p><strong>55:15 A Meta-Review of the 2023 Exchange Online Intrusion</strong></p><p>This team discusses the CSRB report on the summer 2023 MEO intrusion at Microsoft. The report highlights the major security breach, the failure to detect the attack, and the issues with Microsoft's security culture, key management, log retention, and notification system. It also provides recommendations for improving security practices, including enhancing security culture, modernizing key management, improving logging, and reworking IAM architecture. The crew emphasizes the need for shared responsibility between providers and customers and calls for greater transparency and reporting of breach details.</p><p><strong>1:09:40 NVD Backlog and Lack of Enrichment Continues</strong></p><p>The National Vulnerability Database (NVD) has experienced a slowdown in enriching new vulnerabilities with critical details, leading to concerns about the accuracy and timeliness of information for cybersecurity professionals. The slowdown is attributed to a surge in discovered vulnerabilities and resource limitations. Despite this, the NVD remains a valuable resource, and cybersecurity professionals are urged to prioritize patching and utilize alternative sources for vulnerability information. Questions arise regarding the impact on risk assessment, increased security risks, accountability and transparency, industry collaboration, and the future of NVD.</p><p><strong>1:17:00 $100 Security Tool Budget - 1st Move</strong></p><p>The TCW crew discusses the concept of a $100 cybersecurity budget and how cyber professionals would spend it. They pose the question of the low-hanging fruit in cybersecurity and how we can fix these problems quickly.</p><p><strong>1:26:20 Story #5 - Dnsys X1 Exoskeleton - Cool or Fool?!</strong></p><p>The Dnsys X1 Exoskeleton is advertised as a way to unleash superhuman athletic potential. The Crew provides humorous commentary on the video, highlighting the potential risks and limitations of the exoskeleton. Is it a gateway to laziness or a kickass exercise tool? The team debates this in this month’s story #5.</p><p><p>Share if you think an Exoskeleton would be BAD ASS (or not)!</p></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://www.thecyberwhy.com?utm_medium=podcast&#38;utm_campaign=CTA_1">www.thecyberwhy.com</a>
play-circle icon
96 MIN
DEFCON Canceled, Pay-to-Play Analysts, NVD Explosion, Apple Chip Flaws, Exit Scams, and United Healthcare - TCW EP2
APR 2, 2024
DEFCON Canceled, Pay-to-Play Analysts, NVD Explosion, Apple Chip Flaws, Exit Scams, and United Healthcare - TCW EP2
<p>Welcome back to episode #2 of The Cyber Why Pod. The greatest four hosts in history tackle the last months top cybersecurity and technology stories. Check us out this month as we cover some killer topics from Defcon’s cancellation, the slow death of NVD, and the rise of Shrimp Jesus. Read below to jump to your favorite parts or watch it straight through from start to finish. Remember - we love you! Please click subscribe and share to your friends if you want to see more!</p><p>TCW POD #2 SHOW NOTES</p><p>On this episode, hosts Tyler Shields, Rick Holland, Katie Teitler-Santullo, & Adrian Sanabria tackle the following key points:</p><p><strong>00:42 - Introductions</strong></p><p><strong>04:20 - Show Sponsor - Material Security</strong></p><p><a target="_blank" href="https://material.security/phishing-protection?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240404-the-cyber-why">Are you wasting your email security budget?</a></p><p>When every dollar counts, you want to make sure you make the most of what you get. You (hopefully) get funds for anti-phishing tools, but the threat landscape extends beyond the inbox.</p><p>With more sophisticated attack flavors at higher volumes than ever, email security must also encompass insider risk scenarios, account takeover protection, and data loss prevention.</p><p>See why <a target="_blank" href="https://material.security/phishing-protection?utm_source=third-party&#38;utm_medium=email&#38;utm_campaign=20240404-the-cyber-why">Material Security</a> is the preferred choice for organizations looking to protect more areas of their Microsoft 365 or Google Workspace footprint under a unified toolkit… and a single line item in the budget.</p><p><strong>06:06 - DEFCON Was Canceled - Then it Wasn’t! </strong></p><p>The history of DEFCON and the hotels that have been blown up. Is the new venue for DEFCON a better or a worse outcome than had it not been canceled? Was the ransomware attack the driver of the changes?</p><p><strong>22:51 - Are Analyst Firms Pay-to-Play?</strong></p><p>This is a pet peeve of mine. At least once or twice a year I read a thread on LinkedIn or Slack message that buckets all analysts as pay to play. It’s not reality and it’s not how the analyst firms truly operate. What makes someone “pay-to-play” and where do you draw the line on influence in analyst relations. Listen to this to get to the meat of the issue.</p><p><strong>42:41 - The NVD Explosion - NIST Stops Enriching NVD</strong></p><p>Over 6000+ new vulnerabilities discovered in 2024 and less than 43% of them have been enriched by NVD. NVD is falling off a cliff! What will the impact of this issue be on the vulnerability management product offerings and enterprises that use them? </p><p><strong>01:00:17 - Apple Chip Flaws Let’s Hacker Steal Encryption Keys</strong></p><p>Vulnerabilities with marketing campaigns very rarely end up being important to the enterprise (with a few notable exceptions). This big buzzy vulnerability, while very interesting to the technically inclined researchers, is really not much more than a “nothing burger” at the end of the day. Adrian’s pointed take is a bit of a spicy enchilada!</p><p><strong>01:08:36 - No Honor Among Thieves - Exit Scams</strong></p><p>Rick level sets on what an “exit scam” is and how the worst of the worst end up burning each other often catching the real victims in the cross fire. If only criminals could trust each other.. it would make our lives “better?” </sarcasm> BlackCat / AlphV details and background on their brutal exit scam.</p><p><strong>01:21:05 - United Healthcare and Optum</strong></p><p>Katie dives into the healthcare impacts of the massive exit scam that Rick detailed in the previous section. This attack had personal impacts on my family and many people you likely know. We are in a real spot here for health care security throughout the United States.</p><p><strong>01:32:44 - Water Water Everywhere - 10K Cyber Products</strong></p><p>According to <a target="_blank" href="https://substack.com/profile/6189296-richard-stiennon">Richard Stiennon</a> ‘s research at IT-Harvest there are over 10K products in the global cybersecurity market. This is a huge distraction to the enterprise buyers who really have no ability to understand what they should do to secure their environments.</p><p><strong>01:40:00 - Story #5 AI Generated Shrimp Jesus</strong></p><p>Shrimp jesus takes over the Internet. I believe in Shrimp Jesus! Hallelujah Shrimp Jesus. Happy EASTER Y’all!</p><p><p>Share if you like Shrimp JESUS!</p></p><p></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://www.thecyberwhy.com?utm_medium=podcast&#38;utm_campaign=CTA_1">www.thecyberwhy.com</a>
play-circle icon
105 MIN
To Platform or Not, Red & Blue AI Terminators, Canada "Flips" Out, & Cyberbowl Ads - TCW#1
MAR 6, 2024
To Platform or Not, Red & Blue AI Terminators, Canada "Flips" Out, & Cyberbowl Ads - TCW#1
<p><strong>TCW POD #1 SHOW NOTES</strong></p><p>Welcome to the The Cyber Why Podcast, where security and snark collide. On this episode hosts Tyler Shields, Rick Holland, Katie Teitler-Santullo, & Adrian Sanabria ask the questions:</p><p><a target="_blank" href="https://www.thecyberwhy.com/p/palo-altos-big-hairy-audacious-goal">Palo Alto hits 10 Billion in market cap, can other companies do the same?</a></p><p><a target="_blank" href="https://www.thecyberwhy.com/p/the-cyber-why-what-we-read-this-week-560">Adversarial uses of AI, What's the reality?</a></p><p><a target="_blank" href="https://www.thecyberwhy.com/p/the-cyber-why-what-we-read-this-week-6af">Deepfakes are becoming real. What does 2024 look like concerning protection from deepfake phishing attacks?</a></p><p><a target="_blank" href="https://ventureinsecurity.net/p/trust-no-one-why-we-cant-trust-most">Why We can't trust cyber metrics?</a></p><p><a target="_blank" href="https://www.bleepingcomputer.com/news/security/canada-to-ban-the-flipper-zero-to-stop-surge-in-car-thefts/">Why did Canada Ban the Flipper Zero?</a></p><p><a target="_blank" href="https://www.thecyberwhy.com/p/the-cyber-why-what-we-read-this-week-560">Are Cyber related Superbowl ads really worth it?</a></p><p>Here’s a link to the Crowdstrike advertisement we reference….</p><p><a target="_blank" href="https://www.linkedin.com/posts/haroonmeer_cybersecurity-infosec-activity-7154039193512353792-JoUP/">Can you Bootstrap a cybersecurty company in 2024?</a></p><p><a target="_blank" href="https://www.404media.co/instacarts-ai-recipes-look-literally-impossible/?ref=daily-stories-newsletter">AI and recipes - Why do Instacart's AI recipes look literally impossible?</a></p><p>For more visit: <a target="_blank" href="https://www.thecyberwhy.com/">https://www.thecyberwhy.com/</a></p> <br/><br/>This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit <a href="https://www.thecyberwhy.com?utm_medium=podcast&#38;utm_campaign=CTA_1">www.thecyberwhy.com</a>
play-circle icon
88 MIN