DrZeroTrust

Dr. Chase Cunningham
DrZeroTrust
Senaste avsnittet

235 avsnitt

  • DrZeroTrust

    Balancing Hoodies and Suits in Cybersecurity

    2026-03-30 | 23 min.
    Most cybersecurity conferences have become echo chambers filled with repetitive buzzwords and the same problems dressed up in new clothes—until now. At RSA 2023, Chase Cunningham and industry insiders peel back the hype, revealing why much of what’s marketed as revolutionary is just a rehash of old issues with a shiny AI layer. They expose the industry's broken system, the deluge of vendors pushing features over real solutions, and the absurdity of AI washing across booths.

    You'll discover how the cybersecurity industry is fundamentally broken—sold and purchased like healthcare, with vendors cashing in on the chaos. Chase highlights what’s really valuable on the show floor, distinguishing between blind VC pump-and-dump tactics and genuine game-changing innovations. He breaks down why AI, despite the hype, is exposing long-standing vulnerabilities rather than creating new solutions, and how the race to be the loudest often masks the lack of substance.

    We break down the political landscape of cybersecurity conferences: RSA vs. Black Hat vs. DEF CON—what they reveal about the industry's focus, and why the most meaningful conversations happen in smaller, more intimate settings. Chase warns of the coming AI hype backlash and warns CISOs to resist being lured into buying solutions that won’t deliver. Instead, he advocates returning to fundamentals—doing the basics well with clarity and focus—while leveraging AI to enhance, not replace, core security practices.

    Why does this matter? Because the current cycle is setting organizations up for disappointment and missed opportunities. Yet, amid the noise, there’s genuine innovation, a shift in community dynamics, and a growing recognition that cybersecurity’s true future depends on embracing the basics again. This episode is essential listening for leaders tired of the hype and hungry for real strategy, honest conversations, and practical solutions in a rapidly evolving landscape.

    Want to understand what’s really happening behind the corporate curtain at RSA? Curious about why the AI frenzy might do more harm than good? Or looking for how to cut through the noise and get back to what works? Tap in now—this episode is your strategic reset.
  • DrZeroTrust

    What No One Tells You About America’s Cyber Strategy and Its Gap in Power

    2026-03-10 | 17 min.
    In this episode, I am pulling back the curtain on America's cybersecurity strategies. Too often, these strategies are just warm words that never translate into real action. I'm here to reveal why our current cyber policies are more talk than walk, and what needs to change before the next big breach hits. Whether you're a small business owner, government professional, or cybersecurity enthusiast, you'll want to hear the behind-the-scenes truth about why our lofty plans often fall flat in execution—and exactly what it takes to finally bring these policies to life.

    Join me as I dive into President Trump’s recent cybersecurity strategy and expose the gaps between lofty goals and real-world results. You'll discover why repeated national frameworks like Zero Trust and post-quantum cryptography are just bureaucratic RSVPs if they lack enforcement. I’ll break down the complex web of federal agencies—like CISA, NSA, and the National Cyber Director—and explain why fragmentation and legal limitations prevent any one agency from truly commanding the nation’s cyber defense. Spoiler: there’s no centralized authority, no unified command, and no teeth to enforce policies at scale.

    I’ll also break down the six key pillars of America’s cyber strategy—shaping adversary behavior, streamlining regulation, modernizing federal networks, securing critical infrastructure, protecting innovation, and building talent—and reveal why, despite their good intentions, most are recycled talking points lacking real follow-through. You'll learn why current federal initiatives are already years behind schedule, and what it really takes to turn strategy into execution—not just more memos, but actual authority, funding, and accountability.

    This episode underscores a harsh truth: without clear leadership, enforceable standards, and consequences for inaction, America’s cyber defenses remain a patchwork of good ideas but poor results. If you’re tired of empty policy paper promises and want to understand what must happen for real progress, this is essential listening. Navigate the truth behind the headlines with me and learn how we can finally move from planning to protection—before the next cyber crisis hits.

    Why listen? Because cybersecurity isn’t just a tech issue—it’s a national security challenge that depends on authority, accountability, and action. Whether you're a business owner or a policy wonk, get the inside scoop on why much of what’s been promised is just talk, and what it really takes to secure the digital frontier.
  • DrZeroTrust

    Beyond Perimeter Defenses: DLP, CASB, and the AI Agent Revolution

    2026-03-03 | 29 min.
    Unlock the future of cybersecurity where AI agents no longer just assist—they act autonomously, making decisions that could impact your entire organization. In this eye-opening episode, Vidit Arora, founder and CEO of Quillr AI, reveals how rapidly AI-powered agents are transforming the digital landscape—and why traditional security systems are already obsolete.

    As AI agents gain full control over data movement, system modifications, and even decision-making processes, security professionals face unprecedented challenges. Vidit uncovers why existing frameworks like DLP and CASB fall short in this new era, and how the lack of contextual understanding enables agents to bypass legacy controls. You'll discover how the speed at which AI agents evolve makes zero-day threats look slow—and the urgent need for inline reasoning and adaptive defenses to keep pace.

    We break down critical topics such as:
    The shift from AI assisting to AI acting with autonomy and intent
    Why current security paradigms can’t catch or control fully autonomous agents
    How understanding agent context, intent, and ecosystem visibility is now a security imperative
    The role of a new decision layer that inlines reasons over agent actions in real time
    Practical strategies for achieving comprehensive AI footprint discovery and control
    Failing to adapt to this new AI-driven environment risks data breaches, operational chaos, and the loss of control over your digital assets. But by embracing a proactive, context-aware security approach, you open the door to innovation—without risking your organization’s future.
    Perfect for security leaders, CTOs, and AI strategists, this episode will challenge everything you thought you knew about cyber defense. If you're serious about safeguarding your organization amid AI's explosive growth, you'll want to hear this now.

    Visit quiller.ai to explore cutting-edge AI visibility tools and learn how to future-proof your security stance. Don’t let autonomous agents catch you off guard—stay ahead of the curve before the next disruptive move takes you by surprise.
  • DrZeroTrust

    CrowdStrike's 2026 insights and the insanity of vendor nomenclature for threat actors.

    2026-03-02 | 29 min.
    Welcome to the AI-powered cyberpunk timeline.
    We’re ripping into CrowdStrike’s 2026 Threat Report and translating it from analyst-speak into what it actually means for anyone who has to defend real systems in the real world.

    Most threat reporting reads like a D&D campaign with spreadsheets: too many “groups,” too many names, and not enough “what do I do about it?” We’re doing the opposite. The headline is simple: AI is turning cybercrime into a high-speed manufacturing line—and your legacy defenses are out here trying to stop a Tesla with a traffic cone.

    In this episode, we break down how adversaries are using AI to:

    Scale social engineering into a nonstop persuasion engine

    Slip past signature-based controls like they’re not even there

    Run cross-domain ransomware ops faster, cleaner, and more coordinated than most defenders can track

    We dig into the numbers (including the reported 89% spike in AI-enabled activity) and the bigger trend that matters even more: the shift toward interactive intrusions—human-led operations that blend into normal admin behavior, live off the land, and make your “alerts dashboard” look like a sad slot machine.

    You’ll also hear why the modern threat landscape is basically:

    Big Game Hunting crews targeting enterprises like it’s a sport

    Supply chain compromises that don’t need your permission to ruin your quarter

    AI-generated malware, personas, and pretexts built to beat humans, not just tools

    And yes—we talk about the stuff everyone pretends isn’t the problem:

    Unmanaged edge devices (because “we’ll inventory later” is a strategy, apparently)

    VPN/firewall dependency, like it’s still 2012

    Cloud sprawl + identity chaos creating perfect lanes for lateral movement and quiet exfil

    Then we address the clown show: adversary naming chaos. CrowdStrike calls one thing X, another firm calls it Y, and by the time the briefing deck hits leadership, it’s basically: “We got hacked by… someone.” Russia, China, North Korea—aliases multiplying like gremlins after midnight. If we can’t speak clearly about who’s doing what, we can’t respond clearly either.

    This isn’t doom porn. It’s a call to action:

    Simplify how you understand threats

    harden trust relationships and identity paths

    deploy proactive controls that assume the attacker is fast, adaptive, and increasingly automated

    If you’re in security ops, engineering, or executive strategy, this one’s your field manual for what’s next—because in the AI era, the defenders who “wait for confirmation” are the ones writing breach reports at 2AM.

    Rethink your model.
    AI is making attacks faster, smarter, and more aggressive. The only way to win is to understand the adversary’s blueprint—and build your defenses like you actually believe the internet is hostile (because it is).
  • DrZeroTrust

    The Hidden Architecture Secrets Making Real-Time Security Data Possible

    2026-02-24 | 31 min.
    Most organizations are drowning in data they can't process fast enough — leaving critical security gaps that adversaries exploit. Michael Cucchi, Chief Marketing Officer at Hydraulics, reveals how a groundbreaking new data architecture is transforming real-time security analytics, slashing processing costs by up to 40X while capturing every byte of telemetry across global networks.

    In this episode, you’ll discover why traditional Security Information and Event Management (SIEM) systems are no longer sufficient for today’s threat landscape. Michael breaks down the limitations of legacy data storage, ingestion bottlenecks, and costly rehydration issues that leave security teams blind during breaches. He shares how leading companies are adopting a new security data fabric designed for hyper-scalability, instant analysis, and unprecedented data retention — all at a fraction of the cost.

    We break down:
    The evolution and modern challenges of the SIM market, including why outdated architectures struggle with today’s data volumes.

    How security analytics are rapidly moving toward real-time, agentic automation driven by AI and large-scale data fabrics.

    The critical importance of low-latency querying, cost-effective storage, and flexible architectures that enable security teams to operate at machine speed.

    Why the next wave of security operations will depend on maintaining and rehydrating vast, granular data stores without breaking the bank.

    How innovative companies like Hydraulics are building the emerging data fabric that will underpin zero-trust, AI-driven security in the years ahead.
    This episode is essential listening for security professionals, CTOs, and data architects eager to stay ahead of the exponential growth in security signals, threats, and complexity. Miss out on these insights, and your organization risks falling behind—armed only with legacy systems that can’t keep up. A smarter, faster, cheaper future for security analytics is here.
    Plus, Michael shares exclusive research coming to RSA — including advances in AI-driven bots and zero trust frameworks. Whether you’re defending enterprise assets or building next-generation SOCs, this conversation is your gateway to the future of security data management.

    Timestamps: 00:00 – Introduction and episode overview
    02:24 – Michael's background and experience in data science and security
    04:52 – How infrastructure and SIEM technologies have evolved over the past decade
    08:15 – Limitations of current SIEM architectures and data retention challenges
    12:10 – Hydraulics' approach to scalable, cost-effective security data platforms
    15:24 – The importance of real-time analytics in security operations
    17:00 – AI and automation in breach detection and incident response
    19:34 – Scaling security telemetry across global networks and CDN signals
    22:10 – The object-oriented storage analogy in security data management
    25:05 – Crossing the chasm: from traditional SIEM to real-time data fabric
    28:13 – Future of AI in security automation and the next decade in security tech
    31:01 – Final insights and how to connect with Hydraulics

    Resources & Links:
    https://hydrolix.io
    AWS Object Storage
    Understanding Data Fabrics in Security (hypothetical link)

Fler podcasts i Teknologi

Om DrZeroTrust

Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPodcast #Cybersecurity #ZeroTrust
Podcast-webbplats

Lyssna på DrZeroTrust, Lex Fridman Podcast och många andra poddar från världens alla hörn med radio.se-appen

Hämta den kostnadsfria radio.se-appen

  • Bokmärk stationer och podcasts
  • Strömma via Wi-Fi eller Bluetooth
  • Stödjer Carplay & Android Auto
  • Många andra appfunktioner
Sociala nätverk
v8.8.5| © 2007-2026 radio.de GmbH
Generated: 3/31/2026 - 7:45:15 AM