DiscoverRisky Business Features
Risky Business Features
Claim Ownership

Risky Business Features

Author: Risky Business Media

Subscribed: 1Played: 3
Share

Description

Join reformed CTO James Wilson as he dives deep on cybersecurity topics through an enterprise lens. From solo content and interviews with CISOs and researchers to vendor and startup deep dives, James does a bit of everything.
3 Episodes
Reverse
In this podcast James Wilson chats with Brad Arkin about North Korea’s sprawling fake IT worker ecosystem. From fake interviews, to stolen identities, basement laptop farms and IP-KVM tricks, the North Koreans are operating a whole employment fraud industry. Brad and James discuss how the scheme works in practice and the technical detection challenges defenders now face, like dealing with stolen or borrowed identities, bribed verification checks and multi-person operational chains. They also dig into why enterprises are largely on the back foot, and why there’s no single product you can buy to solve this. As the former CISO of Adobe, Cisco and Salesforce, Brad has some firsthand experience dealing with this stuff!
In this debut feature conversation in the Risky Business Features feed James Wilson sits down with Brad Arkin, the former CSO of Adobe, Cisco, and Salesforce, to talk all about AI pentesting. Finding and fixing bugs is great, but does it materially improve the overall security of a product? What’s the point of a pentest if the tester can’t walk you through their findings when it’s over? Is “bugs per dollar spend” really the measure of value in security testing? We hope you enjoy this podcast!
AI agents are being deployed with the same trust-by-default architecture the early internet had. Same mistakes, MUCH faster timeline. OpenClaw has hit 180K+ GitHub stars. But in the past week: 341 malicious skills on ClawHub were distributing Atomic Stealer ZeroPath disclosed a Browser Relay vuln enabling cross-tab cookie theft CrowdStrike, Cisco, and Bitdefender all published enterprise advisories VirusTotal partnered with ClawHub to scan uploads Korean tech firms (Kakao, Naver, Karrot) banned it on corporate networks 1,000+ Open PRs, 250+ less than 24 hours old. But how does this thing actually work? Join James Wilson as he explains why banning these types of agents doesn’t work, why browser sessions are now API surfaces, and why your organisation needs to think of these issues early or be condemned to decades of catch-up programs.
Comments