DiscoverDrZeroTrust
DrZeroTrust
Claim Ownership

DrZeroTrust

Author: Dr. Chase Cunningham

Subscribed: 33Played: 1,297
Share

Description

Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPodcast #Cybersecurity #ZeroTrust
233 Episodes
Reverse
Unlock the future of cybersecurity where AI agents no longer just assist—they act autonomously, making decisions that could impact your entire organization. In this eye-opening episode, Vidit Arora, founder and CEO of Quillr AI, reveals how rapidly AI-powered agents are transforming the digital landscape—and why traditional security systems are already obsolete.As AI agents gain full control over data movement, system modifications, and even decision-making processes, security professionals face unprecedented challenges. Vidit uncovers why existing frameworks like DLP and CASB fall short in this new era, and how the lack of contextual understanding enables agents to bypass legacy controls. You'll discover how the speed at which AI agents evolve makes zero-day threats look slow—and the urgent need for inline reasoning and adaptive defenses to keep pace.We break down critical topics such as:The shift from AI assisting to AI acting with autonomy and intentWhy current security paradigms can’t catch or control fully autonomous agentsHow understanding agent context, intent, and ecosystem visibility is now a security imperativeThe role of a new decision layer that inlines reasons over agent actions in real timePractical strategies for achieving comprehensive AI footprint discovery and controlFailing to adapt to this new AI-driven environment risks data breaches, operational chaos, and the loss of control over your digital assets. But by embracing a proactive, context-aware security approach, you open the door to innovation—without risking your organization’s future.Perfect for security leaders, CTOs, and AI strategists, this episode will challenge everything you thought you knew about cyber defense. If you're serious about safeguarding your organization amid AI's explosive growth, you'll want to hear this now.Visit quiller.ai to explore cutting-edge AI visibility tools and learn how to future-proof your security stance. Don’t let autonomous agents catch you off guard—stay ahead of the curve before the next disruptive move takes you by surprise.
Welcome to the AI-powered cyberpunk timeline.We’re ripping into CrowdStrike’s 2026 Threat Report and translating it from analyst-speak into what it actually means for anyone who has to defend real systems in the real world.Most threat reporting reads like a D&D campaign with spreadsheets: too many “groups,” too many names, and not enough “what do I do about it?” We’re doing the opposite. The headline is simple: AI is turning cybercrime into a high-speed manufacturing line—and your legacy defenses are out here trying to stop a Tesla with a traffic cone.In this episode, we break down how adversaries are using AI to:Scale social engineering into a nonstop persuasion engineSlip past signature-based controls like they’re not even thereRun cross-domain ransomware ops faster, cleaner, and more coordinated than most defenders can trackWe dig into the numbers (including the reported 89% spike in AI-enabled activity) and the bigger trend that matters even more: the shift toward interactive intrusions—human-led operations that blend into normal admin behavior, live off the land, and make your “alerts dashboard” look like a sad slot machine.You’ll also hear why the modern threat landscape is basically:Big Game Hunting crews targeting enterprises like it’s a sportSupply chain compromises that don’t need your permission to ruin your quarterAI-generated malware, personas, and pretexts built to beat humans, not just toolsAnd yes—we talk about the stuff everyone pretends isn’t the problem:Unmanaged edge devices (because “we’ll inventory later” is a strategy, apparently)VPN/firewall dependency, like it’s still 2012Cloud sprawl + identity chaos creating perfect lanes for lateral movement and quiet exfilThen we address the clown show: adversary naming chaos. CrowdStrike calls one thing X, another firm calls it Y, and by the time the briefing deck hits leadership, it’s basically: “We got hacked by… someone.” Russia, China, North Korea—aliases multiplying like gremlins after midnight. If we can’t speak clearly about who’s doing what, we can’t respond clearly either.This isn’t doom porn. It’s a call to action:Simplify how you understand threatsharden trust relationships and identity pathsdeploy proactive controls that assume the attacker is fast, adaptive, and increasingly automatedIf you’re in security ops, engineering, or executive strategy, this one’s your field manual for what’s next—because in the AI era, the defenders who “wait for confirmation” are the ones writing breach reports at 2AM.Rethink your model.AI is making attacks faster, smarter, and more aggressive. The only way to win is to understand the adversary’s blueprint—and build your defenses like you actually believe the internet is hostile (because it is).
Most organizations are drowning in data they can't process fast enough — leaving critical security gaps that adversaries exploit. Michael Cucchi, Chief Marketing Officer at Hydraulics, reveals how a groundbreaking new data architecture is transforming real-time security analytics, slashing processing costs by up to 40X while capturing every byte of telemetry across global networks.In this episode, you’ll discover why traditional Security Information and Event Management (SIEM) systems are no longer sufficient for today’s threat landscape. Michael breaks down the limitations of legacy data storage, ingestion bottlenecks, and costly rehydration issues that leave security teams blind during breaches. He shares how leading companies are adopting a new security data fabric designed for hyper-scalability, instant analysis, and unprecedented data retention — all at a fraction of the cost.We break down:The evolution and modern challenges of the SIM market, including why outdated architectures struggle with today’s data volumes.How security analytics are rapidly moving toward real-time, agentic automation driven by AI and large-scale data fabrics.The critical importance of low-latency querying, cost-effective storage, and flexible architectures that enable security teams to operate at machine speed.Why the next wave of security operations will depend on maintaining and rehydrating vast, granular data stores without breaking the bank.How innovative companies like Hydraulics are building the emerging data fabric that will underpin zero-trust, AI-driven security in the years ahead.This episode is essential listening for security professionals, CTOs, and data architects eager to stay ahead of the exponential growth in security signals, threats, and complexity. Miss out on these insights, and your organization risks falling behind—armed only with legacy systems that can’t keep up. A smarter, faster, cheaper future for security analytics is here.Plus, Michael shares exclusive research coming to RSA — including advances in AI-driven bots and zero trust frameworks. Whether you’re defending enterprise assets or building next-generation SOCs, this conversation is your gateway to the future of security data management.Timestamps: 00:00 – Introduction and episode overview02:24 – Michael's background and experience in data science and security04:52 – How infrastructure and SIEM technologies have evolved over the past decade08:15 – Limitations of current SIEM architectures and data retention challenges12:10 – Hydraulics' approach to scalable, cost-effective security data platforms15:24 – The importance of real-time analytics in security operations17:00 – AI and automation in breach detection and incident response19:34 – Scaling security telemetry across global networks and CDN signals22:10 – The object-oriented storage analogy in security data management25:05 – Crossing the chasm: from traditional SIEM to real-time data fabric28:13 – Future of AI in security automation and the next decade in security tech31:01 – Final insights and how to connect with HydraulicsResources & Links:https://hydrolix.ioAWS Object StorageUnderstanding Data Fabrics in Security (hypothetical link)
Most companies inadvertently sabotage their cybersecurity by ignoring the biggest digital threats lurking right in front of them. I want to pull back the curtain on shocking case studies—like alleged hackers tied to major cybercrime rings and even connections to billionaires—and show how these hidden threats could hit your organization next.In this eye-opening episode, you'll discover how a person linked to a major security company (name redacted) allegedly crafted zero-day exploits that were sold to governments, terrorists, and shadowy organizations. We break down the obscure world of cyber black markets, revealing how powerful hackers undermine national security while hiding behind a web of proxies and laundering schemes. I will provide surprising insights into the illegal trade in exploits, insider information on classified cyber projects, and the real risks of unsecured infrastructure, from Chinese data leaks to exposed AI gateways.We also explore the alarming implications of these cyber shadows—how they threaten your business, your privacy, and even global stability. Learn about the latest breaches, overlooked vulnerabilities in critical infrastructure, and what your company must do to avoid becoming the next headline. If you’re in cybersecurity, a tech leader, or just concerned about the dark side of digital innovation, this episode is your wake-up call.Brace yourself for stories you won’t believe—about hackers with ties to organized crime, clandestine government cyber ops, and billionaires involved in clandestine tech wars. Whether you're a security pro or a tech enthusiast, you’ll gain actionable intelligence to spot the risks before it’s too late.This episode isn’t just about the threats—it’s about the opportunities to stay ahead in a rapidly evolving digital battlefield. If you want to understand the underground world shaping the future of cybersecurity—and how to defend against it—don’t miss this deep dive into the shadows.
Cybersecurity in 2026 is more dangerous—and more invisible—than ever. Passwords are still the weakest link, with over 6 billion stolen in the past year alone, including common ones like 123456 and admin. Yet, despite decades of awareness, predictable passwords remain the primary entry point for hackers. Meanwhile, attacker tactics have evolved from noisy, overt breaches to stealthy, living-off-the-land operations—using legitimate tools like VPNs, DNS tunneling, and even marketing infrastructure like Kataro to hide in plain sight.Join me as I dive into the latest breach and compromise reports, revealing how adversaries made a strategic pivot to resilience and invisibility. You’ll discover how threat actors have shifted focus from traditional malware to infrastructure abuse, leveraging open-source projects, cloud services, and commercial-grade tools to stay under the radar. Learn about the top attack techniques, from privilege escalation to command-and-control protocols, and get insights on how defenders can adapt in an era where the perimeter no longer exists.This episode unpacks the disturbing reality: when breaches happen inside your network, the damage is already done. You’ll hear concrete analysis of data from Lumoo’s threat intelligence—highlighting the rise of anonymization tools like Tor and NordVPN used by hackers, and how education, financial services, and government sectors are prime targets. Plus, get expert tips on effective defenses like behavioral detection, password management, and monitoring legitimate-looking traffic.Perfect for cybersecurity pros, IT leaders, and anyone serious about staying ahead of the evolving threats—this episode is your urgent wake-up call. We’re entering an era where assumptions no longer hold, and understanding the latest tactics could be the difference between breach and defense. Don’t get left behind—hit play and upgrade your security mindset now.
My conversation with Kurtis Minder cuts through the fantasy land most people live in when they talk about ransomware.This isn’t about movie-style hackers or “just restore from backup” nonsense. It’s about the industrialized ransomware economy—where threat actors operate with rules, quotas, minimum payouts, and negotiation playbooks that look a lot more like organized business than random crime.We get into the ugly realities organizations face when ransomware hits:How ransom negotiations actually work todayWhy cyber insurance often shapes decisions more than security teams doAnd the uncomfortable ethical tradeoffs executives are forced to make under real pressureWe also call out one of the biggest contributors to successful ransomware attacks: complacency. Most organizations have incident response plans that look great in PowerPoint and fall apart the second reality shows up. If you’re not rehearsing, testing, and updating those plans, they’re effectively worthless.Finally, we talk about what actually moves the needle. Not buzzwords. Not vendor bingo. Real strategy:Zero Trust done correctlyLeast privilege enforced, not “eventually planned”Microsegmentation that limits blast radius instead of praying backups workRansomware isn’t going away. The only question is whether your organization is architected to absorb impact and survive, or whether you’re funding the next criminal enterprise.Key TakeawaysRansomware is a structured business model, not chaos—negotiations follow rules and economics.Complacency kills response efforts; untested incident plans fail every time.Zero Trust, least privilege, and microsegmentation materially reduce ransomware blast radius when implemented correctly.
In this conversation, I break down the state of cybersecurity heading into 2025—and it’s not pretty. Ransomware isn’t “ramping up,” it’s eating the market alive, while too many organizations are still betting their future on outdated controls, checkbox compliance, and the fantasy that perimeter security is a strategy. I call out the continued failure of traditional security models, the uncomfortable reality of high-profile vendor missteps, and the industry’s habit of confusing tool sprawl with actual risk reduction.My bottom line is simple: Zero Trust isn’t a buzzword; it’s the only approach that aligns with how modern environments actually operate—cloud-first, identity-driven, and constantly under attack. If you want real improvement, start treating identity like the control plane, tighten your cloud and endpoint fundamentals, get serious visibility into what’s connecting and what’s executing, and stop pretending “prevention” alone is a plan. Initial access is going to happen—so engineer for containment and resiliency. I wrap up with practical steps you can apply immediately to harden posture and quit treating cyber defense like a yearly renewal rather than a continuous operational discipline.TakeawaysRansomware incidents surged in 2025, impacting critical infrastructure.Traditional defenses are failing to contain ransomware attacks.Using a password manager is essential for security.Cybercrime costs are projected to reach $10 trillion by 2025.Misconfigurations in cloud services are a major risk factor.Identity management is a solvable problem that needs attention.Vendors in cybersecurity are not immune to breaches.Organizations should partner with service providers for cybersecurity.Research and data should guide cybersecurity strategies.A proactive approach is necessary to mitigate cyber threats.
In this episode, we take a hard look at how AI is being integrated into cybersecurity—and where the narrative often diverges from reality. The discussion spans offensive and defensive use cases, the structural challenges facing SMBs, and why open-source cyber threat intelligence (CTI) remains a critical foundation despite aggressive vendor marketing.We also explore the economic pressures shaping today’s security market, including broken pricing models, unrealistic expectations placed on small teams, and the growing gap between compliance optics and real risk reduction. The episode concludes with a forward-looking discussion on applied machine learning, mathematical modeling, and how these approaches can meaningfully support incident responders in the field.Practical applications of AI in cybersecurity operationsOffensive vs. defensive AI tradeoffsThe SMB security gap and market failureOpen-source CTI as a force multiplierPricing models and market distortionApplied ML and mathematics for real-world incident responseProduct direction and long-term vision00:00 — Introduction and company overview38:10 — Pricing models, market dynamics, and systemic issues39:26 — Future plans, roadmap, and strategic vision52:00 — AI in offensive and defensive cybersecurity operations58:54 — Open-source CTI and applied AI capabilitiesKey Topics CoveredChapters
In this conversation, I discuss the latest findings from the Identity Theft Resources Center's Business Impact Report. He highlights alarming cybersecurity trends, particularly the rise of AI-powered attacks and their financial implications for small businesses. The discussion covers the disconnect between perceived security preparedness and actual security measures, as well as best practices for improving cybersecurity resilience.TakeawaysCyber attacks are a near-universal threat, especially for small businesses.The financial cost of cybercrime is being passed directly to consumers, creating a hidden 'cybertax'.Business leaders' confidence in their cybersecurity preparedness has significantly declined.There is a dangerous disconnect between the perception of risk and the adoption of basic security controls.Small business leaders have mixed opinions on the role of AI in cybersecurity.AI-powered attacks are a significant threat, accounting for over 40% of incidents.Cyber insurance is becoming less reliable, forcing businesses to find alternative recovery methods.Loss of customer trust and employee turnover are significant consequences of cyber attacks.Training alone is not sufficient to prevent cybersecurity breaches.Mastering foundational cybersecurity practices is essential for resilience.
Hard truth: if you’re shipping AI and haven’t rethought identity, you’re not “innovating” — you’re just building a faster, prettier fraud engine.In this conversation with Heather Dahl, we dig into what identity in the age of AI really means — and why mutual authentication is now the minimum entry fee for doing business online.A few blunt takeaways:AI changes the economics of scams — this isn’t “50 cents here, a dollar there” anymore, it’s industrialized fraud at AI speed.A slick AI experience on top of a weak identity is just a scam delivery platform.If you burn a customer with a security failure, you don’t get a second chance. They move on.Every dollar you put into AI without strong identity and mutual authentication is risk capital for the attacker, not innovation spend.If your systems can’t prove who they are to the customer, and your customers can’t prove who they are to you, your “AI strategy” is really just an attack surface with good branding.🔗 Watch the full episode + bring this to your next board or exec conversation about “AI investments” and “digital experience.” If identity and mutual auth aren’t on the slide — the strategy is incomplete.#ZeroTrust #AI #Identity #MutualAuthentication #CyberSecurity #DigitalTrust #FraudPrevention #CustomerExperience #VerifiableCredentials #ScamsAtScale
In this conversation, I discuss the evolving landscape of cybersecurity, particularly the impact of #ai on #cyberattacks. I highlight a recent AI-driven #cybersecurity campaign, its implications for businesses, and the importance of robust cybersecurity measures. The discussion also covers vendor security in the financial sector, lessons learned from a ransomware attack in Nevada, government cybersecurity strategies, and the recent Cloudflare outage. The conversation concludes with insights into new threat intelligence tools and the need for continuous vigilance in cybersecurity practices.TakeawaysAI models have become genuinely helpful for cybersecurity operations.The first documented case of a large-scale cyber attack executed with minimal human intervention has emerged.Businesses must take cybersecurity seriously as threats become more commoditized.Phishing training alone is insufficient as a cybersecurity control.Lateral movement and privilege escalation are critical cybersecurity vulnerabilities.Government strategies need to focus on shaping adversary behavior and public-private partnerships.The recent Cloudflare outage highlights systemic issues in internet infrastructure.New threat intelligence tools are emerging to help organizations stay secure.Cybersecurity is a shared responsibility that requires vigilance from all stakeholders.The landscape of cyber threats is evolving rapidly, necessitating continuous adaptation.
I sat down with Karim Toubba, CEO of LastPass, to discuss the challenges and triumphs of navigating cybersecurity in today's digital landscape, especially the issues we face when we have been breached. This is a masterclass in how to handle #cybersecurity crisis!In this episode, Karim shares insights into LastPass's response to significant security breaches, the importance of authentic #leadership, and the evolving role of password management in a networkless world. Tune in for a candid conversation about resilience, change, and the future of cybersecurity.Takeaways: Leadership in Crisis: Karim Toubba emphasizes the importance of authentic leadership and taking responsibility, even when new to a role, as a key factor in navigating crises effectively.Security as a Priority: LastPass has made significant investments in security infrastructure and culture, highlighting the necessity of a sustained commitment to cybersecurity at all organizational levels.Cultural Shift: The implementation of security measures like Yubikeys and the focus on changing employee mindsets underscore the need for a cultural shift in cybersecurity practices.Challenges of Attribution: The difficulty in attributing cyberattacks to specific actors is discussed, with an acknowledgment of the sophisticated nature of the threats faced.Evolving Cyber Landscape: The conversation touches on the evolving nature of cybersecurity threats and the need for continuous adaptation and investment to stay ahead.Product Innovation: LastPass's expansion beyond password management to include products like SAS Monitor and SAS Protect demonstrates their commitment to addressing broader security challenges.User-Centric Security: The importance of making security measures user-friendly and front-and-center is highlighted as a critical factor in improving overall cybersecurity.
🚨 Identity is one of the many links in the #cybersecurity kill chain. If you think your perimeter is going to save you, you’re already compromised.In this episode, I sit down with Tim Prendergast to rip apart the myths of identity management in 2025. We’re talking:🔹 Why re-engineering identity security isn’t optional—it’s survival.🔹 How Zero Trust changes the way we think about foundational #security .🔹 The balancing act: usability vs. airtight controls.🔹 Why privileged access is the real battleground in every org today.The hard truth? Every business on the planet is facing the same identity chaos. Zero Trust isn’t some buzzword—it’s the operating system for the modern enterprise.👊 No sales pitches. No hand-waving. Let's get real about how to build security that actually works.
In this episode, I sit down with Ofer Klein to dig into the messy truth about #ai governance, “shadow AI,” and why most CISOs are already behind the curve. We’re talking about the reality that AI isn’t just a shiny new tool — it’s a #cybersecurity #threat vector, a compliance nightmare, and the next accelerant for both attackers and defenders.If your organization thinks it can “wait and see,” you’ve already lost. Visibility, governance, and proactive strategy aren’t optional anymore — they’re survival.Tune in and find out why AI will either accelerate your business or dismantle it — and why your security leadership better decide which side of that equation they’re on.
In this episode of The Dr. ZeroTrust Show, I sit down with Geoff Halstead, co-founder and Chief Product Officer of Faction Networks, to delve into the realities of Zero Trust Networking.We break down:Why legacy and #iot devices remain a massive #risk surfaceHow hardware plays a decisive role in #cybersecurity strategy.The investment challenges are holding back true innovation.Why accountability and continuous monitoring are non-negotiable for building a secure digital future.If you’re serious about securing infrastructure against modern threats, this is a conversation you don’t want to miss.
In this episode, Mike Elkins maps a whole‑of‑business blueprint for digital safety that actually reduces risk you can measure. We break down what “holistic” really means in practice: identity as the control plane, data‑centric design, continuous verification, least privilege, segmentation that shrinks blast radius, and automation that removes human bottlenecks. From cloud and SaaS to OT/IoT and third‑party risk, Chase shows how to connect policy, architecture, and operations so security becomes a repeatable system—not a pile of tools.TakeawaysWhy piecemeal controls create “debt‑in‑depth”How to center Zero Trust on identities, not networksPragmatic micro‑segmentation and just‑in‑time accessA simple metric stack for the board (exposure, blast radius, dwell time)How to align GRC with day‑to‑day enforcementNo FUD. No silver bullets. Just the playbook to make “holistic” real.
In this hard-hitting episode of The DrZeroTrust Show, we peel back the layers of FEMA’s #vulnerabilities—not in hurricanes or wildfires, but in its #digital backbone and #leadership. From fragile #cybersecurity defenses to internal dysfunction, these issues strike at the core of FEMA’s ability to deliver when America needs it most. I’ll break down how systemic missteps and weak strategies threaten resilience, and what must change if our nation is to withstand the crises of tomorrow.This isn’t just about disaster relief—it’s about national security, accountability, and the future of government response in the cyber age. Tune in to get the unfiltered truth.
Cyber meets Congress—no spin, no buzzwords. In this episode of The Dr. ZeroTrust Show, we break down what it's like to work with the folks on Capitol Hill from a Tech CEO's perspective. In this episode, you will hear about how leaders should approach collaborating with lawmakers, and perhaps even learn a thing or two about what it means to lead from the front as a CEO.If this helped, like, subscribe, and drop your questions in the comments—what should we tackle next?#cybersecurity #capitolhill #congress #zerotrust #policy #nationalsecurity #cisa #NIST #CIRCIA #SBOM #AIpolicy #electionsecurity #criticalinfrastructure
Cybersecurity conferences: equal parts chaos, collaboration, and caffeine. ☕💻 Behind the buzzwords and vendor swag, real innovation happens. We’ll break down how these gatherings shape the industry, spark partnerships, and prep us for the next wave of #threats. Tune in for no-BS insights on making the most of these events.
We pull no punches on the escalating #cyberwarfare threat from state-sponsored actors, with China leading the charge. From alarming penetration test results to underfunded state laws like Ohio’s latest effort, this episode dissects why America’s response is dangerously inadequate. This isn’t just another #cybersecurity scare—it’s a call for a complete strategic overhaul to safeguard national #security before it’s too late.TakeawaysChina is currently leading in cyber warfare against the U.S.The threat landscape is rapidly evolving, with increasing vulnerabilities.Broken access control remains the most common vulnerability in systems.Cybersecurity spending is slowing down, which is concerning for national security.Ohio's new cybersecurity law lacks funding and practical enforcement measures.Leadership in cybersecurity is crucial for effective defense strategies.Many organizations are still using outdated technology and practices.The need for comprehensive training and resources in cybersecurity is critical.Legislative measures must be backed by funding to be effective.The conversation highlights the urgency for a new approach to cybersecurity.
loading
Comments (1)

4 Hands

Where can I find the links you talked about? Thanks

Aug 1st
Reply
loading