Cybersecurity Awesomeness Podcast cover art

Cybersecurity Awesomeness Podcast

Cybersecurity Awesomeness Podcast

By: Enterprise Management Associates
Listen for free

Summary

The Cybersecurity Awesomeness Podcast from Enterprise Management Asscoaites (EMA) features cybersecurity experts Chris Steffen and Ken Buckler discussing critical cybersecurity issues. They cover everything from the challenges of certificate management and the cyber workforce talent shortage to deep. Available on all major platforms, this podcast offers credible, well-regarded insights into today's top security topics.Enterprise Management Associates Politics & Government
Episodes
  • Cybersecurity Awesomeness Podcast - Episode 157
    May 15 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler dissect Google’s recent discovery of the first clearly documented AI-assisted zero-day exploit. A threat actor utilized a Large Language Model (LLM) to develop a Python script designed to bypass two-factor authentication (2FA) on a widely used open-source system administration tool.

    The hosts highlight the "smoking guns" that betrayed the AI’s involvement: an uncharacteristic abundance of educational docstrings, specific Python formatting typical of LLM training data, and a telltale hallucinated CVSS score. While this signals a productivity boost for adversaries, Chris and Ken offer a witty yet grounded take: AI doesn’t instantly transform a novice into a "development wizard." The technology often mirrors the operator’s technical gaps, leading to documented code that is "ripe for the picking" by defenders. Ultimately, the duo emphasizes that while the toolkit has shifted, the solution remains anchored in fundamental cyber hygiene—rigorous patching, skeptical link-clicking, and a granular understanding of network dependencies.

    Show More Show Less
    15 mins
  • Cybersecurity Awesomeness Podcast - Episode 156
    May 8 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler tackle the controversial intersection of digital privacy and state legislation. The discussion centers on Utah’s recent mandate requiring adult content providers to verify ages even when users are behind a VPN. This creates a technical "catch-22," forcing providers to either implement invasive identity checks or block privacy-enhancing tools entirely—a move the hosts argue is both technically infeasible and a threat to legitimate encryption use cases.

    The conversation extends to California’s 2027 law, which aims to push age verification onto operating system providers. Chris and Ken break down the "whack-a-mole" reality of tracking rotating IP blocks and the inevitable collision with international privacy regulations. They warn that these laws, often drafted by "tech-illiterate" legislators, risk pushing states into a digital "stone age."

    Ultimately, the hosts call on security professionals to advocate for privacy and offer their technical expertise to policymakers to prevent the enactment of unenforceable, privacy-destroying mandates.

    Show More Show Less
    14 mins
  • Cybersecurity Awesomeness Podcast - Episode 155
    May 1 2026

    In this special "Star Wars Day" edition of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler bridge the gap between sci-fi fantasy and modern security awareness. Utilizing the legendary franchise as a backdrop, the hosts deconstruct the glaring cybersecurity failures of the Galactic Empire to provide actionable lessons for today’s information security professionals.

    The discussion highlights a total lack of port security and network authentication, famously exploited by R2-D2 to gain administrative control over complex systems through simple physical links.

    Chris and Ken move into data integrity and insider threats, citing the deletion of the planet Kamino from the Jedi archives as a failure that underscores the critical need for file integrity monitoring and immutable backups. Finally, the duo examines the success of social engineering and "tailgating" throughout the series, drawing parallels to real-world threats like dressing as maintenance staff or carrying large boxes to bypass physical security checkpoints. By analyzing these galactic blunders, the episode reminds listeners that foundational cyber hygiene remains the ultimate defense against the "Dark Side."

    Show More Show Less
    13 mins
adbl_web_anon_alc_button_suppression_c
No reviews yet