• Cybersecurity Awesomeness Podcast - Episode 157
    May 15 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler dissect Google’s recent discovery of the first clearly documented AI-assisted zero-day exploit. A threat actor utilized a Large Language Model (LLM) to develop a Python script designed to bypass two-factor authentication (2FA) on a widely used open-source system administration tool.

    The hosts highlight the "smoking guns" that betrayed the AI’s involvement: an uncharacteristic abundance of educational docstrings, specific Python formatting typical of LLM training data, and a telltale hallucinated CVSS score. While this signals a productivity boost for adversaries, Chris and Ken offer a witty yet grounded take: AI doesn’t instantly transform a novice into a "development wizard." The technology often mirrors the operator’s technical gaps, leading to documented code that is "ripe for the picking" by defenders. Ultimately, the duo emphasizes that while the toolkit has shifted, the solution remains anchored in fundamental cyber hygiene—rigorous patching, skeptical link-clicking, and a granular understanding of network dependencies.

    Show More Show Less
    15 mins
  • Cybersecurity Awesomeness Podcast - Episode 156
    May 8 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler tackle the controversial intersection of digital privacy and state legislation. The discussion centers on Utah’s recent mandate requiring adult content providers to verify ages even when users are behind a VPN. This creates a technical "catch-22," forcing providers to either implement invasive identity checks or block privacy-enhancing tools entirely—a move the hosts argue is both technically infeasible and a threat to legitimate encryption use cases.

    The conversation extends to California’s 2027 law, which aims to push age verification onto operating system providers. Chris and Ken break down the "whack-a-mole" reality of tracking rotating IP blocks and the inevitable collision with international privacy regulations. They warn that these laws, often drafted by "tech-illiterate" legislators, risk pushing states into a digital "stone age."

    Ultimately, the hosts call on security professionals to advocate for privacy and offer their technical expertise to policymakers to prevent the enactment of unenforceable, privacy-destroying mandates.

    Show More Show Less
    14 mins
  • Cybersecurity Awesomeness Podcast - Episode 155
    May 1 2026

    In this special "Star Wars Day" edition of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler bridge the gap between sci-fi fantasy and modern security awareness. Utilizing the legendary franchise as a backdrop, the hosts deconstruct the glaring cybersecurity failures of the Galactic Empire to provide actionable lessons for today’s information security professionals.

    The discussion highlights a total lack of port security and network authentication, famously exploited by R2-D2 to gain administrative control over complex systems through simple physical links.

    Chris and Ken move into data integrity and insider threats, citing the deletion of the planet Kamino from the Jedi archives as a failure that underscores the critical need for file integrity monitoring and immutable backups. Finally, the duo examines the success of social engineering and "tailgating" throughout the series, drawing parallels to real-world threats like dressing as maintenance staff or carrying large boxes to bypass physical security checkpoints. By analyzing these galactic blunders, the episode reminds listeners that foundational cyber hygiene remains the ultimate defense against the "Dark Side."

    Show More Show Less
    13 mins
  • Cybersecurity Awesomeness Podcast - Episode 154
    Apr 24 2026

    In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the radical evolution of exploit triage following the RSAC 2026 conference. They highlight Anthropic’s "Mythos," a sophisticated red-teaming AI capable of autonomously discovering and chaining vulnerabilities without human oversight. Unlike traditional hacking methods that rely on static kits, modern AI toolkits can scan massive IP ranges for every vulnerability in history—essentially automating the "needle in a haystack" search for attackers. This shift is particularly dangerous for legacy environments—essentially creating "Terminator" moments for infrastructure—where Windows XP embedded is still found in modern EV chargers.

    Citing Shodan statistics, the hosts reveal the alarming presence of public-facing legacy systems: approximately 5,000 instances of Windows Vista/Server 2008, 2,000 Windows Server 2003 systems, and 4 public Windows XP servers running IIS. Steffen and Buckler conclude that we have entered an "AI arms race" where automated adversaries outpace manual defenses, making continuous scanning and robust cyber hygiene vital for survival.

    Show More Show Less
    15 mins
  • Cybersecurity Awesomeness Podcast - Episode 153
    Apr 17 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler dive into the FCC’s 2026 ban on foreign-made routers and the growing national security risks lurking in consumer hardware. The hosts break down how Russian intelligence (GRU) is currently weaponizing unpatched home routers to execute DNS hijacking. By silently altering DNS settings, attackers can monitor your traffic or redirect you to spoofed websites to harvest banking and social media credentials.

    The discussion highlights that cybersecurity hygiene isn't just for "high-value targets." Even if you aren't guarding state secrets, opportunistic threat actors use these vulnerabilities for high-volume ransomware and blackmail schemes. To combat this, the hosts advocate for:

    -- Firmware vigilance: Updating router software and changing default passwords immediately.

    -- DNS Sovereignty: Manually configuring devices to use secure public providers like Cloudflare (1.1.1.1), Google (8.8.8.8), or Quad9 (9.9.9.9).

    Ultimately, this episode serves as a candid reminder: your "toy" hardware is a gateway, and it’s time to lock the door.

    Show More Show Less
    14 mins
  • Cybersecurity Awesomeness Podcast - Episode 152
    Apr 10 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore Google’s recent quantum computing milestone, which significantly accelerates the timeline for "Q-Day." Google’s research suggests that the physical qubit requirement to crack a Bitcoin signature could be slashed from millions to just 500,000, with scalable systems potentially arriving by 2029. While the hosts clarify that today’s blockchain remains secure for now, the announcement underscores an urgent need for organizations to adopt Post-Quantum Cryptography (PQC).

    The discussion highlights how traditional computing is hitting physical barriers, making quantum specialized power the next logical step for high-intensity tasks. Beyond security risks, Steffen and Buckler discuss the "Star Trek-esque" benefits of quantum, including near-instant DNA sequencing for personalized medicine and the potential for zero-latency deep-space communication via quantum entanglement. Ultimately, the episode serves as a crucial call to action: PQC is no longer a distant science project but a looming requirement. Security professionals must educate themselves and demand quantum-readiness strategies from their vendors to ensure long-term data protection.

    Show More Show Less
    12 mins
  • Cybersecurity Awesomeness Podcast - Episode 151
    Apr 3 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler offer a comprehensive recap of RSAC 2026, cutting through the noise of 40,000 attendees to deliver critical takeaways from the industry’s "Super Bowl." While AI dominated nearly 80% of vendor booths, the hosts differentiate between "marketecture" and meaningful innovation. They emphasize that deploying agentic AI without robust Data Security Posture Management (DSPM) is a recipe for unmanaged data sprawl and "Shadow AI" risks, where sensitive proprietary information is accidentally leaked into public models.

    A significant portion of the discussion focuses on the maturation of identity management, noting a shift toward granular guardrails for AI agents to prevent overprivileged access. The duo also debunks the myth of AI as a headcount replacement for SOC analysts, highlighting its lack of "tribal knowledge" and innovative problem-solving. Beyond the AI hype, the conversation touches on the urgency of Post-Quantum Cryptography (PQC) and the evolving role of the CISO—transitioning from a "head nerd" to a strategic risk manager under new regulatory mandates. Ultimately, the episode serves as a reminder that foundational data governance remains the true anchor in a high-velocity threat landscape.

    Show More Show Less
    16 mins
  • Cybersecurity Awesomeness Podcast - Episode 150
    Mar 20 2026

    In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for the 2026 RSAC in San Francisco. Dubbed the "Super Bowl" of security, the event expects over 45,000 attendees and 600 vendors at the Moscone Center. Chris, managing a schedule of nearly 40 meetings, joins Ken to navigate the overwhelming noise of the show floor.

    The duo identifies Agentic AI and autonomous solutions as the dominant—yet potentially distracting—themes of the year. They caution against the "silver bullet" mentality, urging leaders to focus on securing AI agents against hallucinations and IP leaks rather than viewing them as total replacements for human staff. Beyond the AI hype, they highlight the critical arrival of "Q-Day" and the necessity of Post-Quantum Cryptography (PQC) readiness. The hosts encourage listeners to visit the Innovation Sandbox and Early Stage Expo for emerging tech while maintaining a steadfast commitment to foundational cyber hygiene. Ultimately, they embrace the conference theme, "The Power of Community," emphasizing that face-to-face networking remains the industry’s most valuable asset.

    Show More Show Less
    15 mins