Best Podcast Episodes About Gambit Security

Best Podcast Episodes About Gambit Security

Everything podcasters are saying about Gambit Security — curated from top podcasts

Updated: Apr 02, 2026 – 54 episodes
Listen to the Playlist

Ridealong has curated the best and most interesting podcasts and clips about Gambit Security.

Top Podcast Clips About Gambit Security

Meet the Press
“… enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing …” “… is being done to prosecute those rivals. Incoming acting attorney general Todd Blanche who served as President Trump personal attorney during his New York hush money trial praised Bondi on social media posting quote We will continue backing the blue enforcing the law and doing everything in our power to keep America safe Bondi is the second Trump cabinet member fired in recent weeks. Homeland Security Secretary Kristi Noem was ousted four weeks ago today. And with me now to start us off, NBC News White House correspondent Monica Alba, NBC News Chief Justice and National Affairs correspondent Kelly O'Donnell, and NBC News Capitol Hill correspondent Melanie Zanona. Thanks to all of you for being here. Monica, let me start with you at the White House. I know you've been working your sources there. So what are they telling you about the timing of this? Why did President Trump want to fire Attorney General Bondi right now? Well, Kristen, once the president makes up his mind that he wants to replace somebody in his cabinet or in his inner circle, there is a very little bit of lag time that actually takes place between that decision and the actual announcement of it. Now, sometimes people …” View more
Ridealong summary
Pam Bondi's dismissal reflects President Trump's growing frustration with her handling of high-profile cases and his impatience with the Justice Department's progress.
Meet the Press · Meet the Press NOW — April 2 · Apr 02, 2026
TBPN
Ridealong summary
Google has revealed a significant breakthrough in quantum computing that could potentially break Bitcoin's encryption by 2029. This revelation has sparked concerns among crypto developers, as they scramble to find solutions before quantum technology advances further. With major implications for cryptocurrency security, the race to quantum-proof Bitcoin is more urgent than ever.
TBPN · AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu · Mar 31, 2026
Proven Podcast
“… it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work” “… expect 300 guys to stop the entire army that's coming at you. You got to get them in sources. You got to get them held. Now, I want to talk about the introduction of AI. Now, AI, we already know, doesn't mean artificial intelligence. We already know it means always incorrect we're still using it and we're still uploading vast amounts of information into it which is an absolute nightmare from a security person uh it just it's a nightmare what do you tell the organizations you're working with they're like hey yeah i know you want to work” View more
Ridealong summary
Paying ransom for your data might not guarantee recovery, and you could lose a year's worth of information if you're unprepared. MK Palmore, a cybersecurity expert, emphasizes the importance of conducting risk assessments and having immutable backups to protect against ransomware attacks. Ignoring these steps can leave your organization vulnerable to devastating data loss.
Proven Podcast · FBI Cyber Expert Saves Your Business - M.K. Palmore · Apr 01, 2026
Connections Podcast
Ridealong summary
AI has already led to the loss of 90,000 jobs in the past year, and experts warn this is just the beginning. Holly Elmore from PauseAI argues that we must create international treaties to prevent further job loss and even potential human extinction, rejecting the idea that we should simply adapt to AI's rise. The urgency of addressing these issues is clear, as the technology poses unforeseen dangers to society.
Connections Podcast · The movement to head off an AI catastrophe · Mar 30, 2026
Morning Brew Daily
“… is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown …” “… Iran is earning about $139 million a day from oil sales in March, up from $115 million into February. So that's around 30% more revenue. It seems like the only person benefiting, at least economically, in terms of selling their oil on the global markets is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown last year. Those roles won't be easy to replace. It takes four to six months to complete training. Plus, it's not like people are applying in droves for a job that increasingly gets caught up in political skirmishes leading to lost paychecks. Adam Stahl, TSA's chief of staff, said last week that the situation will get worse before it gets better, …” View more
Ridealong summary
The TSA is facing a staffing crisis, leading to record-long security lines at airports. Despite Trump’s order to restore pay for TSA workers, many have quit, resulting in a 40% call-out rate at some airports. With lengthy training processes and a lack of job security, the situation is expected to worsen before it improves.
Morning Brew Daily · Investors Lose Patience with Iran War & TSA Workers Finally Get Paid · Mar 30, 2026
The Watch Floor with Sarah Adams
“… that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to …” “… the parade route multiple times to obviously review traffic, see where there could be, you know, ingress and egress, look where police officers were kind of congregating and setting up their posts. You know, very important to carry an attack like that. So here in the U.S., think if you're in some big airport, like one of the major hubs, let's be JFK or LAX, and you see someone photographing security, that's weird. I mean, I know now all the press is doing it because we have three hour waits at TSA. So it is a little different now and it's going to be a little more complicated, but it is strange for anyone to be videoing or filming or taping anything in TSA, right? The majority of us get in and we want to get out as soon as possible. We aren't going to take a picture to remember our time at the security checkout line. Now we're going to move on to the concept that terrorists, of course, practice ports of the attack before it occurs, right? This is famously called dry run. So they might approach entry points. They might time the peak moments of a crowd, like at a concert or a sporting event. They might check reactions to different security issues going on. Like, let's say if there's a …” View more
Ridealong summary
Terrorists are increasingly using encrypted communication apps like Signal and WhatsApp, as well as gaming platforms, to coordinate their activities away from prying eyes. This segment highlights how these methods complicate monitoring efforts and discusses the warning signs of radicalization, such as a sudden disappearance from social media or work. Recognizing these changes in behavior could be crucial in preventing potential attacks.
The Watch Floor with Sarah Adams · The Government Isn’t Telling You This · Mar 31, 2026
The Watch Floor with Sarah Adams
Ridealong summary
Dating apps are being exploited in dangerous ways, as highlighted by a troubling scenario in Ukraine where Russian adversaries created fake profiles to target foreign volunteers. This alarming tactic underscores the risks associated with sharing personal information online, especially in conflict zones. A similar incident with the fitness app Strava revealed how user data could inadvertently compromise military locations, illustrating the need for caution in our digital interactions.
The Watch Floor with Sarah Adams · Your Phone Isn’t Safe Right Now · Mar 20, 2026
Security Now (Audio)
“… to these guys to keep them from getting the opportunity. Is that right? I think so. And one of the other issues, I think, for anybody who's doing IT security is, you know, the famous expression is it's not possible to prove a negative. It's how do you get credit for your organization not being attacked? How do you demonstrate that it's because you have the budget that you have for IT and the equipment that you have and the staff that you have? You know, certainly there's profit pressure in any enterprise. And so when the guys who are controlling the purse strings look around for where they can cut, …” “… it worth to you for us not to tell the world or to leak the personal and business data that we have stolen from you? Right. So they have the means. They have the motive. The motive is extortion and payment. Yeah. The opportunity, it's really up to these guys to keep them from getting the opportunity. Is that right? I think so. And one of the other issues, I think, for anybody who's doing IT security is, you know, the famous expression is it's not possible to prove a negative. It's how do you get credit for your organization not being attacked? How do you demonstrate that it's because you have the budget that you have for IT and the equipment that you have and the staff that you have? You know, certainly there's profit pressure in any enterprise. And so when the guys who are controlling the purse strings look around for where they can cut, They're like, well, we haven't had any problems with our IT. Everything's going great. So let's cut there. And it's like, wait a minute. The reason everything is going great and you haven had any attacks is that we been able to keep the defenses up We been able to purchase expensive network gear that even though the old stuff was still working, it …” View more
Ridealong summary
Organizations are finally realizing that neglecting cybersecurity can lead to devastating breaches and public shame. With a surge in data extortion tactics, IT departments must demonstrate the importance of sustained funding to keep defenses strong. If businesses want to avoid being on the infamous breach list, they need to take IT security seriously now more than ever.
Security Now (Audio) · SN 1068: The Call is Coming from Inside the House - Live From Zero Trust World 2026 · Mar 05, 2026
Bulwark Takes
“… matches. And now his accountant has been hacked by the Iranians. It's just like L after L after L for cash, in addition to the actual potential security concerns about him being compromised by our foe. So that's my general take on this. And we don't know what the hell's in this cash.” “… the embarrassing videos of him like doing shotgunning beers in the hockey team locker room. the embarrassing story that Will Sommer wrote about, about using the plane that we all pay for to fly around his girlfriend. She can sing at semi-pro wrestling matches. And now his accountant has been hacked by the Iranians. It's just like L after L after L for cash, in addition to the actual potential security concerns about him being compromised by our foe. So that's my general take on this. And we don't know what the hell's in this cash.” View more
Ridealong summary
The breach of FBI Director Kash Patel's emails by Iran-linked hackers is a significant failure, highlighting vulnerabilities in national security and the ineffectiveness of current leadership.
Bulwark Takes · Iran Hacks Kash Patel's Emails · Mar 28, 2026
The Shawn Ryan Show
Ridealong summary
Schools are increasingly investing in advanced security measures like CCTV cameras and ballistic chalkboards, driven by available subsidies. Brett Adcock discusses how the technology sector could have already beta-tested these systems in schools if not for a pivot in their strategy aimed at reducing costs. The urgency for effective school security solutions is clear as both public and private institutions seek affordable options to ensure student safety.
The Shawn Ryan Show · #292 Brett Adcock - Shawn Ryan Meets a Humanoid Robot · Mar 30, 2026
Security Now (Audio)
“… 31 so not 27 no 31 which is another wait for it CVSS 10 critical vulnerability in Cisco systems. As I said at the top of the show, what would the Security Now podcast be without a brand new shiny Cisco CVSS critical 10.0. The NIST NVD, the National Vulnerability Database, says of the new one, 31, they write, a vulnerability in the web-based management interface, who would have guessed, of Cisco secure firewall management center, apparently not that secure software, could allow an unauthenticated remote attacker to execute arbitrary Java code as root on an affected device. In other words, there …” “… very bad 10.0 CVE 2026-20127, which was that widely exploited authentication zero day discovered while being exploited in Cisco's Catalyst SD-WAN enterprise product line. really anyone could be forgiven for confusing that one with cisco's cve 2026 201 31 so not 27 no 31 which is another wait for it CVSS 10 critical vulnerability in Cisco systems. As I said at the top of the show, what would the Security Now podcast be without a brand new shiny Cisco CVSS critical 10.0. The NIST NVD, the National Vulnerability Database, says of the new one, 31, they write, a vulnerability in the web-based management interface, who would have guessed, of Cisco secure firewall management center, apparently not that secure software, could allow an unauthenticated remote attacker to execute arbitrary Java code as root on an affected device. In other words, there you go, Cisco 10.0. They wrote, this vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted, serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the …” View more
Ridealong summary
A newly discovered critical vulnerability in Cisco's secure firewall management center could allow attackers to execute arbitrary Java code as root, putting countless enterprises at risk. This flaw, CVE-2026-20131, was disclosed on March 4, 2026, and is already being exploited in ransomware campaigns. The ongoing issues with Cisco's authentication systems highlight the urgent need for better security measures in enterprise environments.
Security Now (Audio) · SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels · Mar 24, 2026
Behind the Bastards
“Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas …” “Now, one thing that the world of private maritime security shows us is that neoliberal globalism is willing to look the other way a great deal and allow a great deal of violence on behalf of corporations, not on behalf of the state. When people are getting engaged by these vessels, it is to protect property. Granted, sometimes it is also to protect life. These pirates have killed people and kidnapped people and such But the state has been willing to cede its monopoly on violence at the high seas because it couldn find a good solution to this and it been willing to overlook a lot of loss of life and i just don see a way that this doesn't lead to more loss of life and that is probably what we have to look forward to it may have already begun happening in the strait of homoose between when we record this and when you hear it but it is deeply …” View more
Ridealong summary
The Maersk Alabama incident rattled the shipping industry and highlighted modern piracy's shift from theft to hostage-taking. In 2009, Somali pirates captured the U.S.-flagged ship, leading to a dramatic standoff with U.S. Navy SEALs that ended with the pirates being shot to rescue the captain. This event not only sparked fear in maritime security but also raised complex jurisdictional issues surrounding piracy.
Behind the Bastards · It Could Happen Here Weekly 224 · Mar 21, 2026
The Adam Mockler Show
Ridealong summary
The breach of FBI Director Kash Patel's emails underscores a critical failure in cybersecurity and highlights the incompetence within the FBI's leadership, particularly in handling Iran-related counterintelligence.
The Adam Mockler Show · Trump makes EVERYONE GASP by ADMITTING THIS · Mar 19, 2026
The Bobby Bones Show
Ridealong summary
In this hilarious segment, a dinner check sparks a debate about restaurant behavior, leading to a wild story of credit card hacking at a place called Poppy Garden. The punchline hits when the host discovers that even after getting hacked, he can still use Apple Pay with his new card number before it arrives!
The Bobby Bones Show · Best 7 Segments From The Bobby Bones Show This Week · Mar 21, 2026
Embracing Digital Transformation
“… in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous …” “… logs okay try it now click oh and that's when it's like ah we didn't give you the new root CA here and they you know They send us the PKS file or what, I can't remember at this point. But they send us the group of certificates and we get those loaded in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous risk assessments, and that's the number one thing that the NCUA is always looking for us in our regulation is the credit union performing reasonable information security risk assessments of all vendors and everything that we do. So when I first got here, we put into play just adhering to the NIST standards, the 800-DASH document on guide to risk …” View more
Ridealong summary
A week-long vendor issue was resolved when a missing encryption certificate was finally identified. This incident highlights the importance of rigorous risk assessments and adherence to NIST standards for managing security across multiple vendors. By implementing these practices, organizations can effectively mitigate risks and ensure compliance with regulatory requirements.
Embracing Digital Transformation · #337 Mastering Vendor Security in Financial Services: A 12-Year Journey · Mar 25, 2026
Mark Levin Podcast
“… And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is …” “… to. They're not allowed to. Go ahead. Americans in the streets, and then have Americans wait millions of hours in lines at the airports, and that we won't forget the chaos. And I can't speak for the rest of the country. I can speak for Californians. And from Modesto to Monterey, from Folsom to Fresno, they are saying hell no to the way that this White House is running the Department of Homeland Security. They don't want another penny for ICE or Border Patrol. Ah, I see. Not another penny. And yet when you look at the people of Chicago, more and more of them are turning out and condemning what illegal aliens are doing to their communities. The amount of money, the amount of money that is diverted from communities that need it, with American citizens, often who are black or who are Hispanic or whatever they are, The amount of money, which is scarce to begin with, for schooling and health care and security and all the rest of it. The amount that is drained out of American communities from American citizens and given to illegal aliens. It is a crime, in my view. It's a sin. It's a disgrace.” View more
Ridealong summary
Local police in California are restricted from sharing information with ICE, leading to chaos in communities as residents express frustration over the federal government's handling of immigration. Many citizens feel that resources are being drained from their neighborhoods to support illegal immigrants, affecting schools, healthcare, and security. This clash between local law enforcement and federal immigration policy is creating a growing divide among Californians.
Mark Levin Podcast · 3/27/26 - Memeable Christianity: When Faith Meets Gen Z Culture and Podcasters · Mar 28, 2026
TBPN
“… their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts …” “… this person just spent $5 million on our API and it's all cyber attack related prompts. Like, let's maybe turn them off or figure out what's going on over there. They have a huge incentive to sort of, you know, control their customer base so that their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts about the upcoming capabilities of Antropic and other platforms. I think the answer to that is our continuous investment in innovation in the space. It's not just about Weez that I mentioned or Sierra. Those are large established startups. But we did have one company going out of stealth last week, Onyx Security. All they do is agent security. We had …” View more
Ridealong summary
Threat actors are outpacing defenders in the race to leverage AI for cyber attacks, creating a significant risk. While cybersecurity companies are innovating to combat this threat, the gap in adoption speeds leaves defenders at a disadvantage. However, the emergence of new security-focused startups may shift the balance in the coming years.
TBPN · AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest · Mar 17, 2026
The MeidasTouch Podcast
“… passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and …” “… want to make sure that they have more money to torture and maim and kill and terrorize people here in the United States and expand the concentration camp system that is being built here in the United States. And so ultimately, when this was passed from the Senate to the House, the House said, uh-uh, we are not just going to fund the TSA. We want to make sure the Department of Homeland Security, ICE, and Border Patrol get extra funding so they can do the torture. That's what we want. So we're not going to support you MAGA Republicans in the Senate. So come back, Senators, because we in the House, we're going to do what's called a continuing resolution regarding the previous status quo funding in order to make sure all of DHS is funded. Now, the Democrats have objected to that in the Senate and have threatened the filibuster, and Republicans don't have enough votes to obtain cloture. And so Republicans made a deal with the Democrats not to fund ICE and Border Patrol, but the MAGA Republicans in the House were like, screw that. We can't support that. So we're not just going to fund TSA alone. We want to make sure that ICE can wear masks and have no search warrants and terrorize …” View more
Ridealong summary
MAGA Republicans are in a frenzy after Senate Republicans voted against their demands for additional funding for ICE and Border Patrol, opting instead to fund only the TSA. This unexpected move has led to infighting among GOP members, with MAGA Mike Johnson desperately calling for a continuing resolution to fund everything. Meanwhile, Senate Republicans have left for recess, leaving the House Republicans feeling abandoned and frustrated.
The MeidasTouch Podcast · MAGA Mike Panics as GOP Senate Votes Against him...at 2 AM · Mar 28, 2026
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
“… take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” “… exposed to it with the goal of hopefully being able to drop whatever commitments i have forego all income contribute however i can contribute to be useful and then beyond that i think basically spend and or give it all away is kind of my mindset. Like, take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” View more
Ridealong summary
Imagine being financially secure enough to drop all commitments and focus on what truly matters. Zvi Mowshowitz shares his vision of achieving a baseline financial security that allows him to spend time with family, support charities, and contribute to society without the burden of commercial obligations. This mindset not only fosters personal freedom but also empowers a more meaningful life amidst the uncertainties of AI-driven job loss.
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis · Zvi's Mic Works! Recursive Self-Improvement, Live Player Analysis, Anthropic vs DoW + More! · Mar 19, 2026
Defense in Depth
“… ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we …” “And that is the root cause of a problem. Very well said, Steve. All right, this comes to the portion of the show. Matt, I'm going to be throwing this to you first, where I ask you which quote of these was your favorite and why. And there's a lot of good ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we do this? What do you folks think? How should we? They just did it and was like, you have to fix this. Nothing got fixed ever. And that's why security tools amongst developers get such a bad rep because they're not involved at all. Like anytime I work with a customer and we do a proof of concept and there's not a developer on the call, I say, …” View more
Ridealong summary
Ignoring developers in security decisions leads to ineffective tools and unresolved issues. A quote from James at DevelopSec highlights this problem, emphasizing that security measures are often implemented without consulting the very people who need to fix them. Involving developers in the conversation is crucial for a successful application security program.
Defense in Depth · Who is Responsible for the Conflict Between Security and Developers? · Mar 19, 2026

Top Podcasts About Gambit Security

The Watch Floor with Sarah Adams
The Watch Floor with Sarah Adams
4 episodes
Bannon`s War Room
Bannon`s War Room
4 episodes
Security Now (Audio)
Security Now (Audio)
3 episodes
Bulwark Takes
Bulwark Takes
3 episodes
Meet the Press
Meet the Press
2 episodes
TBPN
TBPN
2 episodes
The Adam Mockler Show
The Adam Mockler Show
2 episodes
The MeidasTouch Podcast
The MeidasTouch Podcast
2 episodes

Stories Mentioning Gambit Security

Top Podcasts on Pam Bondi's Dismissal
Attorney General Pam Bondi has been fired as part of a series of staff changes within the Trump administration. This turnover highlights ongoing shifts in the administration's personnel, which could impact its policy direction and stability.
Pam Bondi
Apr 03, 2026 · 22 clips · 9 podcasts
Top Podcasts on US Government Shutdown
The United States is experiencing its longest government shutdown in history as a deal to fund the Department of Homeland Security collapses. The impasse affects various government operations and has significant implications for federal employees and services. The ongoing shutdown highlights political divisions and impacts the tech industry, particularly in areas reliant on government contracts.
Mar 31, 2026 · 11 clips · 7 podcasts
Top Podcasts on Iran-Linked FBI Email Breach
Hackers associated with Iran have reportedly accessed the emails of FBI Director Kash Patel. This breach raises concerns about cybersecurity vulnerabilities within high-level government communications and the potential implications for national security.
Kash Patel
Mar 30, 2026 · 12 clips · 6 podcasts
Best Podcasts on DHS Airport Disruptions
A prolonged stalemate in Congress over Department of Homeland Security (DHS) funding has led to significant disruptions, including unpaid TSA agents and widespread airport delays across the country. President Trump issued an emergency order to pay TSA workers, but the political battle between Democrats and Republicans over immigration policy and border security continues to impact national security and travel.
TSA
Mar 24, 2026 · 35 clips · 16 podcasts
Best Podcasts on TSA Shutdown Impact
Airports nationwide are experiencing severe delays and chaos due to a partial DHS government shutdown, leaving TSA agents unpaid and leading to staffing shortages. President Trump has responded by deploying ICE agents to assist with security, a move criticized by some as using American travelers as leverage in a political dispute over immigration. The situation has resulted in hours-long security lines and disrupted travel for many.
TSA Government shutdown
Mar 23, 2026 · 28 clips · 17 podcasts
Top Podcasts on SAVE America Act & Voter ID
Heated debates surrounding voter ID laws, election integrity, and the push for mass deportations are prominent in political discourse. Discussions center on the proposed "SAVE Act," which would require proof of citizenship to vote and faces strong opposition in the Senate, as well as the Trump administration's intensified immigration enforcement. Podcasts are analyzing the political motivations, practical implications, and national security aspects of these policies.
Mar 14, 2026 · 27 clips · 14 podcasts