Best Podcast Episodes About Gambit Security

Best Podcast Episodes About Gambit Security

Everything podcasters are saying about Gambit Security — curated from top podcasts

Updated: Apr 27, 2026 – 70 episodes
Listen to the Playlist

Ridealong has curated the best and most interesting podcasts and clips about Gambit Security.

Top Podcast Clips About Gambit Security

TBPN
Ridealong summary
Quantum computing advancements could break Bitcoin's encryption by 2029, but there's time to adapt if developers act now.
Quantum computing advancements have made breaking Bitcoin's cryptography easier than previously thought, posing a significant threat to its security.
Quantum computing poses a real threat to Bitcoin's encryption, but the timeline gives the crypto community a chance to adapt before 2029.
Quantum computing advancements pose a real threat to Bitcoin's encryption, with Google suggesting a significant reduction in resources needed to break it, potentially destabilizing the cryptocurrency market.
TBPN · AI Is Coming for Your Memes, Axios NPM Package Compromised, Claude Code Source Code Leak | Alex Pruden, Qasar Younis, Sebastian Mallaby, Forrest Heath, Dino Mavrookas, Will Ahmed, Jannick Malling, Ryan Daniels, Chris Yu · Mar 31, 2026
The Watch Floor with Sarah Adams
Ridealong summary
Dating apps are being exploited in dangerous ways, as highlighted by a troubling scenario in Ukraine where Russian adversaries created fake profiles to target foreign volunteers. This alarming tactic underscores the risks associated with sharing personal information online, especially in conflict zones. A similar incident with the fitness app Strava revealed how user data could inadvertently compromise military locations, illustrating the need for caution in our digital interactions.
The Watch Floor with Sarah Adams · Your Phone Isn’t Safe Right Now · Mar 20, 2026
Security Now (Audio)
“… to these guys to keep them from getting the opportunity. Is that right? I think so. And one of the other issues, I think, for anybody who's doing IT security is, you know, the famous expression is it's not possible to prove a negative. It's how do you get credit for your organization not being attacked? How do you demonstrate that it's because you have the budget that you have for IT and the equipment that you have and the staff that you have? You know, certainly there's profit pressure in any enterprise. And so when the guys who are controlling the purse strings look around for where they can cut, …” “… it worth to you for us not to tell the world or to leak the personal and business data that we have stolen from you? Right. So they have the means. They have the motive. The motive is extortion and payment. Yeah. The opportunity, it's really up to these guys to keep them from getting the opportunity. Is that right? I think so. And one of the other issues, I think, for anybody who's doing IT security is, you know, the famous expression is it's not possible to prove a negative. It's how do you get credit for your organization not being attacked? How do you demonstrate that it's because you have the budget that you have for IT and the equipment that you have and the staff that you have? You know, certainly there's profit pressure in any enterprise. And so when the guys who are controlling the purse strings look around for where they can cut, They're like, well, we haven't had any problems with our IT. Everything's going great. So let's cut there. And it's like, wait a minute. The reason everything is going great and you haven had any attacks is that we been able to keep the defenses up We been able to purchase expensive network gear that even though the old stuff was still working, it …” View more
Ridealong summary
Organizations are finally realizing that neglecting cybersecurity can lead to devastating breaches and public shame. With a surge in data extortion tactics, IT departments must demonstrate the importance of sustained funding to keep defenses strong. If businesses want to avoid being on the infamous breach list, they need to take IT security seriously now more than ever.
Security Now (Audio) · SN 1068: The Call is Coming from Inside the House - Live From Zero Trust World 2026 · Mar 05, 2026
The Adam Mockler Show
Ridealong summary
The breach of FBI Director Kash Patel's emails underscores a critical failure in cybersecurity and highlights the incompetence within the FBI's leadership, particularly in handling Iran-related counterintelligence.
The Adam Mockler Show · Trump makes EVERYONE GASP by ADMITTING THIS · Mar 19, 2026
Behind the Bastards
“So these security contractors will now live on the oil tanker or the container ship, either for its whole journey or for the duration of the time it's considered to be in danger. And also, I mean, if pirates try to get onto the big ship and all of the military guys are on a different ship, a little bit behind, you have to get those guys onto the other ship. Right, and then now you're shooting at the ship that you're supposed to be protecting, That does just make …” “So these security contractors will now live on the oil tanker or the container ship, either for its whole journey or for the duration of the time it's considered to be in danger. And also, I mean, if pirates try to get onto the big ship and all of the military guys are on a different ship, a little bit behind, you have to get those guys onto the other ship. Right, and then now you're shooting at the ship that you're supposed to be protecting, That does just make it a little bit more complicated, yeah. Yeah. Unfortunately, the way, according to reports I've read, I should say, the way they have got around this issue is by preemptively shooting at vessels that they consider to be a threat. And there are plenty of allegations of that. And we'll get on to the lack of really any means of legal accountability …” View more
Ridealong summary
The Maersk Alabama incident rattled the shipping industry and highlighted modern piracy's shift from theft to hostage-taking. In 2009, Somali pirates captured the U.S.-flagged ship, leading to a dramatic standoff with U.S. Navy SEALs that ended with the pirates being shot to rescue the captain. This event not only sparked fear in maritime security but also raised complex jurisdictional issues surrounding piracy.
Behind the Bastards · It Could Happen Here Weekly 224 · Mar 21, 2026
PBD Podcast
Ridealong summary
Gulf states are urging the U.S. to take decisive action against Iran, highlighting their strategic reliance on American support. Despite their limited leverage, they are actively seeking ways to assist, as tensions rise and the threat from Iran continues. Meanwhile, the U.S. is providing arms to Iranian protesters and Kurds, reflecting a complex geopolitical landscape.
PBD Podcast · US Pilot RESCUED + Trump's BRUTAL Iran Warning | PBD #771 · Apr 06, 2026
TBPN
“… their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts …” “… this person just spent $5 million on our API and it's all cyber attack related prompts. Like, let's maybe turn them off or figure out what's going on over there. They have a huge incentive to sort of, you know, control their customer base so that their customer base is not using these tools maliciously. the hackers sort of wind up on the lagging edge, not on the frontier, but all of the cybersecurity companies like Palo Alto Networks, like CrowdStrike, like the folks that you've had at your conference, they maintain access to the frontier, and so they're always fighting with a bigger weapon. Is that sort of the equilibrium we should expect here? That's a great question. And by the way, we did have today the two top cybersecurity experts at Antropic, the head of security and the head of product security, sharing the roadmap and thoughts about the upcoming capabilities of Antropic and other platforms. I think the answer to that is our continuous investment in innovation in the space. It's not just about Weez that I mentioned or Sierra. Those are large established startups. But we did have one company going out of stealth last week, Onyx Security. All they do is agent security. We had …” View more
Ridealong summary
Threat actors are outpacing defenders in the race to leverage AI for cyber attacks, creating a significant risk. While cybersecurity companies are innovating to combat this threat, the gap in adoption speeds leaves defenders at a disadvantage. However, the emergence of new security-focused startups may shift the balance in the coming years.
TBPN · AI Side Quests, Zaslav's Payday, SF Housing Market is Back | Shyam Sankar, Gili Raanan, Anna Patterson, Jake Loosararian, carried_no_interest · Mar 17, 2026
Security Now (Audio)
“… 31 so not 27 no 31 which is another wait for it CVSS 10 critical vulnerability in Cisco systems. As I said at the top of the show, what would the Security Now podcast be without a brand new shiny Cisco CVSS critical 10.0. The NIST NVD, the National Vulnerability Database, says of the new one, 31, they write, a vulnerability in the web-based management interface, who would have guessed, of Cisco secure firewall management center, apparently not that secure software, could allow an unauthenticated remote attacker to execute arbitrary Java code as root on an affected device. In other words, there …” “… very bad 10.0 CVE 2026-20127, which was that widely exploited authentication zero day discovered while being exploited in Cisco's Catalyst SD-WAN enterprise product line. really anyone could be forgiven for confusing that one with cisco's cve 2026 201 31 so not 27 no 31 which is another wait for it CVSS 10 critical vulnerability in Cisco systems. As I said at the top of the show, what would the Security Now podcast be without a brand new shiny Cisco CVSS critical 10.0. The NIST NVD, the National Vulnerability Database, says of the new one, 31, they write, a vulnerability in the web-based management interface, who would have guessed, of Cisco secure firewall management center, apparently not that secure software, could allow an unauthenticated remote attacker to execute arbitrary Java code as root on an affected device. In other words, there you go, Cisco 10.0. They wrote, this vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted, serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the …” View more
Ridealong summary
A newly discovered critical vulnerability in Cisco's secure firewall management center could allow attackers to execute arbitrary Java code as root, putting countless enterprises at risk. This flaw, CVE-2026-20131, was disclosed on March 4, 2026, and is already being exploited in ransomware campaigns. The ongoing issues with Cisco's authentication systems highlight the urgent need for better security measures in enterprise environments.
Security Now (Audio) · SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels · Mar 24, 2026
The Bobby Bones Show
Ridealong summary
In this hilarious segment, a dinner check sparks a debate about restaurant behavior, leading to a wild story of credit card hacking at a place called Poppy Garden. The punchline hits when the host discovers that even after getting hacked, he can still use Apple Pay with his new card number before it arrives!
The Bobby Bones Show · Best 7 Segments From The Bobby Bones Show This Week · Mar 21, 2026
Embracing Digital Transformation
Ridealong summary
Unprotected printers can compromise your entire network, and many are left vulnerable by default settings. The surprising truth is that even a simple USB upload can turn a printer into a gateway for malware, spreading it throughout the system. This highlights the critical need for better security measures in seemingly harmless office devices.
Embracing Digital Transformation · #341 The Hidden Cyber Threats in Printers and IoT Devices · Apr 09, 2026
Smashing Security
Ridealong summary
Bragging about your cryptocurrency wealth can put you at risk of robbery or worse. Criminals often target individuals based on their lifestyle cues and online presence, making it crucial to keep your assets private. This alarming reality is highlighted by the experiences of high-net-worth individuals who may even require bodyguards due to threats.
Smashing Security · LinkedIn is spying on you, and you agreed to nothing · Apr 08, 2026
CISO Series Podcast
“… effect, if one person does it, and you start hearing the team say it, like, it's kind of interesting, right? If you're building that within your security team, and it becomes a muscle that they all have, and they all share, and then they start talking to each other. And then they start learning the business, sitting with the business, like we used to do rotations with the business to kind of understand what the business leaders were going through to kind of help us understand what our controls were doing to them. So it's a real easy way to get that culture changed. And for those of you not …” “… And also, it also works really well when you're doing postmortems of a breach and you're trying to understand why something happened. You don't just go with the first answer. You have to keep digging down deeper. And if it's kind of like a snowball effect, if one person does it, and you start hearing the team say it, like, it's kind of interesting, right? If you're building that within your security team, and it becomes a muscle that they all have, and they all share, and then they start talking to each other. And then they start learning the business, sitting with the business, like we used to do rotations with the business to kind of understand what the business leaders were going through to kind of help us understand what our controls were doing to them. So it's a real easy way to get that culture changed. And for those of you not familiar with the Japanese philosophy, I believe it's the five whys. Yes, five. The way it was described to me, so I wear a Fitbit. And so like if you ask someone, why do you wear a Fitbit? It's like, oh, I want to count my steps. And then you ask the question of why there? Why do you want to count your steps? Well, I want to stay healthy. Well, why do …” View more
Ridealong summary
The Five Whys methodology reveals deeper truths in security, even leading to the profound realization that we wear Fitbits to avoid dying. By continually asking 'why,' security teams can cultivate a culture that understands business needs and enhances protective measures. This approach not only improves team dynamics but also aligns security with organizational goals.
CISO Series Podcast · Do You Think These Compliance Boxes Check Themselves? (LIVE in Clearwater, FL) · Mar 31, 2026
Connections Podcast
Ridealong summary
AI has already led to the loss of 90,000 jobs in the past year, and experts warn this is just the beginning. Holly Elmore from PauseAI argues that we must create international treaties to prevent further job loss and even potential human extinction, rejecting the idea that we should simply adapt to AI's rise. The urgency of addressing these issues is clear, as the technology poses unforeseen dangers to society.
Connections Podcast · The movement to head off an AI catastrophe · Mar 30, 2026
Morning Brew Daily
“… is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown …” “… Iran is earning about $139 million a day from oil sales in March, up from $115 million into February. So that's around 30% more revenue. It seems like the only person benefiting, at least economically, in terms of selling their oil on the global markets is Iran, which the U.S. is targeting. Moving on, the long national nightmare of long national lines might soon be over. Trump directed Homeland Security to start paying TSA workers just before the weekend, even though Congress failed to agree on a path to end the partial government shutdown. That means agents could start seeing paychecks as soon as today, but don't expect the lines that TSA just snap back to normal immediately. Almost 500 TSA agents have fully quit since the funding lapse in mid-February. That is in addition to the 1,000 agents that quit during the 43-day government shutdown last year. Those roles won't be easy to replace. It takes four to six months to complete training. Plus, it's not like people are applying in droves for a job that increasingly gets caught up in political skirmishes leading to lost paychecks. Adam Stahl, TSA's chief of staff, said last week that the situation will get worse before it gets better, …” View more
Ridealong summary
The TSA is facing a staffing crisis, leading to record-long security lines at airports. Despite Trump’s order to restore pay for TSA workers, many have quit, resulting in a 40% call-out rate at some airports. With lengthy training processes and a lack of job security, the situation is expected to worsen before it improves.
Morning Brew Daily · Investors Lose Patience with Iran War & TSA Workers Finally Get Paid · Mar 30, 2026
Embracing Digital Transformation
“… in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous …” “… logs okay try it now click oh and that's when it's like ah we didn't give you the new root CA here and they you know They send us the PKS file or what, I can't remember at this point. But they send us the group of certificates and we get those loaded in the web server and then everything was fixed. And we were pulling our hair out for over a week on that particular issue. How do you handle the security handouts? Because you mentioned the certifications and things like this. When you have so many vendors and you're actually moving data between all these vendors, there's so many questions on this one. But let's talk about security first. How do you handle the security between these? Do you have a common security design pattern that you use? Because that's a lot of vendors, 25 vendors. That's a lot. It's a lot. Yeah, for sure. So we rigorous risk assessments, and that's the number one thing that the NCUA is always looking for us in our regulation is the credit union performing reasonable information security risk assessments of all vendors and everything that we do. So when I first got here, we put into play just adhering to the NIST standards, the 800-DASH document on guide to risk …” View more
Ridealong summary
A week-long vendor issue was resolved when a missing encryption certificate was finally identified. This incident highlights the importance of rigorous risk assessments and adherence to NIST standards for managing security across multiple vendors. By implementing these practices, organizations can effectively mitigate risks and ensure compliance with regulatory requirements.
Embracing Digital Transformation · #337 Mastering Vendor Security in Financial Services: A 12-Year Journey · Mar 25, 2026
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
“… take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” “… exposed to it with the goal of hopefully being able to drop whatever commitments i have forego all income contribute however i can contribute to be useful and then beyond that i think basically spend and or give it all away is kind of my mindset. Like, take the vacation with the kids, do the fun stuff, support the charities, whatever the case may be, but just at least have that kind of baseline security that gives me the confidence that I can drop out of any commercial relationships that I might need to drop out of. Any provisions you would offer to my plan?” View more
Ridealong summary
Imagine being financially secure enough to drop all commitments and focus on what truly matters. Zvi Mowshowitz shares his vision of achieving a baseline financial security that allows him to spend time with family, support charities, and contribute to society without the burden of commercial obligations. This mindset not only fosters personal freedom but also empowers a more meaningful life amidst the uncertainties of AI-driven job loss.
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis · Zvi's Mic Works! Recursive Self-Improvement, Live Player Analysis, Anthropic vs DoW + More! · Mar 19, 2026
Defense in Depth
“… ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we …” “And that is the root cause of a problem. Very well said, Steve. All right, this comes to the portion of the show. Matt, I'm going to be throwing this to you first, where I ask you which quote of these was your favorite and why. And there's a lot of good ones in here, so narrow it down to one. It was that first one, the very, very first one by James, DevelopSec. Where he spelled out the fact that security did all this stuff with no input from development. Yeah, because it's so true. I can't tell you how many people I've worked with where a new security leader comes in and is like, yep, you know, I just walked into this and I'm trying to put together an application security program. And the development team does not like the security tooling at all. And it's because they weren't consulted with. Nobody asked them, hey, what do you all think if we do this? What do you folks think? How should we? They just did it and was like, you have to fix this. Nothing got fixed ever. And that's why security tools amongst developers get such a bad rep because they're not involved at all. Like anytime I work with a customer and we do a proof of concept and there's not a developer on the call, I say, …” View more
Ridealong summary
Ignoring developers in security decisions leads to ineffective tools and unresolved issues. A quote from James at DevelopSec highlights this problem, emphasizing that security measures are often implemented without consulting the very people who need to fix them. Involving developers in the conversation is crucial for a successful application security program.
Defense in Depth · Who is Responsible for the Conflict Between Security and Developers? · Mar 19, 2026
AI + a16z
“… so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with …” “… code. Putting all of this together, I think what's super fascinating to me is this is one of the first times we're having technology. But what it can do is not limited by its abilities, but limited by how I can make it secure and stop it from doing so. Yeah. Right? It's like it's this, we have this genie in a bottle. It's amazing. But how do I contain this? Has it ever happened before? I mean, security has always come at the end. Like it's never, I think it's just that we've solved, we've solved the coding side of this, the writing code side. And now it's more of a systems engineering. These are all fundamentally just systems and architectural problems. It's not necessarily security issues. Social engineering to some extent is, but that's, the problem is, is you're bringing up, you're co-mingling risks across different trust domains with this. So you have the trust and safety and alignment issues with your underlying foundation models. You have the systems architecture and execution around how OpenClaw does things on your local machine. And then you have the sort of the traditional hacking sort of, you know, prompt injection type stuff. Like people want to do malicious. People want to …” View more
Ridealong summary
The future of note-taking for AI agents is evolving beyond simple markdown to include executable code and dynamic charts, creating a richer source of truth. However, this technological advancement raises significant security challenges, as the ability to execute code must be balanced with the need to contain potential risks. Ultimately, the focus is shifting from coding capabilities to systems engineering and security architecture to ensure safe interactions with these powerful tools.
AI + a16z · OpenClaw: Why the Internet Isn't Built for AI Agents · Mar 19, 2026
Threat Vector by Palo Alto Networks
Ridealong summary
In ransomware negotiations, never appear desperate or rude to the attackers, as it can diminish your leverage and increase costs. Timing is crucial; negotiations typically start within three to five days, but if backups are intact, walking away might be the best option. Understanding when to engage or disengage can significantly impact the outcome for the victim organization.
Threat Vector by Palo Alto Networks · Inside Ransomware Negotiations: Trust Criminals or Walk Away? · Mar 19, 2026
Security Now (Audio)
Ridealong summary
CISA's Cyber Hygiene program is a game changer for organizations, offering free vulnerability scanning to enhance security. Once accepted, organizations receive detailed reports on vulnerabilities, with scanning frequency determined by severity, ensuring critical issues are addressed promptly. This proactive approach helps businesses stay ahead of potential cyber threats.
Security Now (Audio) · SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN · Mar 17, 2026

Top Podcasts About Gambit Security

The Watch Floor with Sarah Adams
The Watch Floor with Sarah Adams
4 episodes
Security Now (Audio)
Security Now (Audio)
4 episodes
Bannon`s War Room
Bannon`s War Room
4 episodes
CISO Series Podcast
CISO Series Podcast
3 episodes
Bulwark Takes
Bulwark Takes
3 episodes
Meet the Press
Meet the Press
3 episodes
The Megyn Kelly Show
The Megyn Kelly Show
3 episodes
TBPN
TBPN
2 episodes

Stories Mentioning Gambit Security

Top Podcasts on Political Violence Against Trump
There is an increasing concern about political violence in the United States, particularly regarding threats against former President Donald Trump. This rise in threats highlights the ongoing tensions and security challenges in the political landscape, which could have significant implications for public safety and political stability.
May 02, 2026 · 25 clips · 15 podcasts
Top Podcasts on Bitcoin's Quantum Threat
The cryptocurrency market, including Bitcoin, is experiencing significant developments with the potential threat from quantum computing, increasing institutional adoption, and heightened regulatory scrutiny. These factors are shaping the future landscape of digital currencies, impacting their security, acceptance, and compliance requirements.
bitcoin
Apr 29, 2026 · 16 clips · 6 podcasts