Best Podcast Episodes About Zero Trust

Best Podcast Episodes About Zero Trust

Everything podcasters are saying about Zero Trust — curated from top podcasts

Updated: Apr 28, 2026 – 64 episodes
Listen to the Playlist

Ridealong has curated the best and most interesting podcasts and clips about Zero Trust.

Top Podcast Clips About Zero Trust

Techlandia
“superpower before we jump in. Trust is one of the eight. And it's called, technically, I call it start with trust. And if you were to ask me, thank you for clarifying. Yeah. Sometimes I take my own work for granted. I shouldn't. It is one of the eight. So letting go is one. Starting with trust is another. And if, however, you were to ask me, is there one that plays an outsized role? They're all important. They're all helpful. They all stand on their own. No question that trust, …” “superpower before we jump in. Trust is one of the eight. And it's called, technically, I call it start with trust. And if you were to ask me, thank you for clarifying. Yeah. Sometimes I take my own work for granted. I shouldn't. It is one of the eight. So letting go is one. Starting with trust is another. And if, however, you were to ask me, is there one that plays an outsized role? They're all important. They're all helpful. They all stand on their own. No question that trust, it is the one. If I had to pick one of the eight where to start, because when you think about it, everything, everything, everything, everything in times of change, uncertainty and unknown, everything comes down to trust. Now, it's not the same, necessarily the same manifestation of trust, right? Sometimes you need to trust someone else. Sometimes …” View more
Ridealong summary
Trust is the foundational superpower you need to navigate change and uncertainty, according to futurist April Rinne. She emphasizes that both cognitive trust—believing others will fulfill their commitments—and emotional trust—feeling that others care—are crucial for success. In times of disruption, it's the emotional trust that ultimately carries organizations through challenges.
Techlandia · Thriving Amidst Change: April Rinne's Superpowers · Mar 24, 2026
Adam Carolla Show
“… Means In a city like New York It means you're very accomplished athletically. So obviously, drugs, alcohol, not a big part of your life. None. Zero. Zero. Zero. So when did it come in? As soon as I eventually got a record deal with Columbia as a solo act. And they just said, you've got to change your whole look. I look like a choir boy. And they started sending me to openings, premieres, and I looked different than everyone. I ironed my socks, I swear to God. I was just that kind of a guy. So, you know, little by little, you know, I saw the people that were happening did not look like me. …” “… went, oh these guys are nuts Little did I know I was going to You know, be nuts myself Now you were like an all-city basketball Player in high school And so you're athletic And to be an all-city What city? New York So to be an all-city basketball player Means In a city like New York It means you're very accomplished athletically. So obviously, drugs, alcohol, not a big part of your life. None. Zero. Zero. Zero. So when did it come in? As soon as I eventually got a record deal with Columbia as a solo act. And they just said, you've got to change your whole look. I look like a choir boy. And they started sending me to openings, premieres, and I looked different than everyone. I ironed my socks, I swear to God. I was just that kind of a guy. So, you know, little by little, you know, I saw the people that were happening did not look like me. And then I ran into Danny Hutton, one of the guys from Three Dark Night at the party who had a hit at the time, Roses and Rainbows. And a girl came over to me and kissed me and dropped something in my mouth. And he said, did you just drop it? And I said, yes, you went to school, man. It's so cool. And I went, what do you think it is? You know, I …” View more
Ridealong summary
Chuck Negron hilariously recounts his transformation from a clean-cut all-city basketball player to a drug user after a fateful kiss at a party. His candid admission about how he went from ironing his socks to experimenting with acid sets the stage for a wild journey into addiction, all while maintaining a light-hearted tone.
Adam Carolla Show · Chuck Negron + Stephen Malkmus (Carolla Classics) · Apr 26, 2026
The AI XR Podcast
“… my daughter and her friends, they go to like coffee shops and artisanal places where they know the barista and they know the ingredients and they trust the chef they don't want to go to a franchise they anything with a big brand or franchise they don't use anymore they don't use like tiktok and stuff like that anymore because they don't trust it they're going to local things and software has to show up for them right the big branded software thing is they know it's using them and they don't want that anymore they're just like shedding it off let's so i think you're going to see a whole new …” “is we start rejecting these corporations and giant platforms that are using us like cattle and saying no. And I see that like my daughter and her friends, they go to like coffee shops and artisanal places where they know the barista and they know the ingredients and they trust the chef they don't want to go to a franchise they anything with a big brand or franchise they don't use anymore they don't use like tiktok and stuff like that anymore because they don't trust it they're going to local things and software has to show up for them right the big branded software thing is they know it's using them and they don't want that anymore they're just like shedding it off let's so i think you're going to see a whole new tech i personally think a new tech ecosystem will evolve around trust that's more local and it's going to be a huge nightmare um for anyone who's not who's not being stupid and not being taken advantage of” View more
Ridealong summary
A new tech ecosystem focused on trust is emerging as people, especially younger generations, reject big brands and corporate platforms. They prefer local coffee shops and artisanal products where they know the people behind them. This shift signals a potential nightmare for companies that fail to adapt to this demand for authenticity and transparency.
The AI XR Podcast · Why Social Media Lost in Court and AI Agents Demand Total Surveillance – Shelley Palmer's 5th Visit · Mar 31, 2026
The Bobby Bones Show
“… sake of transparency, we should have full access to each other's phones and social media accounts, including passwords. He says it's about building trust, and it shouldn't be a problem since we have nothing to hide. But to me, it feels like a pretty big invasion of privacy. He keeps framing my hesitation as a red flag, which is starting to make me second guess myself. Is this a reasonable expectation in a relationship, or is he crossing a line by pushing for this? signed cyber insecure. What comes to your mind whenever I... He must have a trust issue, something happened to him. Or he's up to no …” “… to the Bobby Bones Show Instagram, and you can see Lunchbox on The Price is Right. It's the anonymous inbox. Anonymous inbox. There's a question to be had. Send it in to the well-being. Hello, Bobby Bones. My boyfriend recently told me that for the sake of transparency, we should have full access to each other's phones and social media accounts, including passwords. He says it's about building trust, and it shouldn't be a problem since we have nothing to hide. But to me, it feels like a pretty big invasion of privacy. He keeps framing my hesitation as a red flag, which is starting to make me second guess myself. Is this a reasonable expectation in a relationship, or is he crossing a line by pushing for this? signed cyber insecure. What comes to your mind whenever I... He must have a trust issue, something happened to him. Or he's up to no good. Oh. But it would be shared acts that like he would get hers and she would get his. I hear you. He's probably good at hiding it. Anybody that's accusing somebody of cheating, usually they got a little something going on. Like if somebody starts accusing you of cheating out of nowhere, it's because they got something going on. If you haven't …” View more
Ridealong summary
In this segment, the hosts hilariously dissect a listener's dilemma about sharing passwords in a relationship. They suggest that if your partner is demanding transparency, it might be a sign that they have something to hide, leading to some comical insights on trust and insecurity.
The Bobby Bones Show · THURS PT 1: Happy Birthday Bobby! + Lunchbox's 'The Price Is Right' Tax Bill + ‘Give Me Your Passwords’ Debate! · Apr 02, 2026
Security Now (Audio)
“… then they lateral movement, lateral movement in the network. We were talking the other day about a hack that somebody had set up, you know, like 90% zero trust, but there was a security camera that had just enough RAM and just enough processor to run an encryption routine, a malware routine. So they used that. That was the one thing that wasn't protected. Yeah. It seems like, though, if you really implement true zero trust, that would be easier in the long run. The hard thing is the social thing is explaining to your users that you super glued their USB ports. It's not easy. Yeah. Or that, you know, …” “… not the default. It's not easy. As I said, the easiest thing to do is to get a switch and plug everybody in. You need to segment. You need to think in terms of departmental level access. But what we always see is the bad guys get in somewhere and then they lateral movement, lateral movement in the network. We were talking the other day about a hack that somebody had set up, you know, like 90% zero trust, but there was a security camera that had just enough RAM and just enough processor to run an encryption routine, a malware routine. So they used that. That was the one thing that wasn't protected. Yeah. It seems like, though, if you really implement true zero trust, that would be easier in the long run. The hard thing is the social thing is explaining to your users that you super glued their USB ports. It's not easy. Yeah. Or that, you know, if you want to log in, you have to go. You have to jump through some hoops in order to do. You have to you have to continually internally reauthenticate. Prove that. Oh, God, we hate that, though. Yes. You know, again, it's going to be hated. Google's making me log in again. But that's why, right? That's what you have to do. Right. Now, you worked …” View more
Ridealong summary
In the evolving landscape of enterprise security, passwordless authentication and biometrics are set to become the norm. This shift is essential for enhancing security while minimizing user frustration, as employees will need to continuously re-authenticate to prove their identity. The integration of AI further complicates this, but it promises a more secure and user-friendly experience.
Security Now (Audio) · SN 1068: The Call is Coming from Inside the House - Live From Zero Trust World 2026 · Mar 05, 2026
Threat Vector by Palo Alto Networks
“man let's shift gears mismanagement often slows down zero trust progress How do you help organizations break down the silos and maintain momentum across departments? You have to align on a shared outcome. When teams can agree what good looks like for a specific application or workflow, so things like who should have access, under what conditions, and why, that becomes the common language that really unites everyone. And communication really plays a huge role in sustaining that momentum. So you have to have …” “man let's shift gears mismanagement often slows down zero trust progress How do you help organizations break down the silos and maintain momentum across departments? You have to align on a shared outcome. When teams can agree what good looks like for a specific application or workflow, so things like who should have access, under what conditions, and why, that becomes the common language that really unites everyone. And communication really plays a huge role in sustaining that momentum. So you have to have regular structured conversations between identity, between network, the security teams to create continuity and really reinforce that trust. And that's what allows Zero Trust decisions to stick over time. When those teams work cross-functionally and they stay connected, Zero Trust stops being this one-time initiative that we're just going to knock …” View more
Ridealong summary
Breaking down silos is crucial for successful Zero Trust implementation. When teams align on shared outcomes and maintain open communication, Zero Trust becomes an integral part of the organization's operations rather than just a one-time project. This cross-functional collaboration ensures that security measures are effective and sustainable over time.
Threat Vector by Palo Alto Networks · Zero Trust Without the Hype · Mar 05, 2026
DrZeroTrust
“… one. And then comes the other steps of actually protecting it or controlling the access, controlling the tools and all. Yeah, I mean, it used to be zero days were like the thing, right? Everybody was freaked out about a zero day, whatever, even though not necessarily all zero days are the same. But now, like to me, zero hour is kind of the most interesting, terrifying thing is like when someone creates an agent or does whatever the hell they do. What do they do? Yeah. And how fast can you figure that out? And we have seen some very, very interesting use cases come. We are working with a couple …” “… ecosystem, right? It's about these agents, these MCP servers, these skills, these tools, these resources, this access, this user identity. Unless we know that, there's nothing we can really do to protect anything. So I think that's definitely step one. And then comes the other steps of actually protecting it or controlling the access, controlling the tools and all. Yeah, I mean, it used to be zero days were like the thing, right? Everybody was freaked out about a zero day, whatever, even though not necessarily all zero days are the same. But now, like to me, zero hour is kind of the most interesting, terrifying thing is like when someone creates an agent or does whatever the hell they do. What do they do? Yeah. And how fast can you figure that out? And we have seen some very, very interesting use cases come. We are working with a couple of very good financial institutions. And this is a very interesting case that came out where they've built this whole MCP application. If you think about it, we've put Zscaler and all of these products to protect zero trust, to apply zero trust, and to control who can access what applications based on their role and all of that. Now, all of a …” View more
Ridealong summary
AI agents can bypass traditional security measures, creating dangerous gaps in network protection. A financial institution discovered that their zero trust controls failed when an AI agent accessed the internet directly, highlighting the need for updated security strategies. As AI evolves, organizations must rethink how they secure their systems against these emerging threats.
DrZeroTrust · Beyond Perimeter Defenses: DLP, CASB, and the AI Agent Revolution · Mar 03, 2026
Security Now (Audio)
“I did it in this customer-provided HSM mode. That allowed me to add DigiCert's certificate into my new HSMs alongside the newly minted IDEN Trust certificate. It all worked perfectly. Now I have HSMs containing both the existing expiring in November DigiCert code signing certificate and the new identrust code signing cert, which goes for three years. So, okay, believe it or not, I haven't forgotten about David. He started me off on all this by asking about the possibility of coders sidestepping all this nonsense by using self-signed certificates. Now, the use of self-signed certificates …” “I did it in this customer-provided HSM mode. That allowed me to add DigiCert's certificate into my new HSMs alongside the newly minted IDEN Trust certificate. It all worked perfectly. Now I have HSMs containing both the existing expiring in November DigiCert code signing certificate and the new identrust code signing cert, which goes for three years. So, okay, believe it or not, I haven't forgotten about David. He started me off on all this by asking about the possibility of coders sidestepping all this nonsense by using self-signed certificates. Now, the use of self-signed certificates has been common practice for web developers for many years. I have a self-signed certificate for local host sitting in the trusted root stores of my various workstations. I run a web server on those machines which uses that certificate. And I use it for local web development. Having a self certificate for local host allows me to use HTTPS URLs …” View more
Ridealong summary
Self-signed certificates might seem like a shortcut for code signing, but they create significant trust issues. While they work for local development, they require manual installation on users' machines, making them impractical for widespread software distribution. This highlights the essential role of Certificate Authorities in ensuring universally trusted code signatures.
Security Now (Audio) · SN 1067: KongTuke's CrashFix - Click, Paste, Pwned · Mar 03, 2026
Security Now (Audio)
“… for hosting a Bitwarden vault. I personally, I'm not going to do that because I think that their security is a lot better than mine. That's why I trust Bitwarden, the leader in passwords, passkeys and secret management, consistently ranked number one in user satisfaction, not by me, but by G2, software reviews, 10 million users, love Bitwarden, 180 countries, more than 50,000 businesses. And whether you're protecting just one account, your own or thousands for your business, Bitwarden keeps you secure all year long with consistent updates. The new Bitwarden access intelligence will let …” “… In fact, Bitwarden does let you host the vault yourself if you want, if that's something you desire. I'll talk about something they've just added, which is really cool for this purpose. But there are, there are even third-party open source solutions for hosting a Bitwarden vault. I personally, I'm not going to do that because I think that their security is a lot better than mine. That's why I trust Bitwarden, the leader in passwords, passkeys and secret management, consistently ranked number one in user satisfaction, not by me, but by G2, software reviews, 10 million users, love Bitwarden, 180 countries, more than 50,000 businesses. And whether you're protecting just one account, your own or thousands for your business, Bitwarden keeps you secure all year long with consistent updates. The new Bitwarden access intelligence will let organizations detect weak and reuse and expose credentials. Now, this is legitimately a real problem. We're talking about the, the, the threat is coming from inside the house. This is it. Your users are using the same password over and over again, frequently, or they're using a weak password. Bitwarden access intelligence will detect that or a password …” View more
Ridealong summary
Recent research from ETH Zurich reveals that password managers like Bitwarden are now more secure than ever, thanks to extensive audits and open-source transparency. This analysis shows that even if cloud infrastructure is compromised, these tools have implemented measures to protect user data. As a result, users can feel more confident in their security than they did just a month ago.
Security Now (Audio) · SN 1066: Password Leakage - Zero Trust, Zero Knowledge · Feb 24, 2026
Security Now (Audio)
“… the world's largest cloud security platform. And when you talk about least privilege and you talk about AI, you're talking about Zscaler. They use zero trust to protect you as you use AI, and it protects you against bad guys you're using AI. The potential rewards of AI in your business, obviously, nowadays, too great to ignore. But so are the risks, and the risks external and internal, like the loss of sensitive data, attacks against enterprise-managed AI. And of course, generative AI increases opportunities for threat actors, helping them to rapidly create phishing lures, to write malicious code, …” “… I think we should kick off with one, if you'll pardon the choice of words. And then we'll take a look at our picture of the week. You got it. Coming up in just a bit, you're watching Security Now, our show today brought to you by Zscaler. Zscaler, the world's largest cloud security platform. And when you talk about least privilege and you talk about AI, you're talking about Zscaler. They use zero trust to protect you as you use AI, and it protects you against bad guys you're using AI. The potential rewards of AI in your business, obviously, nowadays, too great to ignore. But so are the risks, and the risks external and internal, like the loss of sensitive data, attacks against enterprise-managed AI. And of course, generative AI increases opportunities for threat actors, helping them to rapidly create phishing lures, to write malicious code, to automate data extraction. There were 1.3 million instances of social security numbers leaked through the legitimate use of AI applications. It's hard to stop in your business. ChatGPT and Microsoft Copilot saw nearly 3.2 million data violations last year. It's time to rethink your organization's safe use of public and private AI. But you can do …” View more
Ridealong summary
The Irish Data Protection Commission is owed over 4 billion euros in fines that remain uncollected due to appeals and legal challenges. Despite imposing significant penalties on major tech companies, only a small fraction has been paid, raising questions about the effectiveness of such fines as deterrents. This situation highlights the gap between levying fines and actually collecting them, as companies delay payments through appeals.
Security Now (Audio) · SN 1064: Least Privilege - Cybercrime Goes Pro · Feb 10, 2026
Oxide and Friends
“… really large And you have to find ways because it was not an option to be like, well, we will wait to ship our first rack until we have all of Trust Quorum working because it would be not, we would not have shipped. And we had to ship a product, but you also, and I think that this is kind of the night that you were on, Andrew, is like, if we have no trust quorum whatsoever or if we have effectively if we don't encrypt the data at rest then the only way to go from the old world to the new world is going to be to completely nuke the rack of all of its data and we really did not want to do …” “… And I will get into more of that, but I'll stop there for a second. Well yeah I thought I mean because this is a really gnarly engineering problem and this is a problem we had over and over again at Oxide It like the minimum viable product is really really large And you have to find ways because it was not an option to be like, well, we will wait to ship our first rack until we have all of Trust Quorum working because it would be not, we would not have shipped. And we had to ship a product, but you also, and I think that this is kind of the night that you were on, Andrew, is like, if we have no trust quorum whatsoever or if we have effectively if we don't encrypt the data at rest then the only way to go from the old world to the new world is going to be to completely nuke the rack of all of its data and we really did not want to do that um so yeah i mean the balance we're trying to hit is how and in transparently with our earliest customers of like here's what this thing is and isn't. Here's what the threat model is and isn't. And here is how we can give ourselves the foundation where we can, our future selves, this is our future selves now looking from 2023 forward, 2020, late …” View more
Ridealong summary
The Oxide team's innovative Low-Rent Trust Quorum (LRTQ) strategy protects against casual physical attacks on data while maintaining the ability to ship their first rack. By generating an extensive set of key shares, they ensured encryption at rest without compromising future scalability. This clever workaround exemplifies the balance between immediate product delivery and long-term security planning.
Oxide and Friends · Building a Quorum of Trust in the Oxide Rack · Apr 04, 2026
The Viall Files
“… he said, I'd love to catch up. For some reason, I did it. We ended up kind of getting into something again. But I told him like I don know if I can trust you again all this stuff We ended up seeing each other for about three months And then I realized if I was going to do this again which I didn want to tell him any of my friends I was doing it because this is my pattern. I go back to men. So I kind of kept that away from them. And I was trying to figure it out on my own. I was like, I'm only going to do this if it seems like he's grown up a bit in terms of like, just being ready for something. …” “… after that? No, we went on our way. And this was three years ago again. So over the past three years, we hung out or we got together randomly once. We went on a drive. We did nothing. We just caught up. And then about last summer, he texted me and he said, I'd love to catch up. For some reason, I did it. We ended up kind of getting into something again. But I told him like I don know if I can trust you again all this stuff We ended up seeing each other for about three months And then I realized if I was going to do this again which I didn want to tell him any of my friends I was doing it because this is my pattern. I go back to men. So I kind of kept that away from them. And I was trying to figure it out on my own. I was like, I'm only going to do this if it seems like he's grown up a bit in terms of like, just being ready for something. And it kind of seemed like it did. He was like progressing things. He was giving me reassurance. He was telling me about what he wants in the future. And then a situation happened and I realized, okay, this is never, he's never going to be the person I want. So I ended things with him. I can get into that if you want, but I sent you some texts and …” View more
Ridealong summary
In a revealing story, a woman shares her experience with a man who lied about his age, claiming to be 27 when he was actually 10 years older. Despite a strong connection, the deception led to trust issues and ultimately the end of their relationship, highlighting how dishonesty can complicate romantic dynamics. This segment explores the complexities of dating and the importance of transparency in relationships.
The Viall Files · E1097 Ask Nick - My Husband Keeps Choosing Her Over Me · Mar 23, 2026
Intelligent Machines (Audio)
“… pro level price tag. SpaceMail from spaceship.com. And by the way, take advantage of it. I did, the 30-day free trial means you can start today at zero cost. Visit spaceship.com slash twit to see all the exclusive offers and discover why thousands have already made the move. It's my new domain registrar. It's my new everything. I love it. Spaceship.com slash twit. Thank them so much for their support of Intelligent Machines and Secretly British. It's SecretlyBritish.sh, if you want to try it out. .sh. That was Benito's idea. He said, you should look and see if they have .sh. Oh, they did. And …” “… some of the best prices on domains plus all the add-ins you might need, including VPNs, website builders, hosting, and more. Whether you're building something big or launching your first idea, SpaceMail gives you the pro email address without the pro level price tag. SpaceMail from spaceship.com. And by the way, take advantage of it. I did, the 30-day free trial means you can start today at zero cost. Visit spaceship.com slash twit to see all the exclusive offers and discover why thousands have already made the move. It's my new domain registrar. It's my new everything. I love it. Spaceship.com slash twit. Thank them so much for their support of Intelligent Machines and Secretly British. It's SecretlyBritish.sh, if you want to try it out. .sh. That was Benito's idea. He said, you should look and see if they have .sh. Oh, they did. And .sh is a British colony, so it itself is Secretly British. Hey, that's how you know. Well, in fact- We're gonna be maybe building that in the AI user group. Is that next week in the AI user group? Oh, it's the first Friday. I won't be here, though. I'll be in Florida. You should be the host. Florida? And they can help you. I don't know if I can. …” View more
Ridealong summary
Understanding the bizarre language of internet culture can be both fascinating and alarming. A recent viral tweet discusses terms like 'jester gooning' and 'SMV chad fishing,' revealing how young men are engaging in extreme behaviors for online validation. This raises concerns about the impact of internet culture on real-life actions and values.
Intelligent Machines (Audio) · IM 859: What's Behind the Fox? - Tech's Gilded Age · Feb 25, 2026
Security Now (Audio)
“… are on the Security Now mailing list before that. Right. And then we're going to get in an airplane, a big old jet airplane, and go to Orlando for Zero Trust World Threat Locker's really great security conference. I'm looking forward to it. Some great keynote speakers, including – I'm really excited to see a guy we spent a lot of time talking about. Oh, what's his name? Well, first of all, Adam Savage. Marcus Hutchins will be there. Oh, cool. Yeah, so we can talk to Marcus Hutchins. Adam Savage is speaking. My friend David Spark. Linus of Linus Tech Talks. So, in fact, the whole Linus Media Group, I …” “… Just kidding, Lisa. I'm not worried about Lisa. I'm worried about Lori. But anyway, thank you, Lori, for letting us steal Steve's brunch time. Okay. I'll have mimosas ready for you, Steve. Yes, and email will go out to all 20,000 plus listeners who are on the Security Now mailing list before that. Right. And then we're going to get in an airplane, a big old jet airplane, and go to Orlando for Zero Trust World Threat Locker's really great security conference. I'm looking forward to it. Some great keynote speakers, including – I'm really excited to see a guy we spent a lot of time talking about. Oh, what's his name? Well, first of all, Adam Savage. Marcus Hutchins will be there. Oh, cool. Yeah, so we can talk to Marcus Hutchins. Adam Savage is speaking. My friend David Spark. Linus of Linus Tech Talks. So, in fact, the whole Linus Media Group, I think, is going to be there.” View more
Ridealong summary
Self-hosting your passwords might sound secure, but experts suggest commercial password managers are a safer bet. While self-hosting puts the onus on you, professionals managing commercial services have dedicated security measures in place. Ultimately, relying on a password manager is more effective than trying to protect your passwords alone.
Security Now (Audio) · SN 1066: Password Leakage - Zero Trust, Zero Knowledge · Feb 24, 2026
Thinking Crypto News & Interviews
“… to be. As much as we love the idea of deploying on-prem and as much as it's a regulatory requirement, our little passion is to keep working on the Zero Trust SaaS. So yeah, we'll want to provide as much data integrity and security as possible over time. That's exciting.” “… all these things, all these objects. So we're increasingly looking at providing that increased, that enhanced admin experience for blockchains. Transaction lifecycle management, all of these things. Security has always been a big thing, will continue to be. As much as we love the idea of deploying on-prem and as much as it's a regulatory requirement, our little passion is to keep working on the Zero Trust SaaS. So yeah, we'll want to provide as much data integrity and security as possible over time. That's exciting.” View more
Ridealong summary
Blockchain administration is evolving to provide a seamless experience across over 50 blockchains, inspired by cloud orchestration successes. As complexity increases, especially in financial institutions, the focus is on enhancing the admin experience to manage diverse teams and security needs effectively. This approach aims to simplify transaction management and bolster security through innovative solutions like Zero Trust SaaS.
Thinking Crypto News & Interviews · Building the Most Powerful Crypto Wallet Infrastructure! | Christopher des Fontaines · Feb 13, 2026
The Changelog: Software Development, Open Source
“… to to maneuver something. And at the same time, I've learned, tell me if you've heard this before, if you feel this way, at least when I say this, trust the model. Does that ring a bell or resonate anything inside, Jamelia? Trust the model. It makes me uncomfortable. It makes you uncomfortable. I have the opposite philosophy. Okay, gosh, let's dig into that then. So I've pushed on the model to not trust it and i don't know about you but lately i've been just specifying things i want to do so well that when they come back with feelings i guess i don't know how to their intentions or their …” “… somebody touching my files over here. There should be nobody in this room. And they've got no eyes and no hands, so to speak. So we kind of have to give our agents to do this work. We kind of have to give them eyes to see something and give them hands to to maneuver something. And at the same time, I've learned, tell me if you've heard this before, if you feel this way, at least when I say this, trust the model. Does that ring a bell or resonate anything inside, Jamelia? Trust the model. It makes me uncomfortable. It makes you uncomfortable. I have the opposite philosophy. Okay, gosh, let's dig into that then. So I've pushed on the model to not trust it and i don't know about you but lately i've been just specifying things i want to do so well that when they come back with feelings i guess i don't know how to their intentions or their thoughts on what i'm putting out there a lot of my responses end up being i like that what are your suggestions for this i review their suggestions i'm like my a lot of my responses is some idea they go and turn on it i review it and i'm like this is awesome and then i ask it for clarity and blind spots and like they go back and review what we've done …” View more
Ridealong summary
The idea of 'trusting the model' in AI interactions can be unsettling for many, but it can also lead to surprising insights and efficiency. Amelia Wattenberger discusses how she navigates her relationship with AI agents by treating them as planners and verifiers rather than mere executors. This approach not only enhances productivity but also encourages critical thinking about AI's suggestions and potential blind spots.
The Changelog: Software Development, Open Source · Exploring with agents (Interview) · Apr 24, 2026
The AI in Business Podcast
“I think the biggest thing is that innately voice is the channel of trust and we are going through a time where that assumption is being shook and I think that there's this tension because I think we have evolved as humans to this place where we can't just let go of that so we need to understand that there's going to be this connection this innate trust with voice and we really need to figure out how do we guard ourselves without losing that ability to connect and I think that voice AI is a way that we can say okay …” “I think the biggest thing is that innately voice is the channel of trust and we are going through a time where that assumption is being shook and I think that there's this tension because I think we have evolved as humans to this place where we can't just let go of that so we need to understand that there's going to be this connection this innate trust with voice and we really need to figure out how do we guard ourselves without losing that ability to connect and I think that voice AI is a way that we can say okay we can reestablish trust in a way that allows us to continue to have meaningful connections. Absolutely. And trust to our enterprise leaders is not just an emotion. It is keeping their jobs and keeping everyone else's jobs in place. So that's completely true.” View more
Ridealong summary
Voice technology has long been viewed as a channel of trust, but recent shifts are challenging this belief. Ken Morino explains how we can maintain meaningful connections while safeguarding against voice-based fraud, emphasizing that trust is critical for enterprise leaders' job security. By leveraging voice AI, we can restore that essential trust without losing our ability to connect.
The AI in Business Podcast · Operationalizing Real-Time Voice Intelligence for FinServ and CX - with Ken Morino of Modulate · Apr 24, 2026
DrZeroTrust
“… cycle now is the AI hype cycle. And I think there's going to be a lot of organizations in the very near future, call it next 12 to 18 months, Dr. Zero Trust prediction here, are going to be very disappointed in a lot of the things they bought that didn't deliver on that the way that they were expecting. So we'll do one downbeat before we go back.” “… have an answer for me. Your ability to get through this conversation with a modicum of dignity is really what sets you apart, why you should be here. It genuinely concerns me for the future state of security across the U.S. and globally, that the hype cycle now is the AI hype cycle. And I think there's going to be a lot of organizations in the very near future, call it next 12 to 18 months, Dr. Zero Trust prediction here, are going to be very disappointed in a lot of the things they bought that didn't deliver on that the way that they were expecting. So we'll do one downbeat before we go back.” View more
Ridealong summary
In the next 12 to 18 months, many organizations may find themselves disillusioned by the AI solutions they invested in, as the hype surrounding these technologies may not deliver the promised results. This concern arises from a recent discussion at RSA 2023, where industry experts emphasized the need to return to cybersecurity basics rather than getting swept up in flashy AI marketing. The reality is that while AI is being hailed as revolutionary, it often fails to address fundamental security needs effectively.
DrZeroTrust · Balancing Hoodies and Suits in Cybersecurity · Mar 30, 2026
Thinking Crypto News & Interviews
“… investment things And so when I went to graduate when I came to New York I actually was working for a company that was then called Bankers Trust Company. And we were in several locations in the city, but I was in the index fund group. So think about the period in 1986 toward 1989, which is when I was there. explosive activity in the number of pension funds who were thinking about, hey, maybe I can, you know, put some lower cost index fund passive investment strategies in our portfolio at a lower cost rather than paying high cost active management fees. So that's kind of where I cut my …” “… to a lot of different investment professionals having been around that CFA Institute early in my, you know, when I was in junior high and high school and those college formative years And so I had a pretty good idea that I wanted to be doing investment investment things And so when I went to graduate when I came to New York I actually was working for a company that was then called Bankers Trust Company. And we were in several locations in the city, but I was in the index fund group. So think about the period in 1986 toward 1989, which is when I was there. explosive activity in the number of pension funds who were thinking about, hey, maybe I can, you know, put some lower cost index fund passive investment strategies in our portfolio at a lower cost rather than paying high cost active management fees. So that's kind of where I cut my teeth. And it's been a great career. I've seen a lot of things over almost four decades of experience now in these markets. Oh, yeah. I'm sure you have a plethora of knowledge. And I'm curious what your point of view is or take of or perspective, I should say, on how the markets have changed, especially as they become digitized on the internet and …” View more
Ridealong summary
Blockchain technology is drastically lowering asset management costs, benefiting capital owners with higher returns. This shift is redefining the relationship between those who have capital and those who seek it, eliminating unnecessary intermediaries. As the industry evolves, the efficiency gained from distributed ledger technology is reshaping the financial landscape.
Thinking Crypto News & Interviews · Why $1.6 Trillion Franklin Templeton Went All in on Tokenization! | Roger Bayston · Mar 25, 2026
The AI in Business Podcast
“So with that being said, trust and things like data leakage and all the other challenges that we have, what does it take for AI to deliver meaningful, reliable value inside a complex enterprise? Yeah, I think there are two aspects to your question. So first of all, if you look at the context engine, as I said, it really builds a deep map of the organization, understanding relationships and correlating things across system, which means that it has access and got to have …” “So with that being said, trust and things like data leakage and all the other challenges that we have, what does it take for AI to deliver meaningful, reliable value inside a complex enterprise? Yeah, I think there are two aspects to your question. So first of all, if you look at the context engine, as I said, it really builds a deep map of the organization, understanding relationships and correlating things across system, which means that it has access and got to have access to many of the most precious sources of information inside organization. And typically for our customers, that would mean that they would like the context engine to run inside their perimeter. So it means behind their firewall or even completely air-gapped, because this is now becoming really a map of the organization or containing very precious …” View more
Ridealong summary
For enterprises to trust AI agents, they must ensure these systems possess deep organizational knowledge, akin to a senior engineer's expertise. This requires a context engine that operates within the company's secure perimeter, safeguarding sensitive information while enabling agents to make informed decisions. Without this trust, the risk of data leakage and operational failures rises significantly.
The AI in Business Podcast · Why Enterprise AI Fails Without a Context Engine - with Eran Yahav of Tabnine · Mar 25, 2026

Top Podcasts About Zero Trust

Security Now (Audio)
Security Now (Audio)
6 episodes
The Dan Bongino Show
The Dan Bongino Show
4 episodes
Thinking Crypto News & Interviews
Thinking Crypto News & Interviews
3 episodes
The Jesse Kelly Show
The Jesse Kelly Show
3 episodes
Club Shay Shay
Club Shay Shay
3 episodes
Threat Vector by Palo Alto Networks
Threat Vector by Palo Alto Networks
2 episodes
DrZeroTrust
DrZeroTrust
2 episodes
The AI in Business Podcast
The AI in Business Podcast
2 episodes

Stories Mentioning Zero Trust

Best Podcast Episodes on Bitcoin ETF Surge
Bitcoin's value has surged past $80,000, fueled by investor optimism surrounding potential cryptocurrency ETFs and ongoing discussions about the Clarity Act. This development highlights the growing interest and potential regulatory advancements in the cryptocurrency market, which could further influence its adoption and integration into mainstream financial systems.
bitcoin Crypto ETF
May 07, 2026 · 6 clips · 4 podcasts
Best Podcast Episodes on Bitcoin's $80K Surge
Bitcoin has surged past the $80,000 mark, igniting excitement among investors and analysts who see it as a potential signal for the next major crypto bull run. This rally is accompanied by growing institutional adoption, with BlackRock's European Bitcoin ETP crossing $1.1 billion in assets under management. Podcasts are dissecting market metrics, discussing the impact on altcoins, and exploring the future of institutional engagement in the crypto space.
bitcoin Crypto Market Structure Legislation
Apr 28, 2026 · 9 clips · 5 podcasts