Best Podcast Episodes About Zero Trust
Everything podcasters are saying about Zero Trust — curated from top podcasts
Updated: Apr 02, 2026 – 39 episodes
Listen to the Playlist
Ridealong has curated the best and most interesting podcasts and clips about Zero Trust.
Top Podcast Clips About Zero Trust
“… sake of transparency, we should have full access to each other's phones and social media accounts, including passwords. He says it's about building trust, and it shouldn't be a problem since we have nothing to hide. But to me, it feels like a pretty big invasion of privacy. He keeps framing my hesitation as a red flag, which is starting to make me second guess myself. Is this a reasonable expectation in a relationship, or is he crossing a line by pushing for this? signed cyber insecure. What comes to your mind whenever I... He must have a trust issue, something happened to him. Or he's up to no …”
“… to the Bobby Bones Show Instagram, and you can see Lunchbox on The Price is Right. It's the anonymous inbox. Anonymous inbox. There's a question to be had. Send it in to the well-being. Hello, Bobby Bones. My boyfriend recently told me that for the sake of transparency, we should have full access to each other's phones and social media accounts, including passwords. He says it's about building trust, and it shouldn't be a problem since we have nothing to hide. But to me, it feels like a pretty big invasion of privacy. He keeps framing my hesitation as a red flag, which is starting to make me second guess myself. Is this a reasonable expectation in a relationship, or is he crossing a line by pushing for this? signed cyber insecure. What comes to your mind whenever I... He must have a trust issue, something happened to him. Or he's up to no good. Oh. But it would be shared acts that like he would get hers and she would get his. I hear you. He's probably good at hiding it. Anybody that's accusing somebody of cheating, usually they got a little something going on. Like if somebody starts accusing you of cheating out of nowhere, it's because they got something going on. If you haven't …”
View more
Ridealong summary
In this segment, the hosts hilariously dissect a listener's dilemma about sharing passwords in a relationship. They suggest that if your partner is demanding transparency, it might be a sign that they have something to hide, leading to some comical insights on trust and insecurity.
“… my daughter and her friends, they go to like coffee shops and artisanal places where they know the barista and they know the ingredients and they trust the chef they don't want to go to a franchise they anything with a big brand or franchise they don't use anymore they don't use like tiktok and stuff like that anymore because they don't trust it they're going to local things and software has to show up for them right the big branded software thing is they know it's using them and they don't want that anymore they're just like shedding it off let's so i think you're going to see a whole new …”
“is we start rejecting these corporations and giant platforms that are using us like cattle and saying no. And I see that like my daughter and her friends, they go to like coffee shops and artisanal places where they know the barista and they know the ingredients and they trust the chef they don't want to go to a franchise they anything with a big brand or franchise they don't use anymore they don't use like tiktok and stuff like that anymore because they don't trust it they're going to local things and software has to show up for them right the big branded software thing is they know it's using them and they don't want that anymore they're just like shedding it off let's so i think you're going to see a whole new tech i personally think a new tech ecosystem will evolve around trust that's more local and it's going to be a huge nightmare um for anyone who's not who's not being stupid and not being taken advantage of”
View more
Ridealong summary
A new tech ecosystem focused on trust is emerging as people, especially younger generations, reject big brands and corporate platforms. They prefer local coffee shops and artisanal products where they know the people behind them. This shift signals a potential nightmare for companies that fail to adapt to this demand for authenticity and transparency.
“… cycle now is the AI hype cycle. And I think there's going to be a lot of organizations in the very near future, call it next 12 to 18 months, Dr. Zero Trust prediction here, are going to be very disappointed in a lot of the things they bought that didn't deliver on that the way that they were expecting. So we'll do one downbeat before we go back.”
“… have an answer for me. Your ability to get through this conversation with a modicum of dignity is really what sets you apart, why you should be here. It genuinely concerns me for the future state of security across the U.S. and globally, that the hype cycle now is the AI hype cycle. And I think there's going to be a lot of organizations in the very near future, call it next 12 to 18 months, Dr. Zero Trust prediction here, are going to be very disappointed in a lot of the things they bought that didn't deliver on that the way that they were expecting. So we'll do one downbeat before we go back.”
View more
Ridealong summary
In the next 12 to 18 months, many organizations may find themselves disillusioned by the AI solutions they invested in, as the hype surrounding these technologies may not deliver the promised results. This concern arises from a recent discussion at RSA 2023, where industry experts emphasized the need to return to cybersecurity basics rather than getting swept up in flashy AI marketing. The reality is that while AI is being hailed as revolutionary, it often fails to address fundamental security needs effectively.
“… It is like this market has roughly agreed you might need this thing. So there's that. I think the. Ah, OK. I'm going to part of this. They're like trust. If you remember the trust centers, they're the security status pages. Oh, sure. Trust dot blah, blah, blah. Trust dot Vanta dot com. Trust. I didn't know they're called trust centers. It's just like a status page. Yeah. But like they're a security posture. So you get the green bars or green traffic lights or yellow traffic lights, but it's for your controls. I see. But they always say the same thing. A status page is red, amber, green. …”
“… And so it's something that has the most market traction so far. But again, none of these are – None of these are like breakout. None of them have product market fit. And none of them are regulatory. Like they're all. Correct. You opt into. Exactly. It is like this market has roughly agreed you might need this thing. So there's that. I think the. Ah, OK. I'm going to part of this. They're like trust. If you remember the trust centers, they're the security status pages. Oh, sure. Trust dot blah, blah, blah. Trust dot Vanta dot com. Trust. I didn't know they're called trust centers. It's just like a status page. Yeah. But like they're a security posture. So you get the green bars or green traffic lights or yellow traffic lights, but it's for your controls. I see. But they always say the same thing. A status page is red, amber, green. Hopefully, the trust center always says, we're a real compliant boss. Yeah, yeah, exactly. So there's a version of that. And so if nothing else, what they actually are, they're ticket deflection for the GRC team. I see. Because when your sales team sends them out and you're like, doesn't it look good? And then if you have any questions, you know, here you …”
View more
Ridealong summary
Trust centers are transforming how companies demonstrate compliance, acting as status pages that showcase security posture with clear indicators. They serve as ticket deflection tools for sales teams, providing clients with reassurance and information upfront, which can streamline the sales process. As compliance standards evolve, particularly in AI, understanding these tools becomes crucial for businesses navigating outbound selling in a crowded market.
“the currency of trust. And I follow the principle of trust all the way from way back in the time when they were bartering all the way till they used chocolate, cacao beans, and then gold, silver, et cetera, et cetera, all the way through to where we are today. It's all based on that same principle of integrity, of trust, of can I trust that the product you're giving me is of the value that I'm handing you? Can I trust that the gold that you're giving me hasn't been …”
“the currency of trust. And I follow the principle of trust all the way from way back in the time when they were bartering all the way till they used chocolate, cacao beans, and then gold, silver, et cetera, et cetera, all the way through to where we are today. It's all based on that same principle of integrity, of trust, of can I trust that the product you're giving me is of the value that I'm handing you? Can I trust that the gold that you're giving me hasn't been fabricated? So really, it's trust that builds fortunes, that builds wealth. And we're living in a digital age that if we can build it correctly, we can create literally infinite wealth for everyone. So that's a string that I want to pull. I'm going to hit you with this comment, and then I want to pull that string a little more. I have found in like …”
View more
Ridealong summary
Trust is the foundation of wealth, evolving from bartering to digital currencies like Bitcoin. As we advance into a digital era, technologies like blockchain promise greater transparency and fairness in transactions. However, the slow adoption of these innovations raises questions about whether some prefer the current system's obscurity over true trust and integrity.
“superpower before we jump in. Trust is one of the eight. And it's called, technically, I call it start with trust. And if you were to ask me, thank you for clarifying. Yeah. Sometimes I take my own work for granted. I shouldn't. It is one of the eight. So letting go is one. Starting with trust is another. And if, however, you were to ask me, is there one that plays an outsized role? They're all important. They're all helpful. They all stand on their own. No question that trust, …”
“superpower before we jump in. Trust is one of the eight. And it's called, technically, I call it start with trust. And if you were to ask me, thank you for clarifying. Yeah. Sometimes I take my own work for granted. I shouldn't. It is one of the eight. So letting go is one. Starting with trust is another. And if, however, you were to ask me, is there one that plays an outsized role? They're all important. They're all helpful. They all stand on their own. No question that trust, it is the one. If I had to pick one of the eight where to start, because when you think about it, everything, everything, everything, everything in times of change, uncertainty and unknown, everything comes down to trust. Now, it's not the same, necessarily the same manifestation of trust, right? Sometimes you need to trust someone else. Sometimes …”
View more
Ridealong summary
Trust is the foundational superpower you need to navigate change and uncertainty, according to futurist April Rinne. She emphasizes that both cognitive trust—believing others will fulfill their commitments—and emotional trust—feeling that others care—are crucial for success. In times of disruption, it's the emotional trust that ultimately carries organizations through challenges.
“… then they lateral movement, lateral movement in the network. We were talking the other day about a hack that somebody had set up, you know, like 90% zero trust, but there was a security camera that had just enough RAM and just enough processor to run an encryption routine, a malware routine. So they used that. That was the one thing that wasn't protected. Yeah. It seems like, though, if you really implement true zero trust, that would be easier in the long run. The hard thing is the social thing is explaining to your users that you super glued their USB ports. It's not easy. Yeah. Or that, you know, …”
“… not the default. It's not easy. As I said, the easiest thing to do is to get a switch and plug everybody in. You need to segment. You need to think in terms of departmental level access. But what we always see is the bad guys get in somewhere and then they lateral movement, lateral movement in the network. We were talking the other day about a hack that somebody had set up, you know, like 90% zero trust, but there was a security camera that had just enough RAM and just enough processor to run an encryption routine, a malware routine. So they used that. That was the one thing that wasn't protected. Yeah. It seems like, though, if you really implement true zero trust, that would be easier in the long run. The hard thing is the social thing is explaining to your users that you super glued their USB ports. It's not easy. Yeah. Or that, you know, if you want to log in, you have to go. You have to jump through some hoops in order to do. You have to you have to continually internally reauthenticate. Prove that. Oh, God, we hate that, though. Yes. You know, again, it's going to be hated. Google's making me log in again. But that's why, right? That's what you have to do. Right. Now, you worked …”
View more
Ridealong summary
In the evolving landscape of enterprise security, passwordless authentication and biometrics are set to become the norm. This shift is essential for enhancing security while minimizing user frustration, as employees will need to continuously re-authenticate to prove their identity. The integration of AI further complicates this, but it promises a more secure and user-friendly experience.
“… or AI or adaptive access, all of these things are reshaping what's possible. Can you talk to me about how these innovations are changing the zero trust playbook? Yeah, I think so previously how everyone looked at security was more so a static access. So, for example, you log on to your VPN, it authenticates you, and then you have full range of access to any internal application. But now with the zero cross and with the evolving security landscape, that's not good enough. So as organizations have different types of employees, right, they're accessing different applications, whether that be …”
“Whether it's automation or AI or adaptive access, all of these things are reshaping what's possible. Can you talk to me about how these innovations are changing the zero trust playbook? Yeah, I think so previously how everyone looked at security was more so a static access. So, for example, you log on to your VPN, it authenticates you, and then you have full range of access to any internal application. But now with the zero cross and with the evolving security landscape, that's not good enough. So as organizations have different types of employees, right, they're accessing different applications, whether that be SaaS, whether that be IaaS, whether that be on-premise applications, you want to make sure that you are dynamically changing your access based off of where you are, what type of user you are, and what type of access you should have. So for example, when an organization typically has like different types of employees, so like let's say that we have a …”
View more
Ridealong summary
Dynamic access is reshaping security by tailoring user permissions based on their identity and device. For instance, an employee accessing Google Drive from a personal device can only view documents, while using a company laptop allows full download capabilities. This evolution in security recognizes that static access is no longer sufficient in today's diverse work environments.
“… one. And then comes the other steps of actually protecting it or controlling the access, controlling the tools and all. Yeah, I mean, it used to be zero days were like the thing, right? Everybody was freaked out about a zero day, whatever, even though not necessarily all zero days are the same. But now, like to me, zero hour is kind of the most interesting, terrifying thing is like when someone creates an agent or does whatever the hell they do. What do they do? Yeah. And how fast can you figure that out? And we have seen some very, very interesting use cases come. We are working with a couple …”
“… ecosystem, right? It's about these agents, these MCP servers, these skills, these tools, these resources, this access, this user identity. Unless we know that, there's nothing we can really do to protect anything. So I think that's definitely step one. And then comes the other steps of actually protecting it or controlling the access, controlling the tools and all. Yeah, I mean, it used to be zero days were like the thing, right? Everybody was freaked out about a zero day, whatever, even though not necessarily all zero days are the same. But now, like to me, zero hour is kind of the most interesting, terrifying thing is like when someone creates an agent or does whatever the hell they do. What do they do? Yeah. And how fast can you figure that out? And we have seen some very, very interesting use cases come. We are working with a couple of very good financial institutions. And this is a very interesting case that came out where they've built this whole MCP application. If you think about it, we've put Zscaler and all of these products to protect zero trust, to apply zero trust, and to control who can access what applications based on their role and all of that. Now, all of a …”
View more
Ridealong summary
AI agents can bypass traditional security measures, creating dangerous gaps in network protection. A financial institution discovered that their zero trust controls failed when an AI agent accessed the internet directly, highlighting the need for updated security strategies. As AI evolves, organizations must rethink how they secure their systems against these emerging threats.
“I did it in this customer-provided HSM mode. That allowed me to add DigiCert's certificate into my new HSMs alongside the newly minted IDEN Trust certificate. It all worked perfectly. Now I have HSMs containing both the existing expiring in November DigiCert code signing certificate and the new identrust code signing cert, which goes for three years. So, okay, believe it or not, I haven't forgotten about David. He started me off on all this by asking about the possibility of coders sidestepping all this nonsense by using self-signed certificates. Now, the use of self-signed certificates …”
“I did it in this customer-provided HSM mode. That allowed me to add DigiCert's certificate into my new HSMs alongside the newly minted IDEN Trust certificate. It all worked perfectly. Now I have HSMs containing both the existing expiring in November DigiCert code signing certificate and the new identrust code signing cert, which goes for three years. So, okay, believe it or not, I haven't forgotten about David. He started me off on all this by asking about the possibility of coders sidestepping all this nonsense by using self-signed certificates. Now, the use of self-signed certificates has been common practice for web developers for many years. I have a self-signed certificate for local host sitting in the trusted root stores of my various workstations. I run a web server on those machines which uses that certificate. And I use it for local web development. Having a self certificate for local host allows me to use HTTPS URLs …”
View more
Ridealong summary
Self-signed certificates might seem like a shortcut for code signing, but they create significant trust issues. While they work for local development, they require manual installation on users' machines, making them impractical for widespread software distribution. This highlights the essential role of Certificate Authorities in ensuring universally trusted code signatures.
“… for hosting a Bitwarden vault. I personally, I'm not going to do that because I think that their security is a lot better than mine. That's why I trust Bitwarden, the leader in passwords, passkeys and secret management, consistently ranked number one in user satisfaction, not by me, but by G2, software reviews, 10 million users, love Bitwarden, 180 countries, more than 50,000 businesses. And whether you're protecting just one account, your own or thousands for your business, Bitwarden keeps you secure all year long with consistent updates. The new Bitwarden access intelligence will let …”
“… In fact, Bitwarden does let you host the vault yourself if you want, if that's something you desire. I'll talk about something they've just added, which is really cool for this purpose. But there are, there are even third-party open source solutions for hosting a Bitwarden vault. I personally, I'm not going to do that because I think that their security is a lot better than mine. That's why I trust Bitwarden, the leader in passwords, passkeys and secret management, consistently ranked number one in user satisfaction, not by me, but by G2, software reviews, 10 million users, love Bitwarden, 180 countries, more than 50,000 businesses. And whether you're protecting just one account, your own or thousands for your business, Bitwarden keeps you secure all year long with consistent updates. The new Bitwarden access intelligence will let organizations detect weak and reuse and expose credentials. Now, this is legitimately a real problem. We're talking about the, the, the threat is coming from inside the house. This is it. Your users are using the same password over and over again, frequently, or they're using a weak password. Bitwarden access intelligence will detect that or a password …”
View more
Ridealong summary
Recent research from ETH Zurich reveals that password managers like Bitwarden are now more secure than ever, thanks to extensive audits and open-source transparency. This analysis shows that even if cloud infrastructure is compromised, these tools have implemented measures to protect user data. As a result, users can feel more confident in their security than they did just a month ago.
“… the world's largest cloud security platform. And when you talk about least privilege and you talk about AI, you're talking about Zscaler. They use zero trust to protect you as you use AI, and it protects you against bad guys you're using AI. The potential rewards of AI in your business, obviously, nowadays, too great to ignore. But so are the risks, and the risks external and internal, like the loss of sensitive data, attacks against enterprise-managed AI. And of course, generative AI increases opportunities for threat actors, helping them to rapidly create phishing lures, to write malicious code, …”
“… I think we should kick off with one, if you'll pardon the choice of words. And then we'll take a look at our picture of the week. You got it. Coming up in just a bit, you're watching Security Now, our show today brought to you by Zscaler. Zscaler, the world's largest cloud security platform. And when you talk about least privilege and you talk about AI, you're talking about Zscaler. They use zero trust to protect you as you use AI, and it protects you against bad guys you're using AI. The potential rewards of AI in your business, obviously, nowadays, too great to ignore. But so are the risks, and the risks external and internal, like the loss of sensitive data, attacks against enterprise-managed AI. And of course, generative AI increases opportunities for threat actors, helping them to rapidly create phishing lures, to write malicious code, to automate data extraction. There were 1.3 million instances of social security numbers leaked through the legitimate use of AI applications. It's hard to stop in your business. ChatGPT and Microsoft Copilot saw nearly 3.2 million data violations last year. It's time to rethink your organization's safe use of public and private AI. But you can do …”
View more
Ridealong summary
The Irish Data Protection Commission is owed over 4 billion euros in fines that remain uncollected due to appeals and legal challenges. Despite imposing significant penalties on major tech companies, only a small fraction has been paid, raising questions about the effectiveness of such fines as deterrents. This situation highlights the gap between levying fines and actually collecting them, as companies delay payments through appeals.
“… he said, I'd love to catch up. For some reason, I did it. We ended up kind of getting into something again. But I told him like I don know if I can trust you again all this stuff We ended up seeing each other for about three months And then I realized if I was going to do this again which I didn want to tell him any of my friends I was doing it because this is my pattern. I go back to men. So I kind of kept that away from them. And I was trying to figure it out on my own. I was like, I'm only going to do this if it seems like he's grown up a bit in terms of like, just being ready for something. …”
“… after that? No, we went on our way. And this was three years ago again. So over the past three years, we hung out or we got together randomly once. We went on a drive. We did nothing. We just caught up. And then about last summer, he texted me and he said, I'd love to catch up. For some reason, I did it. We ended up kind of getting into something again. But I told him like I don know if I can trust you again all this stuff We ended up seeing each other for about three months And then I realized if I was going to do this again which I didn want to tell him any of my friends I was doing it because this is my pattern. I go back to men. So I kind of kept that away from them. And I was trying to figure it out on my own. I was like, I'm only going to do this if it seems like he's grown up a bit in terms of like, just being ready for something. And it kind of seemed like it did. He was like progressing things. He was giving me reassurance. He was telling me about what he wants in the future. And then a situation happened and I realized, okay, this is never, he's never going to be the person I want. So I ended things with him. I can get into that if you want, but I sent you some texts and …”
View more
Ridealong summary
In a revealing story, a woman shares her experience with a man who lied about his age, claiming to be 27 when he was actually 10 years older. Despite a strong connection, the deception led to trust issues and ultimately the end of their relationship, highlighting how dishonesty can complicate romantic dynamics. This segment explores the complexities of dating and the importance of transparency in relationships.
Ridealong summary
In a desperate attempt to escape reality, Sarma believed in a fantastical promise of immortality for her dog, influenced by a manipulative figure. As her financial situation spiraled, she clung to these illusions, leading to the destruction of her business and the harm of others. This story reveals the depths of cognitive dissonance and the painful consequences of manipulation.
“… investment things And so when I went to graduate when I came to New York I actually was working for a company that was then called Bankers Trust Company. And we were in several locations in the city, but I was in the index fund group. So think about the period in 1986 toward 1989, which is when I was there. explosive activity in the number of pension funds who were thinking about, hey, maybe I can, you know, put some lower cost index fund passive investment strategies in our portfolio at a lower cost rather than paying high cost active management fees. So that's kind of where I cut my …”
“… to a lot of different investment professionals having been around that CFA Institute early in my, you know, when I was in junior high and high school and those college formative years And so I had a pretty good idea that I wanted to be doing investment investment things And so when I went to graduate when I came to New York I actually was working for a company that was then called Bankers Trust Company. And we were in several locations in the city, but I was in the index fund group. So think about the period in 1986 toward 1989, which is when I was there. explosive activity in the number of pension funds who were thinking about, hey, maybe I can, you know, put some lower cost index fund passive investment strategies in our portfolio at a lower cost rather than paying high cost active management fees. So that's kind of where I cut my teeth. And it's been a great career. I've seen a lot of things over almost four decades of experience now in these markets. Oh, yeah. I'm sure you have a plethora of knowledge. And I'm curious what your point of view is or take of or perspective, I should say, on how the markets have changed, especially as they become digitized on the internet and …”
View more
Ridealong summary
Blockchain technology is drastically lowering asset management costs, benefiting capital owners with higher returns. This shift is redefining the relationship between those who have capital and those who seek it, eliminating unnecessary intermediaries. As the industry evolves, the efficiency gained from distributed ledger technology is reshaping the financial landscape.
“So with that being said, trust and things like data leakage and all the other challenges that we have, what does it take for AI to deliver meaningful, reliable value inside a complex enterprise? Yeah, I think there are two aspects to your question. So first of all, if you look at the context engine, as I said, it really builds a deep map of the organization, understanding relationships and correlating things across system, which means that it has access and got to have …”
“So with that being said, trust and things like data leakage and all the other challenges that we have, what does it take for AI to deliver meaningful, reliable value inside a complex enterprise? Yeah, I think there are two aspects to your question. So first of all, if you look at the context engine, as I said, it really builds a deep map of the organization, understanding relationships and correlating things across system, which means that it has access and got to have access to many of the most precious sources of information inside organization. And typically for our customers, that would mean that they would like the context engine to run inside their perimeter. So it means behind their firewall or even completely air-gapped, because this is now becoming really a map of the organization or containing very precious …”
View more
Ridealong summary
For enterprises to trust AI agents, they must ensure these systems possess deep organizational knowledge, akin to a senior engineer's expertise. This requires a context engine that operates within the company's secure perimeter, safeguarding sensitive information while enabling agents to make informed decisions. Without this trust, the risk of data leakage and operational failures rises significantly.
“… before its public disclosure, beginning January 26, 2026. This wasn't, they write, this wasn't just another vulnerability exploit. Interlock had a zero day in their hands, giving them a five-week head start to compromise organizations before defenders even knew to look. Upon making this discovery, we shared our findings with Cisco to help support their investigation and protect customers. Okay, so just so that everyone is clear about the timing of this again, Amazon discovered exploitation of this zero day dating back as far as January 26th, and Cisco's announcement and patch wasn't made …”
“Our research found that Interlock was exploiting this vulnerability 36 days before its public disclosure, beginning January 26, 2026. This wasn't, they write, this wasn't just another vulnerability exploit. Interlock had a zero day in their hands, giving them a five-week head start to compromise organizations before defenders even knew to look. Upon making this discovery, we shared our findings with Cisco to help support their investigation and protect customers. Okay, so just so that everyone is clear about the timing of this again, Amazon discovered exploitation of this zero day dating back as far as January 26th, and Cisco's announcement and patch wasn't made available until March 4th. So for at least 36 days or a little more than five weeks. Only the bad guys knew of this and even fully patched and up-to-date Cisco secure firewalls and the enterprises behind them were being compromised and falling victim to this interlocked ransomware and campaign through no fault of theirs. They were fully patched and …”
View more
Ridealong summary
Interlock exploited a Cisco zero-day vulnerability for 36 days before it was publicly disclosed, allowing them to compromise organizations without detection. Amazon's security team discovered this exploit through a misconfigured server used by Interlock, revealing their entire operational toolkit. This incident highlights the critical risks of unaddressed vulnerabilities in widely used security systems.
“… organizations doubting their cybersecurity vendors, how can they tackle this? That's the crux of it. It's not just about tech solutions. It's about trust. Transparency is essential for organizations. Without it, collaboration becomes challenging. So, it's like when we plan our blended family game nights. If the kids don't trust each other, it turns into chaos on the court. Right. That's why CEO discussions on AI and cybersecurity are vital. They want to redefine security protocols for today's threats. That's cool, but also concerning. We need to be proactive, right? Absolutely. It's about …”
“… Seriously? So it impacts the everyday business owner, too? Exactly. Think about preparing for a family vacation. If you don't keep your passports and tickets secure, you might end up stuck at the airport. Cyber risks are similar. Yikes! With 95% of organizations doubting their cybersecurity vendors, how can they tackle this? That's the crux of it. It's not just about tech solutions. It's about trust. Transparency is essential for organizations. Without it, collaboration becomes challenging. So, it's like when we plan our blended family game nights. If the kids don't trust each other, it turns into chaos on the court. Right. That's why CEO discussions on AI and cybersecurity are vital. They want to redefine security protocols for today's threats. That's cool, but also concerning. We need to be proactive, right? Absolutely. It's about innovation and strengthening defenses. Continuous evolution is key to combat these threats. So we're basically on a tightrope walk with our digital lives every day. What's the takeaway? Make sure to prioritize trust. Build transparent relationships with your vendors to safeguard against cyber threats. Got it. Speaking of keeping things secure, let's …”
View more
Ridealong summary
With 95% of organizations doubting their cybersecurity vendors, trust and transparency are crucial for safeguarding against cyber threats. Just like securing your family's vacation plans, businesses must prioritize building strong relationships with their vendors to navigate the chaos of digital risks. In today's landscape, proactive measures and continuous evolution are essential to protect critical infrastructure and operational resilience.
“… pro level price tag. SpaceMail from spaceship.com. And by the way, take advantage of it. I did, the 30-day free trial means you can start today at zero cost. Visit spaceship.com slash twit to see all the exclusive offers and discover why thousands have already made the move. It's my new domain registrar. It's my new everything. I love it. Spaceship.com slash twit. Thank them so much for their support of Intelligent Machines and Secretly British. It's SecretlyBritish.sh, if you want to try it out. .sh. That was Benito's idea. He said, you should look and see if they have .sh. Oh, they did. And …”
“… some of the best prices on domains plus all the add-ins you might need, including VPNs, website builders, hosting, and more. Whether you're building something big or launching your first idea, SpaceMail gives you the pro email address without the pro level price tag. SpaceMail from spaceship.com. And by the way, take advantage of it. I did, the 30-day free trial means you can start today at zero cost. Visit spaceship.com slash twit to see all the exclusive offers and discover why thousands have already made the move. It's my new domain registrar. It's my new everything. I love it. Spaceship.com slash twit. Thank them so much for their support of Intelligent Machines and Secretly British. It's SecretlyBritish.sh, if you want to try it out. .sh. That was Benito's idea. He said, you should look and see if they have .sh. Oh, they did. And .sh is a British colony, so it itself is Secretly British. Hey, that's how you know. Well, in fact- We're gonna be maybe building that in the AI user group. Is that next week in the AI user group? Oh, it's the first Friday. I won't be here, though. I'll be in Florida. You should be the host. Florida? And they can help you. I don't know if I can. …”
View more
Ridealong summary
Understanding the bizarre language of internet culture can be both fascinating and alarming. A recent viral tweet discusses terms like 'jester gooning' and 'SMV chad fishing,' revealing how young men are engaging in extreme behaviors for online validation. This raises concerns about the impact of internet culture on real-life actions and values.
“… March 4th. Yeah. We're the last event of the day. And then there's a nice party afterwards, cocktail party afterwards. So we will see you at Zero Trust World. I hope you are going. And otherwise, we will be back here a week from Tuesday or the next – it's a career now after the next one. So 1068 will be back on Tuesdays. We normally do these Tuesdays right after MacBreak Weekly, which is 1.30 usually, 1.30 Pacific, 4.30 Eastern, 20, 1.30 UTC. Although now that I think about it, 1068 will be on March 11th, which will be after we switch back to daylight saving time. So it will be 20.30 UTC. I …”
“So now I'm thinking we maybe aren't going to be the stars of the show, but we will be doing a presentation, the last event on Tuesday, March – oh, sorry, Wednesday, March 4th. Yeah. We're the last event of the day. And then there's a nice party afterwards, cocktail party afterwards. So we will see you at Zero Trust World. I hope you are going. And otherwise, we will be back here a week from Tuesday or the next – it's a career now after the next one. So 1068 will be back on Tuesdays. We normally do these Tuesdays right after MacBreak Weekly, which is 1.30 usually, 1.30 Pacific, 4.30 Eastern, 20, 1.30 UTC. Although now that I think about it, 1068 will be on March 11th, which will be after we switch back to daylight saving time. So it will be 20.30 UTC. I know. And are we going to increment the podcast number for the Threat Lockers? Oh, maybe it will be 1069. I don't know. Oh, yes. Because we are going to make a podcast out of the presentation Steve is doing at Zero Trust World. So you get to hear it even if you're not at Zero Trust World. I don't think we'll give it a security now number. We'll give …”
View more
Ridealong summary
Join us at Zero Trust World on March 4th for an exciting presentation and a cocktail party afterward! If you can’t make it, don’t worry—our podcast will feature Steve's presentation shortly after, so everyone can benefit from the insights shared at the event.
Top Podcasts About Zero Trust
Security Now (Audio)
6 episodes
The Dan Bongino Show
3 episodes
DrZeroTrust
2 episodes
Threat Vector by Palo Alto Networks
2 episodes
The Megyn Kelly Show
2 episodes
Thinking Crypto News & Interviews
2 episodes
Embracing Digital This Week
2 episodes
The Jesse Kelly Show
2 episodes
