Omslagafbeelding van de show THREATCON1

THREATCON1

Podcast door VulnCheck

Engels

Technologie en Wetenschap

Tijdelijke aanbieding

2 maanden voor € 1

Daarna € 9,99 / maandElk moment opzegbaar.

  • 20 uur luisterboeken / maand
  • Podcasts die je alleen op Podimo hoort
  • Gratis podcasts
Begin hier

Over THREATCON1

THREATCON1 is the place to go for insights on emerging cyber threats. Hosted by VulnCheck’s Security Researcher Patrick Garrity, and Chief Marketing Officer Tom Bain, THREATCON1 will give listeners critical cyber insights through discussions with top cybersecurity practitioners and leaders in the industry that drive innovation and thought leadership. Patrick and Tom will dive into emerging news stories and cyber threats, and trends that are materially shaping the industry with sharp analysis and fresh perspectives that matter related to national security and economic viability.

Alle afleveringen

17 afleveringen

aflevering Episode 17: How Cyber Threat Hunters Think | Joe Slowik of Dataminr on Threat Intel, Detection Engineering & Cyber Warfare artwork

Episode 17: How Cyber Threat Hunters Think | Joe Slowik of Dataminr on Threat Intel, Detection Engineering & Cyber Warfare

Recorded live at the RSA Conference, this episode of the THREATCON1 Podcast features a deep-dive conversation with Joe Slowik — one of the cybersecurity industry’s leading voices in cyber threat intelligence, detection engineering, and adversary operations. Hosted by Patrick Garrity and Kimber Duke from VulnCheck, the discussion explores how modern threat actors operate, why most organizations still struggle with cybersecurity fundamentals, and how defenders can build stronger, intelligence-driven security programs. ABOUT OUR GUEST: Before joining Dataminr, Joe held cybersecurity and threat intelligence roles across government and industry, including work with Dragos, Gigamon, Huntress, and MITRE. His background spans Navy cyber warfare operations, incident response, threat hunting, intrusion analysis, and large-scale detection engineering. In this episode, the conversation covers: * How cyber threat intelligence actually supports real security outcomes * Why detection engineering is becoming essential for modern security teams * The mindset defenders need to think like attackers * Lessons from the Black Basta ransomware chat leaks * Threat hunting methodologies and operational security practices * VPN abuse, proxy infrastructure, and telecom compromise risks * Why healthcare and manufacturing continue to be high-risk targets * How attackers prioritize targets using sales and marketing-style tactics * The future of cybersecurity talent, hacker culture, and defensive operations * Why strong cybersecurity still comes down to fundamentals and operational discipline Whether you work in a SOC, lead a security team, build detection content, hunt threats, or simply want to better understand how modern cyber adversaries operate, this episode delivers practical insights from leaders working on the front lines of cybersecurity. Dataminr uses AI and real-time event discovery to help organizations detect emerging risks, cyber threats, geopolitical events, and breaking incidents faster — enabling security teams to respond before threats escalate. VulnCheck provides exploit and vulnerability intelligence designed to help organizations prioritize real-world threats, understand exploitation activity, and stay ahead of emerging vulnerabilities before attackers weaponize them.

19 mei 2026 - 35 min
aflevering Episode 16: From ‘Hackers Are Criminals’ to Industry Leaders — What Changed? | Casey Ellis of Bugcrowd artwork

Episode 16: From ‘Hackers Are Criminals’ to Industry Leaders — What Changed? | Casey Ellis of Bugcrowd

Recorded live at the RSA Conference, this episode of THREATCON1 features a deep dive into the evolving world of cybersecurity with Casey Ellis, Founder of Bugcrowd. Joined by Patrick Garrity (Security Researcher) and Kimber Duke (Director of Product at VulnCheck), the conversation explores how the industry is changing—and why many of the core problems remain the same. From the rise of AI-powered capabilities to the growing importance of vulnerability disclosure programs, this episode unpacks the tension between speed, innovation, and security. 🔍 What You’ll Learn - Why cybersecurity today feels “faster, louder, and more chaotic” - How AI is expanding both opportunity and risk in hacking - The evolution of bug bounty programs and ethical hacking - Why most software is built without security as a priority - The reality of vulnerability disclosure—and why it’s still broken - The importance of empathy between researchers and organizations - How community plays a critical role in modern security - The legal risks hackers face—and how initiatives like the Security Research Legal Defense Fund are changing that ⚡ Key Insights - “We’re solving the same problems—just faster and louder.” - Security often comes second to shipping products quickly - Ethical hackers are now gaining a seat at the leadership table - Clear vulnerability disclosure processes can prevent real-world damage - The future of cybersecurity depends on collaboration, not silos 👤 About the Guest Casey Ellis is the Founder of Bugcrowd, a pioneer in crowdsourced cybersecurity and bug bounty programs. With over a decade of experience shaping how organizations work with ethical hackers, Casey has played a key role in advancing vulnerability disclosure practices globally. 🔗 Resources & Projects Mentioned Disclose.io — Improving vulnerability disclosure standards https://disclose.io Security Research Legal Defense Fund — Supporting ethical hackers facing legal challenges https://srldf.org 🎙️ About THREATCON1 THREATCON1 brings together leading voices in cybersecurity to explore the biggest challenges, ideas, and innovations shaping the industry today. https://threatcon1.org

5 mei 2026 - 41 min
aflevering Episode 15: Most Enterprise Software Is Already Exploitable (And No One Knows It) | Joe Silva, CEO of Spektion artwork

Episode 15: Most Enterprise Software Is Already Exploitable (And No One Knows It) | Joe Silva, CEO of Spektion

In this live episode recorded at RSA Conference, the THREATCON1 team sits down with Joe Silva, Founder & CEO of Spektion, for a deep dive into the evolving reality of enterprise cybersecurity in the age of AI and explosive software complexity. Joe shares his unique journey from military intelligence and government service, through roles at iSight Partners, Symantec, TransUnion, and JLL as CISO, to now building a cybersecurity startup focused on redefining how organizations understand and manage exploitability. At the core of the conversation is a shift away from traditional vulnerability management and CVE-driven thinking toward runtime, behavior-based visibility. Joe explains how modern environments are increasingly filled with custom-built tools, AI-generated code, and rapidly evolving software that often falls outside traditional security models. Key topics covered include: - Why CVE-based vulnerability management is no longer enough - How runtime telemetry reveals true exploitability in real time - The growing problem of alert fatigue and the move toward “non-alerting” security models - Why most enterprise environments contain far more custom and unknown software than teams realize - The rise of AI-generated code and its impact on secure development practices - The shift from patching toward mitigation as a primary security strategy - How supply chain attacks are evolving in an AI-accelerated development world - Why memory-based vulnerabilities remain one of the most under-addressed systemic risks The discussion also explores a forward-looking reality: security teams must increasingly operate at machine speed, focusing less on perfect prevention and more on fast detection, prioritisation, and mitigation of real exploitable conditions. A candid, practical, and forward-thinking conversation on what it truly takes to secure modern software ecosystems.

21 apr 2026 - 28 min
aflevering Episode 14: Network Edge Security - The Attack Surface Everyone Underestimates | Saeed Abbasi of Qualys artwork

Episode 14: Network Edge Security - The Attack Surface Everyone Underestimates | Saeed Abbasi of Qualys

Recorded live at RSA Conference in San Francisco, Patrick Garrity and Kimber Duke from VulnCheck sit down with Saeed Abbasi, Senior Manager of Security Research at the Qualys Threat Research Unit, for a deep dive into one of the most overlooked attack surfaces in cybersecurity: network edge devices. From firewalls and VPN gateways to home routers, edge devices sit at the intersection of the internet and corporate networks — making them prime targets for attackers. In this episode, Saeed shares insights from years of vulnerability research across organizations like Trend Micro, Palo Alto Networks, and Qualys, including: • Why network edge devices are frequently targeted by attackers • The challenges organizations face when patching or replacing vulnerable infrastructure • How botnets exploit consumer routers while ransomware actors target enterprise edge devices • Why visibility and asset inventory are critical for security teams • The growing importance of risk-based vulnerability prioritization • How attackers exploit vulnerabilities within days — or even before patches are available The conversation also explores broader trends in vulnerability research, the evolution of exploitation timelines, and what organizations can do today to reduce risk at the edge. If you're responsible for vulnerability management, threat research, or network security, this episode offers valuable insight into how attackers are evolving — and how defenders can keep up. Guests Saeed Abbasi – Senior Manager, Security Research, Qualys Threat Research Unit Hosts Patrick Garrity – VulnCheck Kimber Duke – Director of Product, VulnCheck Recorded live at RSA Conference.

9 apr 2026 - 35 min
aflevering Episode 13: Why Hackers Are Targeting Edge Devices | Ryan Dewhurst of watchTowr artwork

Episode 13: Why Hackers Are Targeting Edge Devices | Ryan Dewhurst of watchTowr

In this episode of the THREATCON1 Podcast, Patrick Garrity is joined by Ryan Dewhurst, Head of Threat Intelligence at WatchTowr, for a deep dive into the rapidly evolving world of vulnerabilities, threat intelligence, and real-world exploitation. Ryan shares the story of his journey through cybersecurity — from creating the widely used Damn Vulnerable Web Application (DVWA) and the WPScan vulnerability database, to building projects like KevIntel, and now leading threat intelligence efforts at WatchTowr. The conversation explores how modern attackers operate, why time-to-exploit is shrinking, and why internet-facing infrastructure like routers, firewalls, VPNs, and edge devices has become a primary target for threat actors. Patrick and Ryan also discuss the growing scale of the vulnerability landscape, the limitations of traditional scoring systems like CVSS, and why organizations must move toward context-driven vulnerability prioritization instead of simply chasing severity scores. Along the way, they examine how threat intelligence teams detect exploitation in the wild using honeypot networks, reverse engineering, and vulnerability research — and what defenders should be paying attention to as the cybersecurity landscape continues to accelerate. If you’re interested in emerging threats, exploited vulnerabilities, and the future of cyber defense, this episode is packed with insights. Topics covered in this episode • Ryan Dewhurst’s path from DVWA and WPScan to WatchTowr • The rise of exploited vulnerability intelligence • Why attackers are increasingly targeting network edge devices • The shrinking time-to-exploit window • Zero-day vs end-day vulnerabilities in real attacks • Detecting exploitation with honeypots and threat telemetry • Why CVSS scores alone aren’t enough • The growing challenge of managing vulnerability volume • What cybersecurity teams should expect in the years ahead 🎧 Subscribe to the THREATCON1 Podcast for more conversations with cybersecurity researchers, threat intelligence leaders, and industry experts exploring the evolving threat landscape.

31 mrt 2026 - 37 min
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Super app. Onthoud waar je bent gebleven en wat je interesses zijn. Heel veel keuze!
Makkelijk in gebruik!
App ziet er mooi uit, navigatie is even wennen maar overzichtelijk.

Kies je abonnement

Meest populair

Tijdelijke aanbieding

Premium

20 uur aan luisterboeken

  • Podcasts die je alleen op Podimo hoort

  • Geen advertenties in Podimo shows

  • Elk moment opzegbaar

2 maanden voor € 1
Daarna € 9,99 / maand

Begin hier

Premium Plus

Onbeperkt luisterboeken

  • Podcasts die je alleen op Podimo hoort

  • Geen advertenties in Podimo shows

  • Elk moment opzegbaar

Probeer 7 dagen gratis
Daarna € 13,99 / maand

Probeer gratis

Alleen bij Podimo

Populaire luisterboeken

Begin hier

2 maanden voor € 1. Daarna € 9,99 / maand. Elk moment opzegbaar.