Episodios

  • Experian’s AI Fraud Report: SIM Swaps, Voice Cloning, and Smarter Countermeasures
    Sep 29 2025

    Experian’s Chief Product Officer for Identity and Fraud in the UK and Ireland, Paul Weathersby, joins me to unpack how criminals are using generative tools to fabricate documents, clone voices, perfect phishing at scale, and stitch together synthetic identities. We dig into the sharp rise in SIM swap attacks, why eSIM provisioning can accelerate takeovers, and how coordinated crews now treat fraud like a business with playbooks and orchestration.

    Paul explains what works on the defensive side right now. Think adaptive, multilayered authentication that reacts to real risk signals, mobile network checks to identify recent SIM changes, behavioral biometrics, enhanced document and liveness detection, and AI that accelerates investigations while reducing false positives and compliance costs. We also look at more innovative data use, graph analytics to expose fraud rings, cross-industry intelligence sharing, and the FCA’s supersized sandbox that helps teams test models at high volume.

    If you care about stopping account takeovers without breaking customer experience, this conversation is a practical blueprint for 2026 and beyond.

    SIM swapping increased by over 1,000%

    How to protect yourself from SIM swapping

    *********

    Visit the Sponsor of Tech Talks Network:

    Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careerist

    https://crst.co/OGCLA

    Más Menos
    29 m
  • Qualys CEO Sumedh Thakar on Moving From SOC to ROC
    Sep 4 2025

    Qualys CEO Sumedh Thakar joins me to unpack what cyber risk management really looks like when budgets are tight, signals are noisy, and AI is changing the game. Sumedh’s journey started in Pune with parents who prized education above everything. He arrived in the US with one hundred dollars, joined Qualys as one of its first software engineers, and two decades later is leading a global platform that helps banks, governments, and enterprises protect their digital infrastructure.

    We dig into why compliance keeps tripping companies up, why the impact of digital crime now dwarfs many physical crimes, and how leaders can talk about cyber in a language boards actually understand. Sumedh explains the shift from counting exposures to quantifying business risk, and why the Security Operations Center is giving way to a Risk Operations Center that prioritizes what truly matters, accepts what must be accepted, and transfers the rest through insurance.

    We also explore the cloud security market’s next phase as AI workloads pour into public and private clouds, why “attack surface” is not the same as “risk surface,” and how to weigh AI opportunity against model and data uncertainty. Sumedh closes with hard-won leadership lessons on time, teams, and defining success, and recommends Marshall Rosenberg’s Nonviolent Communication for anyone who wants to communicate beyond the words and lead with clarity.

    Visit the Sponsor of Tech Talks Network:

    Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careerist

    https://crst.co/OGCLA

    Más Menos
    34 m
  • CyberArk Explains Why Machine Identities Are the New Attack Surface
    Aug 11 2025

    What happens when there are 100 machine identities for every human one in your organisation? This is not a prediction for the future. It is the world we are already operating in, and the implications are profound.

    In this episode of Business of Cybersecurity, I speak with David Higgins, Senior Director at CyberArk, about how AI agents, autonomous systems, and the sheer scale of machine credentials in the enterprise are reshaping identity security. We discuss why password reuse, unsecured personal devices, and skipped updates remain stubbornly common even though awareness training has been around for decades. David explains that the issue is rarely laziness. Instead, it is often a lack of secure and practical alternatives that still fit the way people work.

    We dig into how phishing and social engineering tactics have evolved, with AI enabling deepfake audio and video that can pass casual inspection, and how attackers are increasingly bypassing tech-savvy users entirely by targeting helpdesks and third-party support teams. We also look at the commoditisation of stolen credentials and why buying access on the dark web can now be easier than running a phishing campaign.

    A major theme in our conversation is the role of culture in security. David challenges the outdated idea that humans are always the weakest link, arguing instead for a more collaborative approach that blends security objectives with user experience. We explore strategies like adaptive authentication, behavioural context analysis, and just-in-time privilege models that reduce risk without slowing down legitimate work.

    The discussion then turns to the identity challenges created by agentic AI. These are AI-driven systems that can interpret goals, adapt, and communicate directly with other AI agents and human colleagues. Unlike traditional machine identities, their behaviour changes over time, creating an entirely new category of security risk. David outlines how organisations can begin to secure these identities now, rather than deferring the problem until it becomes unmanageable.

    By the end of this episode, you will have a clear view of why identity-first security is essential in a machine-dominated environment, what practical steps can be taken to close gaps without adding unnecessary friction, and why aligning identity strategy with your organisation’s digital roadmap is no longer optional.

    Más Menos
    34 m
  • How Abnormal AI Detects Threats Before They Hit the Inbox
    Jul 26 2025

    In this episode, I sat down with Mike Britton, CIO at Abnormal AI to explore the increasingly urgent overlap between AI governance and cybersecurity. With AI accelerating faster than regulation, and attackers already using these tools for harm, Mike offers a pragmatic take on what needs to happen next.

    We dig into the realities of regulating AI in a fragmented world, drawing comparisons between Europe’s application-based approach and the US’s patchwork of state-level initiatives. Mike shares why he believes regulation should focus on context and application, not just model size, and why human oversight must stay part of the loop.

    We also cover:

    • How Abnormal uses behavioral AI to catch phishing and email attacks before they hit inboxes
    • Why sandboxes and risk-based regulation can protect innovation without losing control
    • The threat of over-regulation pushing innovation toward regimes with fewer ethical safeguards
    • The challenge of navigating AI vendors at security events, where almost everyone claims AI capabilities
    • The real-world risks of AI bias, misuse, and geopolitical influence in open-source models

    Mike also shares practical guidance for CIOs and CISOs on model validation, audit trails, kill switches, and how to distinguish genuine AI value from marketing spin.

    🧠 One key takeaway: Attackers are already using AI. If security teams don’t fight fire with fire, they’re at risk of falling behind.

    🔗 For more, check out abnormal.ai or connect with Mike on LinkedIn.

    Más Menos
    27 m
  • Clari: Why RevOps Is the Hidden Weapon in Cybersecurity’s AI Arms Race
    Jul 15 2025

    In this episode of The Business of Cybersecurity, I’m joined by John Queally, Senior Director of Revenue Operations at Clari, for a conversation that goes far beyond spreadsheets and pipeline forecasts. We explore why RevOps has become mission-critical for cybersecurity firms facing escalating threats, intense market pressure, and growing expectations around AI.

    John unpacks how cybersecurity leaders from Okta to Fortinet are rethinking the entire revenue engine to fund innovation, reduce friction, and stay ahead of attackers. We discuss the growing gap between AI ambition and data reality, and why 67% of revenue leaders are not trusting their data should be a wake-up call for anyone betting big on automation.

    From real-time prospecting and clean data infrastructure to unified cross-departmental collaboration, this is a masterclass in how operational strategy, not just security tooling, is shaping the future of cyber resilience.

    John also shares what it really takes to unify go-to-market teams, how RevOps is shifting from reactive reporting to proactive insight, and why the most powerful transformation starts with the "unsexy" work of cleaning up your data stack.

    If you’ve ever underestimated the role of RevOps in a tech-driven industry or dismissed data hygiene as someone else’s problem, this conversation will change your mind.

    🎧 Listen in to learn:

    • Why AI can’t fix broken data
    • How cybersecurity firms are aligning ops, sales, and customer success in real time
    • What separates high-growth companies from those stuck debating dashboards

    Visit Clari.com to learn more about the work John and his team are doing, or connect with him directly on LinkedIn.

    Ask ChatGPT

    Más Menos
    29 m
  • From Complexity to Clarity: Cyber Resilience with Cloudflare’s Christian Reilly
    Jul 7 2025

    In this episode of The Business of Cybersecurity, I’m joined by Christian Reilly, Field CTO for EMEA at Cloudflare, to unpack what real-world cyber resilience looks like across industries and what’s holding many organisations back. From legacy systems in healthcare and education to cloud-native agility in gaming and fintech, Christian explains why some sectors are better prepared for modern cyber threats and what the rest can learn from them.

    We explore the power of simplicity in cybersecurity strategy, the shift toward zero trust, and the cultural importance of treating employee training as a relentless, personal mission rather than a compliance checkbox. Christian also shares sharp insights on the growing risks posed by AI and quantum computing, the need for post-quantum cryptography, and how data protection is fast becoming the cornerstone of competitive advantage.

    If your boardroom still treats security as an IT issue or your workforce sees it as a blocker, this conversation will change how you think about cyber preparedness. We discuss Cloudflare’s latest research findings, the future of AI-powered SecOps, and how organisations can move from passive defence to proactive, strategic resilience.

    Listen now to learn how forward-thinking businesses are simplifying their stacks, mobilising end-user education, and building security into the core of their operations rather than bolting it on after the fact.

    Más Menos
    29 m
  • Resilience Over Panic: Rethinking Ransomware with Trevor Dearing of Illumio
    Jun 21 2025

    In this episode of The Business of Cybersecurity, I speak with Trevor Dearing, Director of Critical Infrastructure at Illumio, to unpack some eye-opening truths from their latest ransomware report.

    We explore why more than half of global companies still have to halt operations when ransomware strikes and why so many UK businesses remain reluctant to report incidents. Trevor shares candid insights into what is working, what is not, and why shifting focus from prevention to containment could be the real key to resilience.

    He explains how modern containment tactics like advanced obfuscation and one-click ringfencing can limit damage and keep critical operations running, even when attackers break through. We also discuss why only 13 percent of companies believe their cyber resilience is strong enough and what it will take to close that gap as regulations tighten worldwide.

    If you want a grounded take on how to prepare for the attacks that will inevitably come, rather than just hoping they never do, this conversation is for you.

    Search Tech Talks Network for more episodes that connect cybersecurity and real-world business strategy.

    Más Menos
    23 m
  • Zscaler on Building Cyber Resilience from the Ground Up
    Jun 7 2025

    When I spoke with Mark Lluic, CEO in Residence at Zscaler, on the Business of Cybersecurity podcast, we didn't spend time rehashing the basics. We looked at how leadership thinking must evolve. If your security posture is still built for light rain, what happens when a hurricane hits?

    Mark has spent years helping organizations rethink security from the ground up. Instead of chasing alerts or layering new tools onto outdated systems, he advocates for a proactive, systems-first approach. One that prioritizes architecture and continuity over quick fixes.

    Zero Trust Isn't Just for Remote Work

    Zero Trust started as a security fix for remote access, but that's just one piece of the puzzle. Mark made a sharp observation: many companies still trust users more when they're sitting in the office. That's a dangerous assumption.

    Modern Zero Trust means treating all traffic with the same level of scrutiny, regardless of its origin. Every access request should be evaluated based on its context: who is making the request, what device they're using, what they're trying to do, and whether that behavior fits a known pattern.

    The Problem with the Patch-and-Pray Model

    Security teams often react to new threats by throwing more tools into the mix. Over time, this patchwork creates more problems than it solves. Complexity grows, visibility shrinks, and attackers exploit the gaps.

    Mark pointed to research showing that many teams are overwhelmed by the tools they already have in place. Others are held back by outdated systems or a lack of staff with the right skills. That creates a situation where attackers need to succeed once, while defenders must stop everything every time.

    A Better Way Forward: Resilient by Design

    So, what does a stronger strategy look like? Mark recommends starting with architecture. Build systems that expect disruption. Apply continuous risk assessment. Incorporate business continuity from the start rather than as an afterthought. And don't limit Zero Trust to a single use case. Make it your foundation.

    For leaders looking to take action, Mark laid out some clear first steps:

    Start by reviewing where Trust is currently assumed. Challenge those defaults. Apply the same standards inside your network as you do for external traffic. Think about context every time you evaluate access.

    Ensure that your legacy systems are also included in this effort. But remember, you don't need to replace everything overnight.

    Resilience is about ensuring your organization remains standing, regardless of what challenges it faces. That means planning, testing your response, and building security into your infrastructure not bolting it on later.

    Listen to the full episode to hear why this shift is a leadership decision that defines how your organization faces tomorrow's threats.

    Más Menos
    26 m