← All Tags

#cybersecurity

13 episodes

#1318: The Analog Hole: Why Your Screen is a Security Leak

Your firewall can’t stop a smartphone camera. Discover why the "analog hole" is the ultimate blind spot in modern enterprise security.

cybersecurityremote-workai-watermarking

#1317: The First Second: Why Your PC Still Needs a BIOS

Explore the high-stakes drama of the BIOS, the "Root of Trust" that teaches your computer how to be a computer every time you hit the power button.

architecturehardware-engineeringcybersecurity

#1280: Laptop Farms: North Korea’s Invisible Hardware Backdoor

Discover how North Korean operatives use "laptop farms" and IP-KVM hardware to bypass security and infiltrate the US workforce.

cybersecurityespionagesupply-chain-security

#1230: The Silent Breach: Why Your Data is Never Truly Safe

By the time you get a breach notification, the damage is already done. Discover the hidden reality of the "silent breach" and API security.

cybersecuritydata-security2026

#1229: Beyond the .env File: Mastering Secrets Management

Stop relying on "security by pinky-promise." Learn how to move from messy .env files to professional zero-trust secrets management.

software-developmentcybersecuritydata-security

#1165: Unit 8200: The $160B Secret Behind the Startup Nation

Explore how an elite Israeli intelligence unit became a $160B startup engine and the ethical friction behind its global tech dominance.

signals-intelligenceisraeli-economycybersecurity

#994: The Sideloading Tax: Navigating Android Security

Stop letting Google gaslight you. Learn how to safely install apps outside the Play Store while keeping your data secure from poisoned packages.

securitycybersecuritydigital-privacyandroidsideloading

#968: Breaking the Air Gap: The Truth About Industrial Cyber War

Beyond the "hacker in a hoodie" myth, we explore how state actors breach air-gapped systems to sabotage critical physical infrastructure.

industrial-automationcybersecuritynational-securitylegacy-systemssupply-chain-security

#928: Beyond the Veto: The Future of the Abraham Accords

Is the Arab world replacing Europe as Israel's top trade partner? We dive into the shifting geopolitics of the Abraham Accords in 2026.

geopoliticscybersecurityregional-defense

#537: The Architecture of Secrecy: From State Secrets to Zero Trust

Is there a master list of state secrets? Explore the evolution of government classification and its impact on modern digital security.

national-securitycybersecuritymilitary-strategydata-securityzero-trust

#168: Digital Vaults: The Mainstream Rise of Air-Gapped AI

Discover why air-gapping is going mainstream in 2026 and how organizations are securing local AI models using "digital vaults."

air-gappingai-securitycybersecuritydigital-vaultslocal-llms

#140: Shadow Webs: The Secret Military Internet Explained

Herman and Corn explore the "shadow internet," revealing how military networks use air gaps, dark fiber, and data diodes to stay secure.

shadow-internetmilitary-networkssiprnetdark-fibercybersecurity

#49: AI Cyberattacks Are Doubling Every 6 Months—Here's Why

AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.

ai-cyberattackscybersecuritythreat-actorsanthropicai-espionage