#cybersecurity
13 episodes
#1318: The Analog Hole: Why Your Screen is a Security Leak
Your firewall can’t stop a smartphone camera. Discover why the "analog hole" is the ultimate blind spot in modern enterprise security.
#1317: The First Second: Why Your PC Still Needs a BIOS
Explore the high-stakes drama of the BIOS, the "Root of Trust" that teaches your computer how to be a computer every time you hit the power button.
#1280: Laptop Farms: North Korea’s Invisible Hardware Backdoor
Discover how North Korean operatives use "laptop farms" and IP-KVM hardware to bypass security and infiltrate the US workforce.
#1230: The Silent Breach: Why Your Data is Never Truly Safe
By the time you get a breach notification, the damage is already done. Discover the hidden reality of the "silent breach" and API security.
#1229: Beyond the .env File: Mastering Secrets Management
Stop relying on "security by pinky-promise." Learn how to move from messy .env files to professional zero-trust secrets management.
#1165: Unit 8200: The $160B Secret Behind the Startup Nation
Explore how an elite Israeli intelligence unit became a $160B startup engine and the ethical friction behind its global tech dominance.
#994: The Sideloading Tax: Navigating Android Security
Stop letting Google gaslight you. Learn how to safely install apps outside the Play Store while keeping your data secure from poisoned packages.
#968: Breaking the Air Gap: The Truth About Industrial Cyber War
Beyond the "hacker in a hoodie" myth, we explore how state actors breach air-gapped systems to sabotage critical physical infrastructure.
#928: Beyond the Veto: The Future of the Abraham Accords
Is the Arab world replacing Europe as Israel's top trade partner? We dive into the shifting geopolitics of the Abraham Accords in 2026.
#537: The Architecture of Secrecy: From State Secrets to Zero Trust
Is there a master list of state secrets? Explore the evolution of government classification and its impact on modern digital security.
#168: Digital Vaults: The Mainstream Rise of Air-Gapped AI
Discover why air-gapping is going mainstream in 2026 and how organizations are securing local AI models using "digital vaults."
#140: Shadow Webs: The Secret Military Internet Explained
Herman and Corn explore the "shadow internet," revealing how military networks use air gaps, dark fiber, and data diodes to stay secure.
#49: AI Cyberattacks Are Doubling Every 6 Months—Here's Why
AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.