
Defending The Edge
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your cyber domain.
For podcast information, please contact: podcast@defendedge.com
Episodes
33 episodes
31. Special Guest Taso Triantafillos and 2025 Trends
On This Episode of the Defending The Edge Podcast with DefendEdge, the team brings on a special guest, DefendEdge CEO, Taso Triantafillos. We discuss the intentions and future of our iDNA platform, his predictions for 2025, the ever-changing st...
•
Season 3
•
Episode 4
•
28:29

30. Hackwaves & Backdoors
On This Episode of the Defending The Edge Podcast with DefendEdge, the team discusses how Subaru Starlink Vehicles have lost control, how hackers are hacking hackers, new AI advancements from both the US and China, and lastly, how the victim co...
•
30:53

29. Bans and Bad Actors
Join us on Episode 29, or Season 3 Episode 2 of the Defending The Edge Podcast with DefendEdge, Bans and Bad Actors, as the team dives into recent events surrounding Chinese government hackers known as Salt Typhoon and the latest in policy upda...
•
Season 3
•
Episode 2
•
35:21

28. New Year New Threats
On the first episode of Season Three of the Defending The Edge Podcast with DefendEdge, the team is welcomed by Krysten Barragan, a threat landscape analyst, as they talk about recent attacks and some new threat actors emerging on the scene. As...
•
Season 3
•
Episode 1
•
24:15

27. Retired Brig. General Blaine Holt & 2024 Recap
In this episode, we pick the mind of our special guest, Retired Brigadier General Blaine Holt, and his opinion of the ever-changing cyber threat landscape. From experiences made to books, then turned into TV shows, we talk about what’s on the h...
•
Season 2
•
Episode 27
•
32:21

26. Turkey and Transparency
Join us on Episode 26 of the Defending The Edge Podcast with DefendEdge, Turkey and Transparency, as the team welcomes back co-host Gabe Fritz and dives into some recent data breaches, thanksgiving foods, and how to protect yourself from the he...
•
Season 2
•
Episode 26
•
31:32

25. Elections and Electronics
Today's episode of the Defending The Edge Podcast with DefendEdge, Lyndon, Katey, and Andrea discuss topics such as the U.S. presidential election, touching on post-election cyberattacks and polling threats. Additionally, topics such as the Mid...
•
Season 2
•
Episode 25
•
38:59

24. Ballots and Bad Intentions
This month’s podcast we dive into some of the latest updates from the cybersecurity field. With expectations and sights set on developments from the ongoing Middle East conflict and potential implications to election day coming soon. The team d...
•
Season 2
•
Episode 24
•
41:59

023. Extort it or Report it
In this month's episode of the Defending the Edge Podcast with DefendEdge, join us as we discuss the cyber events of the past month, including a deep dive into recent Pegasus spyware sextortion scams that send unsuspected victims pictures of th...
•
Season 2
•
Episode 23
•
35:28

022. Iranian Actors Strike Again and the Trough of Disillusionment
In this month's episode of Defending the Edge Podcast with DefendEdge, join us as we discuss the cyber events of the past month, including cyber attacks against the U.S. election, and dive into the National Public Data Breach affecting almost 3...
•
Season 2
•
Episode 22
•
46:18

021.Unveiling the Mask, The Many Faces of Hacking
Red hat, blue hat, grey hat, black hat; follow along as we dive into the world of hackers on episode 21 of the Defending the Edge Podcast with DefendEdge set to be released on August 6th. Uncover the different veils that make up ethical hackers...
•
Season 2
•
Episode 21
•
53:24

020. Patching, Passwords, Phishing, Oh My!
In this episode, we dive deep into the three pillars of cybersecurity: Patching, Passwords, and Phishing, exploring best practices, common pitfalls, and real-world examples to help fortify your defenses. Additionally, we'll bring you the latest...
•
Season 2
•
Episode 3
•
53:54

019. Is It Plausible Once The AI Attacks?
In this episode, we sit down with DefendEdge's Security Operations Center (SOC) Director, Aaron Bozek, to explore the frontline defenses and best practices that keep organizations safe in the ever-evolving cybersecurity landscape. Our guest sha...
•
Season 2
•
Episode 2
•
54:20

018. We're Back and with a Recap
Welcome back to Defending the Edge, your monthly podcast destination! Our Cyber Threat Intelligence team is here to guide you through the latest happenings since our last episode in 2022. Let's dive into the world of cybersecurity and unpack th...
•
Season 2
•
Episode 1
•
37:10

017. We Didn't Start the Cyber Fire
Ransomware has become more advanced, we see troubling cyber threat trends in the wake of COVID-19, we discuss Black Basta with W/TH Secure, and we have a CEO and Director's round table discussion. Special guest "Not Billy Joel."
•
Season 1
•
Episode 17
•
1:21:45

DefendEdge Cyber Threat Intelligence
No usual show this week. Instead, we have a big announcement about expanding Cyber Threat Intelligence capabilities at DefendEdge and changing up content on the podcast. Check out our newly launched
•
Season 1
•
7:11

016. Is Nation-State Brother Watching You?
Maui ransomware details emerge, Greece spies on journalists, more deep-fake concerns come out, and threat actors are selling some interesting malicious services on the open web. We take a look at multiple events happening with Russia and ...
•
Season 1
•
Episode 16
•
33:10

015. Revisiting Pegasus and Phantom
The U.S. Court PACER system was breached two years ago and we just found out, more software programs are being impersonated and laced with malware, Robotext scams are on the rise, and we take a deeper look at Pegasus and NSO Group. Is com...
•
Season 1
•
Episode 15
•
32:17

014. Cyber Money Trail and Brute Badgers
Economic frustrations may be increasing inside threat activity, Brute Ratel’s badgers have been co-opted by threat actors, Ducktail malware is designated as a full-fledged campaign, and we talk about the reality of risk reduction and mitigation...
•
Season 1
•
Episode 14
•
33:03

013. Exploiting the Internet of Things
Exploitation expands on the Internet of Things, Quantum Computing gets closer and might just destroy our current understanding of security encryption, and I walk you through China’s cyber-psyop with TikTok.
•
Season 1
•
Episode 13
•
34:02

012. Maui Ransomware Surfing with North Korea
Killnet continues its pro-Russia hacktivism DDoS campaign, Microsoft announced a massive adversary in the middle campaign in progress, threat actors attempt to impersonate Crowdstrike, and we go vacationing in Maui with North Korea and Dear Lea...
•
Season 1
•
Episode 12
•
32:56

011. The Raspberry Robin Gets the Worm
Raspberry Robin infects an untold number of computers but is it a threat? Maybe. Probably? RedAlert ransomware targets VMware, the cyber-proxy war in the Russia-Ukraine conflict ramps up, and we take a look at police spyware. This week I ...
•
Season 1
•
Episode 11
•
52:26

010. Deepfake Tech Workers in Your Network
The FBI warns of deepfake tech workers, another crypto heist makes headlines, a study shows which type of phishing scams employees are likely to fall victim to, and we take a look at a cyber threat group taking up domestic terrorism under the g...
•
Season 1
•
Episode 10
•
51:27

009. Retired Internet Explorer Yells at Cloud
RSOCKS botnet goes down, Flagstar Bank suffers a massive breach, Internet Explorer finally, finally, retires but is it still a security concern? The answer won’t surprise you. Those headlines and more. This week we sit down with Col...
•
Season 1
•
Episode 9
•
50:49

008. Portland Heist and PingPull Dragons
Portland Oregon is exploited for $1.4 million, cyber hacks can open physical security doors, more information breaks on Chinese-backed threat groups, and ransomware exploitation gets even craftier. We talk about indicators of compromise a...
•
Season 1
•
Episode 8
•
31:13
