Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Ahead of the Breach

Language: en Technology

Activity Overview

Episode publication activity over the past year

Last Checked: 2025-12-10 00:33:56.338722

F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime

02 Dec 2025

Contributed by Lukas

Live from Black Hat USA 2025, host Casey Cammilleri sat down with cyber threat-intelligence research...

What Makes Hybrid Pentesting So Powerful?

30 Sep 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

GreyNoise’s Andrew Morris on Internet Background Noise as Data

23 Sep 2025

Contributed by Lukas

What if you could predict major security vulnerabilities weeks before they're publicly disclosed? An...

How Does Expert-Driven Offensive Security Provide Comprehensive Risk Insight?

16 Sep 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Sprinklr’s Roger Allen on Why Vendor Telemetry Only Gets You 90% There

09 Sep 2025

Contributed by Lukas

Modern attackers have abandoned obvious indicators and now mimic legitimate engineering activities s...

Why is Continuous Pentesting a Must for Dynamic Environments?

02 Sep 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Armis’ Andrew Grealy on Left-of-Boom Threat Actor Intelligence

26 Aug 2025

Contributed by Lukas

What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds...

How Do You Build an Offensive Security Program from Scratch?

19 Aug 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Covert Entry: Tools, Tricks, and True Stories from the Field

12 Aug 2025

Contributed by Lukas

What happens when a covert entry specialist turns a Super Bowl hotel room into a rooftop breach poin...

What Should You Ask Before Choosing an Offensive Security Platform?

05 Aug 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Phillip Wylie on How IoT Devices Become Corporate Network Entry Points

29 Jul 2025

Contributed by Lukas

After 21 years in cybersecurity, Phillip Wylie, Penetration Tester & Podcast Host at The Phillip...

What Tools Do You Need for an Offensive Security Stack?

22 Jul 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

AccessIT Group’s Brett Price on Governance-Driven Cybersecurity

15 Jul 2025

Contributed by Lukas

Many cybersecurity programs fail because they prioritize tools over understanding what they're prote...

What Steps Should You Take to Build a Modern Pentesting Program?

08 Jul 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Parthasarathi Chakraborty on Building Architectural Assurance Functions

01 Jul 2025

Contributed by Lukas

Most security architecture programs struggle to demonstrate their value because they focus on creati...

What Are the Common Myths About Continuous Pentesting?

24 Jun 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Rocket Lawyer’s Tim Silverline on Why Clean Pentest Reports Can Be Red Flags

17 Jun 2025

Contributed by Lukas

When Tim Silverline received a pentest report that was essentially a clean bill of health with zero ...

How Do You Prepare for the Future of Pentesting?

10 Jun 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Digital Turbine’s Vivek Menon on Quarterly Pentesting Frameworks

03 Jun 2025

Contributed by Lukas

The shift from annual compliance-driven security testing to continuous validation represents one of ...

What’s Broken About Legacy Pentesting?

29 May 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

WhoisXML’s Alex Ronquillo on Domain Age as a Security Signal

19 May 2025

Contributed by Lukas

From a casual gaming project at NASA's JPL to powering 700+ cybersecurity vendors, WhoisXML API has ...

Why Continuous Pentesting Outperforms Bug Bounties

15 May 2025

Contributed by Lukas

Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...

Sentry’s Cody Florek on AppSec Programs That Create Partnerships Not Problems

06 May 2025

Contributed by Lukas

How do you effectively measure security operations in a world where vulnerabilities never stop comin...

Block Harbor’s Ayyappan Rajesh on Advanced RF Exploitation Techniques for Automotive Systems

22 Apr 2025

Contributed by Lukas

From intercepting key fob signals with HackRF devices to setting up rogue cellular networks with USR...

OX Security’s Eyal Paz on Vulnerability Triage That Actually Works in Production

08 Apr 2025

Contributed by Lukas

Implementing effective DevSecOps requires balancing security controls with developer experience — ...

Spektrum Labs’ Joshua Brown on Why Control is an Illusion in Modern Security

25 Mar 2025

Contributed by Lukas

"It's kind of like homeowners’ insurance," says Joshua Brown, Founder of Digital Defense Consultin...

Fraunhofer Institute’s Donika Mirdita on Novel Attack Methods Against Internet Routing Security

11 Mar 2025

Contributed by Lukas

In this episode of Ahead of the Breach, Donika Mirdita, Security Researcher at Fraunhofer Institute ...

NerdWallet’s DK Koran on Building Proactive Security Through Red Teams

25 Feb 2025

Contributed by Lukas

From testing critical infrastructure and IoT devices to leading application security at NerdWallet, ...

Rapyd’s Nir Rothenberg on Why Security Needs Constant Testing, Not Annual Checkups

11 Feb 2025

Contributed by Lukas

What can a controversial cyber weapon teach us about everyday security? From chemistry labs to cyber...

Eptura’s Sean Finley on Building Risk-Based Application Security Programs

28 Jan 2025

Contributed by Lukas

What if vulnerability management was less about filling backlogs with findings and more about strate...

Microsoft’s Vladimir Tokarev on Discovering Critical OpenVPN Vulnerabilities

14 Jan 2025

Contributed by Lukas

From a friendly gaming challenge to uncovering critical vulnerabilities, Vladimir Tokarev's journey ...

N-able’s Keiran Smith on Building Better Security Through Development Experience

07 Jan 2025

Contributed by Lukas

From executing his first SQL injection at age 14 to contributing to the Linux kernel, Keiran Smith’...

RSA’s Lorenzo Pedroncelli on Identity Security as the New Cyber Perimeter

17 Dec 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Lorenzo Pedroncelli, Senior Manager at RSA...

DigiCert’s Bindi Davé on Digital Trust in Cybersecurity

03 Dec 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Bindi Davé, Deputy CISO at DigiCert, who ...

Collectors’ Arif Basha on Proactive Security and Attack Surface Management

19 Nov 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with cybersecurity leader and expert, Arif Bash...

Ryerson’s Joe Mariscal on Building a Resilient Cybersecurity Culture

05 Nov 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Joe Mariscal, Director of Cybersecurity an...

Cubic’s Konrad Fellmann on Proactive Strategies for Identifying Cybersecurity Vulnerabilities

22 Oct 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Konrad Fellmann, VP of IT Infrastructure a...

MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing

08 Oct 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Al Imran Husain, CISO & VP of Global I...

Gong’s Jack Leidecker on Balancing Innovation and Security

24 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Jack Leidecker, CISO at Gong, who shares h...

Allegiant’s Dan Creed on Navigating the Risks of Deepfakes in Corporate Security

16 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Dan Creed, CISO of Allegiant Travel Compan...

Odyssey Group’s Mario DiNatale on Understanding Your Cybersecurity Attack Surface

09 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey speaks with Mario DiNatale, CISO at Odyssey Group. Mar...

Sprocket’s Pen Test Team on Bypassing Web Application Security

03 Sep 2024

Contributed by Lukas

In this episode of Ahead of the Breach, Casey chats with Nicholas Anastasi, Director of Technical Op...

Security Engineering Expert & Leader Mike Takahashi on Creativity in Red Teaming

27 Aug 2024

Contributed by Lukas

In this episode of Ahead of the Breach, host Casey Cammilleri, CEO & Founder of Sprocket, chats ...