F-Secure Corporation’s Megan Squire on How Infostealers Are Quietly Taking Over Cybercrime
02 Dec 2025
Contributed by Lukas
Live from Black Hat USA 2025, host Casey Cammilleri sat down with cyber threat-intelligence research...
What Makes Hybrid Pentesting So Powerful?
30 Sep 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
GreyNoise’s Andrew Morris on Internet Background Noise as Data
23 Sep 2025
Contributed by Lukas
What if you could predict major security vulnerabilities weeks before they're publicly disclosed? An...
How Does Expert-Driven Offensive Security Provide Comprehensive Risk Insight?
16 Sep 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Sprinklr’s Roger Allen on Why Vendor Telemetry Only Gets You 90% There
09 Sep 2025
Contributed by Lukas
Modern attackers have abandoned obvious indicators and now mimic legitimate engineering activities s...
Why is Continuous Pentesting a Must for Dynamic Environments?
02 Sep 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Armis’ Andrew Grealy on Left-of-Boom Threat Actor Intelligence
26 Aug 2025
Contributed by Lukas
What if you could predict which vulnerabilities threat actors will weaponize months before CISA adds...
How Do You Build an Offensive Security Program from Scratch?
19 Aug 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Covert Entry: Tools, Tricks, and True Stories from the Field
12 Aug 2025
Contributed by Lukas
What happens when a covert entry specialist turns a Super Bowl hotel room into a rooftop breach poin...
What Should You Ask Before Choosing an Offensive Security Platform?
05 Aug 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Phillip Wylie on How IoT Devices Become Corporate Network Entry Points
29 Jul 2025
Contributed by Lukas
After 21 years in cybersecurity, Phillip Wylie, Penetration Tester & Podcast Host at The Phillip...
What Tools Do You Need for an Offensive Security Stack?
22 Jul 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
AccessIT Group’s Brett Price on Governance-Driven Cybersecurity
15 Jul 2025
Contributed by Lukas
Many cybersecurity programs fail because they prioritize tools over understanding what they're prote...
What Steps Should You Take to Build a Modern Pentesting Program?
08 Jul 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Parthasarathi Chakraborty on Building Architectural Assurance Functions
01 Jul 2025
Contributed by Lukas
Most security architecture programs struggle to demonstrate their value because they focus on creati...
What Are the Common Myths About Continuous Pentesting?
24 Jun 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Rocket Lawyer’s Tim Silverline on Why Clean Pentest Reports Can Be Red Flags
17 Jun 2025
Contributed by Lukas
When Tim Silverline received a pentest report that was essentially a clean bill of health with zero ...
How Do You Prepare for the Future of Pentesting?
10 Jun 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Digital Turbine’s Vivek Menon on Quarterly Pentesting Frameworks
03 Jun 2025
Contributed by Lukas
The shift from annual compliance-driven security testing to continuous validation represents one of ...
What’s Broken About Legacy Pentesting?
29 May 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
WhoisXML’s Alex Ronquillo on Domain Age as a Security Signal
19 May 2025
Contributed by Lukas
From a casual gaming project at NASA's JPL to powering 700+ cybersecurity vendors, WhoisXML API has ...
Why Continuous Pentesting Outperforms Bug Bounties
15 May 2025
Contributed by Lukas
Welcome to a special edition of Ahead of the Breach, where our host Casey Cammilleri answers the top...
Sentry’s Cody Florek on AppSec Programs That Create Partnerships Not Problems
06 May 2025
Contributed by Lukas
How do you effectively measure security operations in a world where vulnerabilities never stop comin...
Block Harbor’s Ayyappan Rajesh on Advanced RF Exploitation Techniques for Automotive Systems
22 Apr 2025
Contributed by Lukas
From intercepting key fob signals with HackRF devices to setting up rogue cellular networks with USR...
OX Security’s Eyal Paz on Vulnerability Triage That Actually Works in Production
08 Apr 2025
Contributed by Lukas
Implementing effective DevSecOps requires balancing security controls with developer experience — ...
Spektrum Labs’ Joshua Brown on Why Control is an Illusion in Modern Security
25 Mar 2025
Contributed by Lukas
"It's kind of like homeowners’ insurance," says Joshua Brown, Founder of Digital Defense Consultin...
Fraunhofer Institute’s Donika Mirdita on Novel Attack Methods Against Internet Routing Security
11 Mar 2025
Contributed by Lukas
In this episode of Ahead of the Breach, Donika Mirdita, Security Researcher at Fraunhofer Institute ...
NerdWallet’s DK Koran on Building Proactive Security Through Red Teams
25 Feb 2025
Contributed by Lukas
From testing critical infrastructure and IoT devices to leading application security at NerdWallet, ...
Rapyd’s Nir Rothenberg on Why Security Needs Constant Testing, Not Annual Checkups
11 Feb 2025
Contributed by Lukas
What can a controversial cyber weapon teach us about everyday security? From chemistry labs to cyber...
Eptura’s Sean Finley on Building Risk-Based Application Security Programs
28 Jan 2025
Contributed by Lukas
What if vulnerability management was less about filling backlogs with findings and more about strate...
Microsoft’s Vladimir Tokarev on Discovering Critical OpenVPN Vulnerabilities
14 Jan 2025
Contributed by Lukas
From a friendly gaming challenge to uncovering critical vulnerabilities, Vladimir Tokarev's journey ...
N-able’s Keiran Smith on Building Better Security Through Development Experience
07 Jan 2025
Contributed by Lukas
From executing his first SQL injection at age 14 to contributing to the Linux kernel, Keiran Smith’...
RSA’s Lorenzo Pedroncelli on Identity Security as the New Cyber Perimeter
17 Dec 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Lorenzo Pedroncelli, Senior Manager at RSA...
DigiCert’s Bindi Davé on Digital Trust in Cybersecurity
03 Dec 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Bindi Davé, Deputy CISO at DigiCert, who ...
Collectors’ Arif Basha on Proactive Security and Attack Surface Management
19 Nov 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with cybersecurity leader and expert, Arif Bash...
Ryerson’s Joe Mariscal on Building a Resilient Cybersecurity Culture
05 Nov 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Joe Mariscal, Director of Cybersecurity an...
Cubic’s Konrad Fellmann on Proactive Strategies for Identifying Cybersecurity Vulnerabilities
22 Oct 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Konrad Fellmann, VP of IT Infrastructure a...
MillerKnoll’s Al Imran Husain on Securing IT and OT in Manufacturing
08 Oct 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Al Imran Husain, CISO & VP of Global I...
Gong’s Jack Leidecker on Balancing Innovation and Security
24 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Jack Leidecker, CISO at Gong, who shares h...
Allegiant’s Dan Creed on Navigating the Risks of Deepfakes in Corporate Security
16 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Dan Creed, CISO of Allegiant Travel Compan...
Odyssey Group’s Mario DiNatale on Understanding Your Cybersecurity Attack Surface
09 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey speaks with Mario DiNatale, CISO at Odyssey Group. Mar...
Sprocket’s Pen Test Team on Bypassing Web Application Security
03 Sep 2024
Contributed by Lukas
In this episode of Ahead of the Breach, Casey chats with Nicholas Anastasi, Director of Technical Op...
Security Engineering Expert & Leader Mike Takahashi on Creativity in Red Teaming
27 Aug 2024
Contributed by Lukas
In this episode of Ahead of the Breach, host Casey Cammilleri, CEO & Founder of Sprocket, chats ...