Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Audit - Cybersecurity Podcast

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Cyber News: Iran Attacks, Greyware, and Backdoor Code

06 Apr 2026

Contributed by Lukas

What if the tools protecting your organization were the ones compromising it? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and N...

Cognitive Surrender: How AI Weaponizes Human Psychology

23 Mar 2026

Contributed by Lukas

A $25 million wire transfer. A fake CFO. An entire executive team that didn't exist. This is what modern cybercrime looks like — and your firew...

Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About

09 Mar 2026

Contributed by Lukas

What if the device keeping you alive was also a cybersecurity vulnerability? That's not a hypothetical — it's Victor Barge's reality....

Secret Service Agent Reveals Undercover Cyber Ops

23 Feb 2026

Contributed by Lukas

What does it take to go undercover with international cybercriminals — with no backup, no safe house, and no script? In this episode of The Audit, R...

Cyber News: Advanced Phishing, ClickFix & AI Wearables

09 Feb 2026

Contributed by Lukas

Microsoft dominates 22% of all phishing attacks, a $800 tool tricks 60% of victims into self-hacking, and Apple's planning a surveillance pin tha...

Field Notes: New Year Catch-Up, Coffee, And Team DNA

26 Jan 2026

Contributed by Lukas

In this episode of The Audit, co-hosts Eric Brown and Nick Mellem dive deep into organizational psychology and team dynamics with a refreshingly hones...

AI Architecture: Stop Button Pushing, Start Building

12 Jan 2026

Contributed by Lukas

What if the difference between AI mediocrity and breakthrough isn't the tool—it's how you architect your approach? Carter Jensen from The ...

The Audit 2025: Deepfakes, Quantum & AI That Changed Everything

29 Dec 2025

Contributed by Lukas

In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Pa...

Gaming to Cybersecurity: How AI Agents Fight Alert Overload

15 Dec 2025

Contributed by Lukas

What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edwa...

Critical Infrastructure: Everything is Connected and Vulnerable

01 Dec 2025

Contributed by Lukas

When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Lesl...

Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations

17 Nov 2025

Contributed by Lukas

What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBi...

Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks

03 Nov 2025

Contributed by Lukas

What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected eve...

Apple Vision Pro Meets AI: Why Your Company Needs Both

20 Oct 2025

Contributed by Lukas

What happens when Apple Vision Pro meets enterprise AI? In this episode of The Audit, Alex Bratton—applied technologist and AI implementation expert...

Field Notes: Coffee, Gliders & Trademark Scams

06 Oct 2025

Contributed by Lukas

Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode g...

Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition

22 Sep 2025

Contributed by Lukas

Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi ca...

Field Notes: Why Cyber Attacks Are Accelerating

15 Sep 2025

Contributed by Lukas

The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Br...

Healthcare Ransomware: When Cyberattacks Turn Deadly

08 Sep 2025

Contributed by Lukas

When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking r...

The Deepfake Hiring Crisis: AI Fraud in Job Interviews

25 Aug 2025

Contributed by Lukas

What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI...

How CTF Culture Gamifies Your Way to Unbreakable Security Teams

11 Aug 2025

Contributed by Lukas

Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The A...

Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing

28 Jul 2025

Contributed by Lukas

Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL lineb...

Grassroots Cybersecurity: Protecting Communities Through Education

14 Jul 2025

Contributed by Lukas

What does it take to build real cybersecurity skills in underserved communities? In this episode of The Audit, Rasheed Alowonle shares his journey fro...

Tabletop Exercises 2.0: How OpsBook Is Changing the Game

30 Jun 2025

Contributed by Lukas

What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about table...

The Invisible Threats: OT Meets IT in Modern Manufacturing

16 Jun 2025

Contributed by Lukas

Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes...

Pwnagotchi: The AI Pet That Hunts Your Network Credentials

02 Jun 2025

Contributed by Lukas

What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi han...

Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security

12 May 2025

Contributed by Lukas

Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaper and Adam Warner reveal how thei...

Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report

05 May 2025

Contributed by Lukas

Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received...

Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure

21 Apr 2025

Contributed by Lukas

Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minne...

The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes

07 Apr 2025

Contributed by Lukas

Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advan...

Eco-Security: The Intersection of Recycling and Technology

24 Mar 2025

Contributed by Lukas

What Really Happens to Your Trash? Inside Modern Waste ManagementIs your trash really being recycled, or is it ending up in a landfill? In this episod...

SOC Audits Decoded: What Your Business Needs to Know Now!

10 Mar 2025

Contributed by Lukas

Are SOC audits just another compliance requirement, or do they provide real security value? In this episode of The Audit, we sit down with Adam Russel...

Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats

24 Feb 2025

Contributed by Lukas

Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access. In this epi...

Social Engineering Tactics & Defense Strategies with Alethe Denis

10 Feb 2025

Contributed by Lukas

You’re Being Hacked Right Now—And You Don’t Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secur...

Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks

27 Jan 2025

Contributed by Lukas

Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive in...

Big Data Meets Cybersecurity: Expert Insights from Wade Baker

13 Jan 2025

Contributed by Lukas

Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world ap...

Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold

16 Dec 2024

Contributed by Lukas

Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion f...

Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats

02 Dec 2024

Contributed by Lukas

From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry.  We explore...

Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024

19 Nov 2024

Contributed by Lukas

In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishi...

AI & Emerging Tech for a Better Future with Marsha Maxwell

04 Nov 2024

Contributed by Lukas

In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta Internation...

Building Resilient, Secure Software: Lessons from DevSecOps Experts

21 Oct 2024

Contributed by Lukas

Building secure software isn't optional—It's critical. Here’s how you can do it right!  In this episode of The Audit presented by IT Au...

Real-World Cybersecurity: Need to Know Now Insights from a CISO

07 Oct 2024

Contributed by Lukas

In this episode of The Audit by IT Audit Labs, we sit down for an in-depth conversation with Eric Brown to explore the crucial topic of personal infor...

Safety Science Meets Cybersecurity: Lessons for Risk Management

23 Sep 2024

Contributed by Lukas

Discover the vital intersection of safety science and cybersecurity, where human psychology meets technical innovation. In this episode of The Audit,...

Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes

09 Sep 2024

Contributed by Lukas

In this episode of The Audit, we’re joined by Mick Leach from Abnormal to discuss the evolving landscape of email security and how AI is transformin...

Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends

26 Aug 2024

Contributed by Lukas

Stay informed with The Audit, your go-to podcast for the latest in cybersecurity insights, best practices, news and trends. In this month's news ...

Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends

12 Aug 2024

Contributed by Lukas

Discover the fascinating world of OSINT (Open Source Intelligence) with expert insights from Melisa Stivaletti on this episode of The Audit! Hosted b...

Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked

29 Jul 2024

Contributed by Lukas

Join us for the July 2024, live news episode of 'The Audit', where we cover the latest cybersecurity threats, ransomware updates, and AI adv...

Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications

01 Jul 2024

Contributed by Lukas

Unlock the secrets behind the powerful HAC5 Pineapple tool in this episode of The Audit.  Hosts Eric Brown and Nick Mellum, joined by Cameron Birkela...

Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More

17 Jun 2024

Contributed by Lukas

Welcome to the latest episode of "The Audit," where we bring you the most pressing news, issues and insights in cybersecurity. In this live...

Quantum Computing's Impact on Cybersecurity with Bernie Leung

03 Jun 2024

Contributed by Lukas

Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leu...

Securing the Invisible Threats: Insights on IoT Security with Eric Johansen

08 May 2024

Contributed by Lukas

Discover cutting-edge IoT cybersecurity strategies with insights from expert Eric Johansen. Join us as we delve into the world of IoT cybersecurity w...

Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson

19 Apr 2024

Contributed by Lukas

Get ready for a special episode of The Audit! We're celebrating our 40th episode with Brian Johnson, host of the 7-Minute Security podcast, as we...

Building the Future: AI and Cybersecurity in Construction

15 Apr 2024

Contributed by Lukas

In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Grou...

Cybersecurity News: Water Systems & IoT Devices Under Threat

01 Apr 2024

Contributed by Lukas

Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT secu...

Phishing: The Number 1 Social Engineering Tactic with James Arndt

18 Mar 2024

Contributed by Lukas

In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybe...

Printing the Future: Navigating Cybersecurity in 3D Printing

26 Feb 2024

Contributed by Lukas

How exposed are your 3D printing operations to cyber threats? Is the intellectual property involved in 3D printing at risk, and can 3D printers themse...

Are VPNs Secure? Insights on the Risks, and the Ivanti Breach

12 Feb 2024

Contributed by Lukas

How secure is a VPN, really? Can a VPN server be hacked, and are these services truly safe? In this episode of The Audit, Joshua, Nick, and Eric tackl...

A Veteran’s Journey into Cybersecurity with Clifton Robinson

29 Jan 2024

Contributed by Lukas

It should come as no surprise that building a team can be challenging for cybersecurity professionals. However, we've found that individuals who ...

Email and Mobile Security Tips with Dean Morstad

15 Jan 2024

Contributed by Lukas

Is your digital footprint secure? In our latest episode we unravel the complexities of email and mobile security. Join Dean Morstad, a seasoned cybers...

Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI

07 Dec 2023

Contributed by Lukas

This episode offers more than just insights; it's a chance to meet the minds who have been combatting cyber threats for decades. We explore topic...

Cybersecurity Jobs, Breach Communication & The Infosec Landscape with Leah McLean

27 Nov 2023

Contributed by Lukas

In this episode of The Audit, Leah McLean shares her insights from over 10 years in cybersecurity and IT with companies like Cisco, and now Mastercard...

Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools

13 Nov 2023

Contributed by Lukas

The Audit - Episode 30 - Join us as we speak with cybersecurity expert and hacking hardware enthusiast Cameron Birkland, who introduces us to the worl...

Understanding Cryptocurrency and Wallet Security with Matt Starland

30 Oct 2023

Contributed by Lukas

The Audit - Episode 29 - Ready to uncover the world of crypto? Join us in our latest episode as we dive into the realm of cryptocurrency with Matt Sta...

Stories from the Dark Side of Cyber Forensics with Andre Champagne

16 Oct 2023

Contributed by Lukas

The Audit - Episode 28 - We are pleased to introduce you to Andre Champagne, an expert in the intriguing world of cyber and digital forensics. Andre’...

eCommerce and Surviving the Black Friday Frenzy with Jeff White

02 Oct 2023

Contributed by Lukas

The Audit - Episode 27 - Imagine managing over a million orders per minute during a high-stakes sales event like Black Friday! That's the reality...

The Future of Digital Storage: From Hard Drives to DNA

18 Sep 2023

Contributed by Lukas

The Audit - Episode 26 - Ready to decode the future of data storage technology? We guarantee that you'll be fascinated by our in-depth exploratio...

A Comprehensive Guide to Quantum Computing

04 Sep 2023

Contributed by Lukas

In Part 2 of the Tech Lessons Series by Bill Harris, get ready to unravel the mystery of quantum computing? Brace yourselves as we, your hosts, and ou...

The Next Era of Computing and Processor Technology

21 Aug 2023

Contributed by Lukas

The Audit - Episode 24In Part 1 of the Tech Lessons Series by Bill Harris, prepare to be transported into the future of computing resources, with our ...

Unmasking the Complex World of Cybersecurity and Software Updates

07 Aug 2023

Contributed by Lukas

Wouldn't it be great if you could navigate the treacherous landscape of software vulnerabilities like a pro? That's exactly what we're ...

The Dark Side of Cyberspace: Data Breaches and the Price of Information

24 Jul 2023

Contributed by Lukas

The Audit - Episode 22Want to understand the dark underbelly of cyberspace? Join us as we take a deep dive into recent data breaches at T-Mobile, disc...

The New Toolkit: AI-Powered Presentations

10 Jul 2023

Contributed by Lukas

For this episdoe we are joined by Eric Pesik, the Deputy General Counsel at Seagate Technology. Eric, walks us through how he has been using generativ...

The Future of Passwords and Personal Security

26 Jun 2023

Contributed by Lukas

A conversation between Nick Mellem, Eric Palms, and Matt Starland about the future of passwords through the lens of IT. The team notes a general lag t...

Certified Vulnerable: How Certificates Can Be Exploited

12 Jun 2023

Contributed by Lukas

A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In ...

So, you wanna be a CISO?

29 May 2023

Contributed by Lukas

An in-depth conversation with former CISO (Chief Information Security Officer) of the Minnesota Judicial and Metropolitan Council, Gretchen White. ITA...

Hacking Hardware Hobbies with Dennis Pelton

15 May 2023

Contributed by Lukas

This week, we are speaking with Dennis Pelton about his expertise in hardware. He makes badges for all the major security conferences and loves to sha...

Security in the News: Cloud Policies and Data Breach Prevention

01 May 2023

Contributed by Lukas

Continue the conversation with guest, Matt Starland, as we dive further into security in the news. How do these breaches happen and how can they be pr...

Cyber Safe Travel: Tips for Secure Adventures

17 Apr 2023

Contributed by Lukas

Traveling for Spring Break, vacation, or work? Join The Audit and guest ethical hacker, Matthew Wold, to hear best practices for keeping your journey ...

So, You Want to Be in Cybersecurity?

03 Apr 2023

Contributed by Lukas

In this episode, The Audit discusses day-to-day operations in the industry with cybersecurity expert, Nate Ristine. From creating and hunting down phi...

What is the Dark Web?

20 Mar 2023

Contributed by Lukas

Hardware hacking transforms from mysterious craft to accessible art form in this captivating conversation with Dennis Pelton, whose electronic creatio...

Security in the News: Architects, APIs, and Alaska

06 Mar 2023

Contributed by Lukas

Digital security breaches continue to dominate headlines, with T-Mobile's recent API vulnerability exposing personal data from 37 million custome...

It’s a Pwnagotchi Party!

20 Feb 2023

Contributed by Lukas

Join the IT Audit Labs crew to talk about Pwnagotchi’s! We will review how a pwnagotchi collects keys/wpa/wpa2 information from 4-way wifi handshake...

Wireless Attack Kill Chain for n00bs with Dennis Pelton

06 Feb 2023

Contributed by Lukas

Did you know that your Wi-fi is even vulnerable to attacks? Tune in to hear our guest, Dennis, talk about kill chain, DOS attacks, Wi-Fi reconnaissanc...

Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors

23 Jan 2023

Contributed by Lukas

Breaches, phishing, attacker programming, and more, in this week of The Audit. Tales from the Trenches will talk about several scenarios our hosts hav...

DC30 Vishing Competition Black Badge winners Team Spilt Beans

09 Jan 2023

Contributed by Lukas

Vishing is happening constantly. Understanding what vishing is and being able to spot these tactics will help protect your information. The Audit pres...

Phishing, Smishing and Other Cybersecurity Threats

27 Dec 2022

Contributed by Lukas

Every click matters in the digital world, especially when cybercriminals are crafting increasingly sophisticated traps. Our latest deep dive into the ...

Unquoted Service Paths: A Windows Vulnerability

12 Dec 2022

Contributed by Lukas

Missing quotation marks might seem trivial, but in Windows service paths, they create serious security vulnerabilities that hackers actively exploit. ...

Personal Information Security Protection in a Modern Era, Part IV

28 Nov 2022

Contributed by Lukas

Digital threats lurk around every corner, but your strongest defense might be simpler than you think. We dive into the critical strategies for protect...

Personal Information Security Protection in a Modern Era, Part III

14 Nov 2022

Contributed by Lukas

Digital privacy isn't just about hiding what you do online—it's about control. When every click, keystroke, and scroll becomes a data poin...

Personal Information Security Protection in a Modern Era, Part II

31 Oct 2022

Contributed by Lukas

Digital security goes far beyond just having a strong password. What happens after you hit "send" on that email or text message could expose...

Personal Information Security Protection in a Modern Era, Part I

18 Oct 2022

Contributed by Lukas

The digital breadcrumbs we leave behind create a startlingly accurate profile of who we are—one that corporations, governments, and malicious actors...

Introduction to The Audit

11 Oct 2022

Contributed by Lukas

Ever experienced the frustration of multiple security audits that yield the same findings with no real path forward? You're not alone. Security a...