The Audit - Cybersecurity Podcast
Episodes
Cyber News: Iran Attacks, Greyware, and Backdoor Code
06 Apr 2026
Contributed by Lukas
What if the tools protecting your organization were the ones compromising it? In this episode of The Audit, co-hosts Joshua Schmidt, Eric Brown, and N...
Cognitive Surrender: How AI Weaponizes Human Psychology
23 Mar 2026
Contributed by Lukas
A $25 million wire transfer. A fake CFO. An entire executive team that didn't exist. This is what modern cybercrime looks like — and your firew...
Surviving a Cardiac Event: Biometric Data and the Risks Nobody Talks About
09 Mar 2026
Contributed by Lukas
What if the device keeping you alive was also a cybersecurity vulnerability? That's not a hypothetical — it's Victor Barge's reality....
Secret Service Agent Reveals Undercover Cyber Ops
23 Feb 2026
Contributed by Lukas
What does it take to go undercover with international cybercriminals — with no backup, no safe house, and no script? In this episode of The Audit, R...
Cyber News: Advanced Phishing, ClickFix & AI Wearables
09 Feb 2026
Contributed by Lukas
Microsoft dominates 22% of all phishing attacks, a $800 tool tricks 60% of victims into self-hacking, and Apple's planning a surveillance pin tha...
Field Notes: New Year Catch-Up, Coffee, And Team DNA
26 Jan 2026
Contributed by Lukas
In this episode of The Audit, co-hosts Eric Brown and Nick Mellem dive deep into organizational psychology and team dynamics with a refreshingly hones...
AI Architecture: Stop Button Pushing, Start Building
12 Jan 2026
Contributed by Lukas
What if the difference between AI mediocrity and breakthrough isn't the tool—it's how you architect your approach? Carter Jensen from The ...
The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
29 Dec 2025
Contributed by Lukas
In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Pa...
Gaming to Cybersecurity: How AI Agents Fight Alert Overload
15 Dec 2025
Contributed by Lukas
What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edwa...
Critical Infrastructure: Everything is Connected and Vulnerable
01 Dec 2025
Contributed by Lukas
When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Lesl...
Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations
17 Nov 2025
Contributed by Lukas
What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBi...
Field Notes: AI's $10 Trillion Lie + Coffee Roasting & Starlink Hacks
03 Nov 2025
Contributed by Lukas
What if everything AI tells you about cybersecurity costs is completely wrong? The Audit crew unpacks a shocking data black hole that has infected eve...
Apple Vision Pro Meets AI: Why Your Company Needs Both
20 Oct 2025
Contributed by Lukas
What happens when Apple Vision Pro meets enterprise AI? In this episode of The Audit, Alex Bratton—applied technologist and AI implementation expert...
Field Notes: Coffee, Gliders & Trademark Scams
06 Oct 2025
Contributed by Lukas
Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode g...
Cybersecurity News: Grok AI Hijacked for Malware, Wi-Fi Heart Rate Hacks, Starlink Competition
22 Sep 2025
Contributed by Lukas
Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi ca...
Field Notes: Why Cyber Attacks Are Accelerating
15 Sep 2025
Contributed by Lukas
The threat landscape is moving faster than ever—and traditional response playbooks aren't keeping up. In this live Field Notes episode, Eric Br...
Healthcare Ransomware: When Cyberattacks Turn Deadly
08 Sep 2025
Contributed by Lukas
When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking r...
The Deepfake Hiring Crisis: AI Fraud in Job Interviews
25 Aug 2025
Contributed by Lukas
What happens when your next hire isn't who they claim to be? In this eye-opening episode of The Audit, we dive deep into the alarming world of AI...
How CTF Culture Gamifies Your Way to Unbreakable Security Teams
11 Aug 2025
Contributed by Lukas
Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The A...
Cybersecurity News: Vikings Vishing Lost $240K, Scattered Spider & F1 Racing
28 Jul 2025
Contributed by Lukas
Dallas Turner's $240,000 fraud loss isn't just celebrity news—it's a wake-up call for anyone with a bank account. When even NFL lineb...
Grassroots Cybersecurity: Protecting Communities Through Education
14 Jul 2025
Contributed by Lukas
What does it take to build real cybersecurity skills in underserved communities? In this episode of The Audit, Rasheed Alowonle shares his journey fro...
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
30 Jun 2025
Contributed by Lukas
What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about table...
The Invisible Threats: OT Meets IT in Modern Manufacturing
16 Jun 2025
Contributed by Lukas
Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes...
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
02 Jun 2025
Contributed by Lukas
What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi han...
Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
12 May 2025
Contributed by Lukas
Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaper and Adam Warner reveal how thei...
Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
05 May 2025
Contributed by Lukas
Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received...
Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure
21 Apr 2025
Contributed by Lukas
Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minne...
The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes
07 Apr 2025
Contributed by Lukas
Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advan...
Eco-Security: The Intersection of Recycling and Technology
24 Mar 2025
Contributed by Lukas
What Really Happens to Your Trash? Inside Modern Waste ManagementIs your trash really being recycled, or is it ending up in a landfill? In this episod...
SOC Audits Decoded: What Your Business Needs to Know Now!
10 Mar 2025
Contributed by Lukas
Are SOC audits just another compliance requirement, or do they provide real security value? In this episode of The Audit, we sit down with Adam Russel...
Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats
24 Feb 2025
Contributed by Lukas
Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access. In this epi...
Social Engineering Tactics & Defense Strategies with Alethe Denis
10 Feb 2025
Contributed by Lukas
You’re Being Hacked Right Now—And You Don’t Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secur...
Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks
27 Jan 2025
Contributed by Lukas
Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive in...
Big Data Meets Cybersecurity: Expert Insights from Wade Baker
13 Jan 2025
Contributed by Lukas
Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world ap...
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
16 Dec 2024
Contributed by Lukas
Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion f...
Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
02 Dec 2024
Contributed by Lukas
From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore...
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
19 Nov 2024
Contributed by Lukas
In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishi...
AI & Emerging Tech for a Better Future with Marsha Maxwell
04 Nov 2024
Contributed by Lukas
In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta Internation...
Building Resilient, Secure Software: Lessons from DevSecOps Experts
21 Oct 2024
Contributed by Lukas
Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Au...
Real-World Cybersecurity: Need to Know Now Insights from a CISO
07 Oct 2024
Contributed by Lukas
In this episode of The Audit by IT Audit Labs, we sit down for an in-depth conversation with Eric Brown to explore the crucial topic of personal infor...
Safety Science Meets Cybersecurity: Lessons for Risk Management
23 Sep 2024
Contributed by Lukas
Discover the vital intersection of safety science and cybersecurity, where human psychology meets technical innovation. In this episode of The Audit,...
Next-Gen Email Security: Mick Leach on AI, Phishing, and QR Codes
09 Sep 2024
Contributed by Lukas
In this episode of The Audit, we’re joined by Mick Leach from Abnormal to discuss the evolving landscape of email security and how AI is transformin...
Cybersecurity News: CrowdStrike, TikTok, and Ransomware Trends
26 Aug 2024
Contributed by Lukas
Stay informed with The Audit, your go-to podcast for the latest in cybersecurity insights, best practices, news and trends. In this month's news ...
Mastering Open Source Intelligence (OSINT): AI, Tradecraft, and Future Trends
12 Aug 2024
Contributed by Lukas
Discover the fascinating world of OSINT (Open Source Intelligence) with expert insights from Melisa Stivaletti on this episode of The Audit! Hosted b...
Cybersecurity News: Military Malware, UFOs, and More Passwords Leaked
29 Jul 2024
Contributed by Lukas
Join us for the July 2024, live news episode of 'The Audit', where we cover the latest cybersecurity threats, ransomware updates, and AI adv...
Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
01 Jul 2024
Contributed by Lukas
Unlock the secrets behind the powerful HAC5 Pineapple tool in this episode of The Audit. Hosts Eric Brown and Nick Mellum, joined by Cameron Birkela...
Cybersecurity News: DDoS Attacks, Public Library Breach, Phishing and More
17 Jun 2024
Contributed by Lukas
Welcome to the latest episode of "The Audit," where we bring you the most pressing news, issues and insights in cybersecurity. In this live...
Quantum Computing's Impact on Cybersecurity with Bernie Leung
03 Jun 2024
Contributed by Lukas
Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leu...
Securing the Invisible Threats: Insights on IoT Security with Eric Johansen
08 May 2024
Contributed by Lukas
Discover cutting-edge IoT cybersecurity strategies with insights from expert Eric Johansen. Join us as we delve into the world of IoT cybersecurity w...
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
19 Apr 2024
Contributed by Lukas
Get ready for a special episode of The Audit! We're celebrating our 40th episode with Brian Johnson, host of the 7-Minute Security podcast, as we...
Building the Future: AI and Cybersecurity in Construction
15 Apr 2024
Contributed by Lukas
In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Grou...
Cybersecurity News: Water Systems & IoT Devices Under Threat
01 Apr 2024
Contributed by Lukas
Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT secu...
Phishing: The Number 1 Social Engineering Tactic with James Arndt
18 Mar 2024
Contributed by Lukas
In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybe...
Printing the Future: Navigating Cybersecurity in 3D Printing
26 Feb 2024
Contributed by Lukas
How exposed are your 3D printing operations to cyber threats? Is the intellectual property involved in 3D printing at risk, and can 3D printers themse...
Are VPNs Secure? Insights on the Risks, and the Ivanti Breach
12 Feb 2024
Contributed by Lukas
How secure is a VPN, really? Can a VPN server be hacked, and are these services truly safe? In this episode of The Audit, Joshua, Nick, and Eric tackl...
A Veteran’s Journey into Cybersecurity with Clifton Robinson
29 Jan 2024
Contributed by Lukas
It should come as no surprise that building a team can be challenging for cybersecurity professionals. However, we've found that individuals who ...
Email and Mobile Security Tips with Dean Morstad
15 Jan 2024
Contributed by Lukas
Is your digital footprint secure? In our latest episode we unravel the complexities of email and mobile security. Join Dean Morstad, a seasoned cybers...
Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI
07 Dec 2023
Contributed by Lukas
This episode offers more than just insights; it's a chance to meet the minds who have been combatting cyber threats for decades. We explore topic...
Cybersecurity Jobs, Breach Communication & The Infosec Landscape with Leah McLean
27 Nov 2023
Contributed by Lukas
In this episode of The Audit, Leah McLean shares her insights from over 10 years in cybersecurity and IT with companies like Cisco, and now Mastercard...
Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools
13 Nov 2023
Contributed by Lukas
The Audit - Episode 30 - Join us as we speak with cybersecurity expert and hacking hardware enthusiast Cameron Birkland, who introduces us to the worl...
Understanding Cryptocurrency and Wallet Security with Matt Starland
30 Oct 2023
Contributed by Lukas
The Audit - Episode 29 - Ready to uncover the world of crypto? Join us in our latest episode as we dive into the realm of cryptocurrency with Matt Sta...
Stories from the Dark Side of Cyber Forensics with Andre Champagne
16 Oct 2023
Contributed by Lukas
The Audit - Episode 28 - We are pleased to introduce you to Andre Champagne, an expert in the intriguing world of cyber and digital forensics. Andre’...
eCommerce and Surviving the Black Friday Frenzy with Jeff White
02 Oct 2023
Contributed by Lukas
The Audit - Episode 27 - Imagine managing over a million orders per minute during a high-stakes sales event like Black Friday! That's the reality...
The Future of Digital Storage: From Hard Drives to DNA
18 Sep 2023
Contributed by Lukas
The Audit - Episode 26 - Ready to decode the future of data storage technology? We guarantee that you'll be fascinated by our in-depth exploratio...
A Comprehensive Guide to Quantum Computing
04 Sep 2023
Contributed by Lukas
In Part 2 of the Tech Lessons Series by Bill Harris, get ready to unravel the mystery of quantum computing? Brace yourselves as we, your hosts, and ou...
The Next Era of Computing and Processor Technology
21 Aug 2023
Contributed by Lukas
The Audit - Episode 24In Part 1 of the Tech Lessons Series by Bill Harris, prepare to be transported into the future of computing resources, with our ...
Unmasking the Complex World of Cybersecurity and Software Updates
07 Aug 2023
Contributed by Lukas
Wouldn't it be great if you could navigate the treacherous landscape of software vulnerabilities like a pro? That's exactly what we're ...
The Dark Side of Cyberspace: Data Breaches and the Price of Information
24 Jul 2023
Contributed by Lukas
The Audit - Episode 22Want to understand the dark underbelly of cyberspace? Join us as we take a deep dive into recent data breaches at T-Mobile, disc...
The New Toolkit: AI-Powered Presentations
10 Jul 2023
Contributed by Lukas
For this episdoe we are joined by Eric Pesik, the Deputy General Counsel at Seagate Technology. Eric, walks us through how he has been using generativ...
The Future of Passwords and Personal Security
26 Jun 2023
Contributed by Lukas
A conversation between Nick Mellem, Eric Palms, and Matt Starland about the future of passwords through the lens of IT. The team notes a general lag t...
Certified Vulnerable: How Certificates Can Be Exploited
12 Jun 2023
Contributed by Lukas
A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In ...
So, you wanna be a CISO?
29 May 2023
Contributed by Lukas
An in-depth conversation with former CISO (Chief Information Security Officer) of the Minnesota Judicial and Metropolitan Council, Gretchen White. ITA...
Hacking Hardware Hobbies with Dennis Pelton
15 May 2023
Contributed by Lukas
This week, we are speaking with Dennis Pelton about his expertise in hardware. He makes badges for all the major security conferences and loves to sha...
Security in the News: Cloud Policies and Data Breach Prevention
01 May 2023
Contributed by Lukas
Continue the conversation with guest, Matt Starland, as we dive further into security in the news. How do these breaches happen and how can they be pr...
Cyber Safe Travel: Tips for Secure Adventures
17 Apr 2023
Contributed by Lukas
Traveling for Spring Break, vacation, or work? Join The Audit and guest ethical hacker, Matthew Wold, to hear best practices for keeping your journey ...
So, You Want to Be in Cybersecurity?
03 Apr 2023
Contributed by Lukas
In this episode, The Audit discusses day-to-day operations in the industry with cybersecurity expert, Nate Ristine. From creating and hunting down phi...
What is the Dark Web?
20 Mar 2023
Contributed by Lukas
Hardware hacking transforms from mysterious craft to accessible art form in this captivating conversation with Dennis Pelton, whose electronic creatio...
Security in the News: Architects, APIs, and Alaska
06 Mar 2023
Contributed by Lukas
Digital security breaches continue to dominate headlines, with T-Mobile's recent API vulnerability exposing personal data from 37 million custome...
It’s a Pwnagotchi Party!
20 Feb 2023
Contributed by Lukas
Join the IT Audit Labs crew to talk about Pwnagotchi’s! We will review how a pwnagotchi collects keys/wpa/wpa2 information from 4-way wifi handshake...
Wireless Attack Kill Chain for n00bs with Dennis Pelton
06 Feb 2023
Contributed by Lukas
Did you know that your Wi-fi is even vulnerable to attacks? Tune in to hear our guest, Dennis, talk about kill chain, DOS attacks, Wi-Fi reconnaissanc...
Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors
23 Jan 2023
Contributed by Lukas
Breaches, phishing, attacker programming, and more, in this week of The Audit. Tales from the Trenches will talk about several scenarios our hosts hav...
DC30 Vishing Competition Black Badge winners Team Spilt Beans
09 Jan 2023
Contributed by Lukas
Vishing is happening constantly. Understanding what vishing is and being able to spot these tactics will help protect your information. The Audit pres...
Phishing, Smishing and Other Cybersecurity Threats
27 Dec 2022
Contributed by Lukas
Every click matters in the digital world, especially when cybercriminals are crafting increasingly sophisticated traps. Our latest deep dive into the ...
Unquoted Service Paths: A Windows Vulnerability
12 Dec 2022
Contributed by Lukas
Missing quotation marks might seem trivial, but in Windows service paths, they create serious security vulnerabilities that hackers actively exploit. ...
Personal Information Security Protection in a Modern Era, Part IV
28 Nov 2022
Contributed by Lukas
Digital threats lurk around every corner, but your strongest defense might be simpler than you think. We dive into the critical strategies for protect...
Personal Information Security Protection in a Modern Era, Part III
14 Nov 2022
Contributed by Lukas
Digital privacy isn't just about hiding what you do online—it's about control. When every click, keystroke, and scroll becomes a data poin...
Personal Information Security Protection in a Modern Era, Part II
31 Oct 2022
Contributed by Lukas
Digital security goes far beyond just having a strong password. What happens after you hit "send" on that email or text message could expose...
Personal Information Security Protection in a Modern Era, Part I
18 Oct 2022
Contributed by Lukas
The digital breadcrumbs we leave behind create a startlingly accurate profile of who we are—one that corporations, governments, and malicious actors...
Introduction to The Audit
11 Oct 2022
Contributed by Lukas
Ever experienced the frustration of multiple security audits that yield the same findings with no real path forward? You're not alone. Security a...