Blue Security

Blue Security

A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.

Episodes

March 10, 2026 25 mins

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam delve into a significant surge in external ID charges experienced by a customer, leading to the discovery of an international revenue share fraud attack. They discuss the mechanics of this fraud, how it exploits telecommunication systems, and the importance of monitoring and mitigating such attacks. The conversation emphasizes the need for organizations to imp...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the recent tensions between the U.S. government and the private tech sector regarding artificial intelligence. They discuss the clash between Anthropic and the Department of Defense over AI safety guardrails, the implications of designating Anthropic as a supply chain risk, and the broader impact on the defense sector. The conversation also touches ...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the recent tensions between the U.S. government and the private tech sector regarding artificial intelligence. They discuss the clash between Anthropic and the Department of Defense over AI safety guardrails, the implications of designating Anthropic as a supply chain risk, and the broader impact on the defense sector. The conversation also touches ...

Mark as Played
February 24, 2026 22 mins

Summary

In this episode, Adam and Andy explore the security challenges and risks associated with OpenClaw, an AI assistant with extensive system access, highlighting recent incidents, vulnerabilities, and best practices for security in AI development.

----------------------------------------------------

YouTube Video Link: https://youtu.be/TGAbhPQa9iw

----------------------------------------------------

Documentation:

https://www.zdnet.c...

Mark as Played
February 24, 2026 22 mins

Summary

In this episode, Adam and Andy explore the security challenges and risks associated with OpenClaw, an AI assistant with extensive system access, highlighting recent incidents, vulnerabilities, and best practices for security in AI development.

----------------------------------------------------

YouTube Video Link: https://youtu.be/TGAbhPQa9iw

----------------------------------------------------

Documentation:

https://www.zdnet.c...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant cybersecurity incidents involving Notepad++ and 7-Zip, highlighting the vulnerabilities in open-source software and the importance of enterprise software management. They emphasize the need for ad blockers, the challenges of identifying legitimate software downloads, and the necessity of implementing robust security measures in organization...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant cybersecurity incidents involving Notepad++ and 7-Zip, highlighting the vulnerabilities in open-source software and the importance of enterprise software management. They emphasize the need for ad blockers, the challenges of identifying legitimate software downloads, and the necessity of implementing robust security measures in organization...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the evolving landscape of cybersecurity training, particularly in light of generative AI and the limitations of traditional phishing simulations. They argue that expecting employees to outsmart sophisticated cybercriminals is unrealistic and emphasize the need for a robust security architecture that assumes clicks will happen. The conversation then shi...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the evolving landscape of cybersecurity training, particularly in light of generative AI and the limitations of traditional phishing simulations. They argue that expecting employees to outsmart sophisticated cybercriminals is unrealistic and emphasize the need for a robust security architecture that assumes clicks will happen. The conversation then shi...

Mark as Played
February 3, 2026 24 mins

Summary


In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the intersection of cybersecurity, user rights, and the evolving landscape of threats. They explore the importance of understanding the rights individuals have when interacting with law enforcement. The conversation also touches on one's rights at the border. Throughout the episode, the hosts emphasize the need for actionable insights an...

Mark as Played
February 3, 2026 24 mins

Summary


In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the intersection of cybersecurity, user rights, and the evolving landscape of threats. They explore the importance of understanding the rights individuals have when interacting with law enforcement. The conversation also touches on one's rights at the border. Throughout the episode, the hosts emphasize the need for actionable insights an...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security. They discuss the importance of data classification and identification, the challenges of data loss prevention, and the significance of lifecycle management in maintaining data integrity. The conversation emphasizes the need for a strong security culture within organizations, highlig...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam, along with expert Amren Gill, delve into the critical topic of data security. They discuss the importance of data classification and identification, the challenges of data loss prevention, and the significance of lifecycle management in maintaining data integrity. The conversation emphasizes the need for a strong security culture within organizations, highlig...

Mark as Played
January 20, 2026 36 mins

Summary

In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the latest AI security concerns facing leaders today. They discuss a World Economic Forum report highlighting the divergence in priorities between CEOs and CISOs, with CEOs focusing on cyber-enabled fraud and AI vulnerabilities, while CISOs are more concerned with ransomware and supply chain resilience. The episode also covers the growing...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the challenges faced in the job market, particularly the rise of scams on platforms like LinkedIn. They emphasize the importance of verifying recruiters and job postings to avoid falling victim to scams. The conversation then shifts to the vulnerabilities associated with AI tools, particularly a recent incident involving Google Gemini Enterprise, highl...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in Microsoft's security protocols, particularly regarding Kerbroasting and the transition from RC4 to AES encryption. They delve into the challenges surrounding the adoption of passkeys, emphasizing the need for user education and the importance of credential managers. The conversation highlights the friction users face when tra...

Mark as Played
December 30, 2025 38 mins

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss key cybersecurity predictions for 2026, focusing on the rise of agentic AI, quantum computing threats, deepfakes, the expanding attack surface due to IoT, the evolution of cybercrime into corporate structures, and the necessity for cybersecurity to be viewed as a strategic business pillar. They emphasize the importance of data security and the need for...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the Security Maturity Model, focusing on identity security. They explore the current state of security practices, identifying areas where organizations may be behind the curve, on track, or ahead of the curve in their security measures. Key topics include the importance of multi-factor authentication (MFA), the transition to passwordless authentication...

Mark as Played

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates in cybersecurity, including Microsoft's overhaul of its bug bounty program, CISA's hiring strategy amidst workforce challenges, the US's shift towards a more aggressive cyber strategy, and insights from the updated OWASP Top 10 vulnerabilities. The conversation emphasizes the importance of security research, the evolving...

Mark as Played
December 9, 2025 42 mins

Summary

In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the growing cybersecurity threat posed by the Chinese state-sponsored group, Salt Typhoon. They discuss the group's tactics, motivations, and the implications for global security. The conversation highlights China's strategic focus on economic power as a means of national security, their long-term approach to cyber warfare, and the emerging ...

Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Betrayal Season 5

    Saskia Inwood woke up one morning, knowing her life would never be the same. The night before, she learned the unimaginable – that the husband she knew in the light of day was a different person after dark. This season unpacks Saskia’s discovery of her husband’s secret life and her fight to bring him to justice. Along the way, we expose a crime that is just coming to light. This is also a story about the myth of the “perfect victim:” who gets believed, who gets doubted, and why. We follow Saskia as she works to reclaim her body, her voice, and her life. If you would like to reach out to the Betrayal Team, email us at betrayalpod@gmail.com. Follow us on Instagram @betrayalpod and @glasspodcasts. Please join our Substack for additional exclusive content, curated book recommendations, and community discussions. Sign up FREE by clicking this link Beyond Betrayal Substack. Join our community dedicated to truth, resilience, and healing. Your voice matters! Be a part of our Betrayal journey on Substack.

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by Audiochuck Media Company.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2026 iHeartMedia, Inc.