Obtenez 3 mois à 0,99 $/mois

OFFRE D'UNE DURÉE LIMITÉE
Page de couverture de Security by Default

Security by Default

Security by Default

Auteur(s): Joseph Carson
Écouter gratuitement

À propos de cet audio

Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.Copyright 2025 Joseph Carson Économie
Épisodes
  • Building Trust in Customer Success with David Muniz
    Dec 9 2025

    In this episode of the Security by Default podcast, Joseph Carson engages with David Muniz to explore the evolving landscape of cybersecurity. They discuss the importance of diversity in the field, the distinction between customer success and support, and the critical role of trust in business relationships. The conversation also delves into the Zero Trust paradigm, emphasizing the need for a human-centric approach in cybersecurity. David shares insights on staying updated in a rapidly changing industry and the significance of happiness in the workplace, concluding with thoughts on the human element in cybersecurity.

    Keywords

    cybersecurity, customer success, zero trust, trust in business, diversity in tech, human relationships, customer support, industry insights, happiness in work, staying updated

    Takeaways

    · Customer success focuses on long-term relationships, not just immediate problem-solving.

    · Trust is a key component in building successful customer relationships.

    · Zero Trust is about managing trust dynamically, not eliminating it.

    · Customer success involves understanding what success means to the customer.

    · Building trust requires consistent and reliable service.

    · Human interactions are crucial in customer success, even in a digital world.

    · Customer success can lead to increased revenue through renewals and up-selling.

    · Trust in cybersecurity involves both technical and human elements.

    · Effective customer success strategies can differentiate a company in the market.

    · Balancing security with user experience is essential for customer satisfaction.


    Sound bites

    · "Customer success is about long-term relationships."

    · "Trust is not just assumed; it must be earned."

    · "Zero Trust is about managing trust, not eliminating it."

    · "Success is defined by the customer's perspective."

    · "Human interactions are crucial in a digital world."

    · "Trust leads to increased revenue and loyalty."

    · "Cybersecurity involves both technical and human elements."

    · "Balancing security with user experience is key."

    · "Customer success can differentiate a company."

    · "Trust is a business differentiator."


    Chapters

    00:00 Introduction to Cybersecurity and Guest Background

    04:10 The Importance of Diversity in Cybersecurity

    08:41 Understanding Customer Success vs. Customer Support

    12:52 Building Trust in Customer Relationships

    17:15 The Role of Zero Trust in Cybersecurity

    22:07 Understanding Zero Trust and Its Implications

    27:33 The Dynamic Nature of Trust in Cybersecurity

    32:01 The Human Element in Building Trust


    Additional Resources

    The Trust Paradox: A Cybersecurity Mindset for Human Relationships

    https://www.linkedin.com/pulse/trust-paradox-cybersecurity-mindset-human-david-muniz-f9fzf

    The Hidden ROI of Trust in Business and Cybersecurity...

    Voir plus Voir moins
    42 min
  • Transforming Cybersecurity Awareness Training with Michael Waite
    Dec 3 2025

    In this episode of Security by Default, host Joe Carson sits down with Michael Waite from Dune Security to explore how AI is reshaping cybersecurity and why it’s time to rethink traditional awareness training.

    As cyber threats become more sophisticated, personalized, and AI-powered, organizations can no longer rely on outdated, one-size-fits-all learning models. Joe and Michael break down what modern cybersecurity training should look like, how to engage employees more effectively, and why empowering people both inside and outside the office is essential to strong defense.

    What You’ll Learn
    • How AI is transforming both cyber attacks and defensive strategies
    • Why the volume and quality of phishing attempts continue to rise
    • The limitations of traditional annual awareness training
    • The shift toward personalized, role-based learning
    • How real-time intervention improves security habits
    • Why cybersecurity awareness must extend beyond the workplace
    • Practical ways to engage employees and build a security-first culture
    • The importance of collaboration and communication across teams
    • How threat intelligence informs more effective training programs

    Key Takeaways
    • AI is rewriting the threat landscape.
    • Attackers are faster, more convincing, and more scalable than ever.
    • Generic awareness training is no longer enough.
    • Personalization is essential to reducing real-world risk.
    • Engagement drives stronger security culture and better outcomes.
    • Cybersecurity begins at home, not just at work.
    • Bite-sized, real-time lessons are more effective than long annual videos.
    • Employees are part of the detection engine—and must be empowered accordingly.

    Memorable Quotes
    • “Cybersecurity doesn’t start in the office.”
    • “The one size fits all approach is dead.”
    • “We need to democratize security.”
    • “Let’s give individuals the tools they need.”
    • “We need to make cybersecurity more fun.”
    • “This is my favorite thing to talk about.”

    Episode Chapters

    00:00 – Introduction to the Chaos of Cybersecurity

    03:05 – The Impact of AI on Cybersecurity

    09:40 – Best Practices for Cybersecurity Awareness

    18:51 – Personalizing Cybersecurity Training

    27:00 – Engaging Employees in Cybersecurity

    29:20 – Resources for Further Learning

    Additional Resources:

    https://www.linkedin.com/in/mr-michael-waite/

    https://www.dune.security/

    https://www.dune.security/threat-intelligence-report

    Voir plus Voir moins
    32 min
  • Hacking AI and Building Trustworthy Systems: Insights from Satu Korhonen
    Nov 19 2025

    In this episode of the Security by Default podcast, Joseph Carson and guest Satu Korhonen a passionate practitioner, researcher and founder of Helheim Labs delve into the intersection of AI and cybersecurity. They discuss the challenges and opportunities in creating trustworthy AI systems, the importance of collaboration between AI and cybersecurity professionals, and the role of regulation in ensuring AI safety. Satu shares her journey from education to AI, highlighting key moments and insights from her career. The conversation also touches on the EU AI Act, the importance of understanding AI's limitations, and the need for a balanced approach to AI development.

    Key Takeaways

    • AI systems are fundamentally probability-based, not perfect.
    • Collaboration between AI and cybersecurity is crucial for safety.
    • The EU AI Act focuses on human rights and risk management.
    • Understanding AI's limitations is key to using it effectively.
    • AI can enhance productivity but requires careful implementation.
    • Training AI with both good and bad data improves its robustness.
    • AI should serve humans, not the other way around.
    • Hacking AI can reveal vulnerabilities and improve security.
    • Community events like hacker camps foster innovation and learning.
    • AI's role in society should be carefully considered and discussed.

    Chapters

    00:00:00 Introduction to AI and Cybersecurity

    00:03:00 Satu's Journey into AI

    00:09:00 Trustworthy AI and the EU AI Act

    00:15:00 Challenges in AI and Cybersecurity Collaboration

    00:21:00 The Role of Community and Events in AI

    Resources:

    https://hackai.quest/

    https://helheimlabs.ai/

    https://helheimlabs.ai/about-satu-korhonen/

    https://www.linkedin.com/in/satu-m-korhonen/

    https://why2025.org/

    https://www.ccc.de/en/home

    https://events.ccc.de/en/

    https://disobey.fi/2026/

    Voir plus Voir moins
    40 min
Pas encore de commentaire