エピソード

  • When the Defender Becomes the Target: Supply Chain Attacks
    2026/04/21

    A natural follow-up to Episode 2 — "The Keys to the Kingdom: Identity & Access Management."

    If identity controls the door, what happens when the attacker doesn't come through the door at all — but arrives pre-installed?

    This episode covers software supply chain attacks, how trusted vendors and pipelines become weapons, and the real-world cases that changed how the industry thinks about trust: SolarWinds, XZ Utils, and 3CX.

    LinkedIn: https://www.linkedin.com/company/cybersectalksRSS feed: https://anchor.fm/s/11139d660/podcast/rss

    続きを読む 一部表示
    32 分
  • The Keys to the Kingdom: Identity & Access Management
    2026/04/14

    A natural follow-up to Episode 1 — "YourLife on Someone Else's System."

    If your life is on someone else's system, who controls the door?

    This episode covers IAM, MFA fatigue attacks, privilege escalation, and the rise of identity as the new perimeter.


    Linkedin: ⁠https://www.linkedin.com/company/cybersectalks

    RSS feed: https://anchor.fm/s/11139d660/podcast/rss


    続きを読む 一部表示
    40 分
  • Your life on someone else's system
    2026/04/10

    How much of your daily life relies on technology?

    In this first episode, Alan and Ada uncover the hidden risks of our digital dependence, from cloud services to everyday apps.


    Linkedin: ⁠⁠https://www.linkedin.com/company/cybersectalks⁠

    RSS feed: ⁠https://anchor.fm/s/11139d660/podcast/rss

    続きを読む 一部表示
    35 分