Risky Business Features Podcast

Analysis and news podcasts published weekly

A builder's perspective on Mythos and frontier models

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode, James Wilson is joined by entrepreneur and investor Yaniv Bernstein to discuss Anthropic’s Mythos through the lens of startups and growing businesses. Yaniv is Google’s former VP of Engineering, and is former VP Eng and COO at Airtasker. He’s now an investor and advisor to startups and he co-hosts The Startup Podcast.

A builder's perspective on Mythos and frontier models
0:00 / 32:39

Mythos and 0day: Fixing exploits is not safety

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode, James Wilson is joined by Brad Arkin who provides a CISO’s perspective on Anthropic’s Mythos. As former CISO at Adobe, Cisco and Salesforce, Brad’s perspective challenges the notion that finding and fixing exploits makes us safer.

Mythos and 0day: Fixing exploits is not safety
0:00 / 21:12

Mythos and 0day: A hacker’s perspective

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode of Risky Business Features, James Wilson chats to professional hacker Jamieson O’Reilly about Anthropic’s Mythos and the impact it could have on offensive security. Jamieson is CEO of DVULN and co-founder of Aether AI. He’s been hacking into organisations for more than a decade, and knows a thing or two about combining AI and offensive security.

Mythos and 0day: A hacker’s perspective
0:00 / 32:54

What happens after North Korea infiltrates?

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode, investigative journalist Geoff White joins James Wilson for a look into the complex machine that is North Korea’s IT worker infiltration scheme. They discuss the interview process, what happens once the workers are actually hired, how value is maximised for the regime, and how the money moves around. It’s even more diabolical than the headlines divulge.

What happens after North Korea infiltrates?
0:00 / 51:39

Why CISOs need to be more flexible in the AI era

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode, James Wilson chats with Brad Arkin (former CISO of Adobe, Cisco and Salesforce) to talk about the mounting pressure that CISOs are under in the AI era. Attackers are operating at unprecedented scale, and internal users are adopting AI faster than security teams can keep up. This requires CISOs to bend on things that would have otherwise been a hard-no in the past, and revisit some fundamental controls that might have seemed too difficult previously.

Why CISOs need to be more flexible in the AI era
0:00 / 18:51

A Risky Biz Experiment: Hunting for iOS 0day with AI

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this sort-of-solo episode, James Wilson is “joined” by one of his OpenClaw AI agents for a chat about whether or not an LLM can understand, modify or even create a sophisticated nation-state grade iOS exploit kit. Technically this podcast is James having a conversation with himself, but the exchange is illuminating. It turns out LLMs can really help with finding 0day, even in mature code repos like WebKit.

A Risky Biz Experiment: Hunting for iOS 0day with AI
0:00 / 56:10

Interview: Former NSA and CIA cyber leaders on offensive AI

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this interview you’ll hear former NSA executive Rob Joyce and former CIA cyber intelligence leader Andy Boyd talk to host Patrick Gray about how AI is changing the state of art in offensive security.

Recorded in front of a live audience at the Decibel Oasis side event next door to the RSA Conference in San Francisco, the trio also talk about why a series of iOS exploit chain leaks don’t seem to be stirring up a scandal.

Interview: Former NSA and CIA cyber leaders on offensive AI
0:00 / 15:04

When disaster strykes

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode of Risky Business Features, James Wilson and Brad Arkin discuss the attack that devastated medtech company Stryker. It turns out the attackers used Microsoft’s inTune to wipe the company’s devices, but what else could they have weaponised?

This podcast basically turned into an incident review of the Stryker incident. Enjoy!

When disaster strykes
0:00 / 40:00

MCP is Dead

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

James Wilson delivers his take on the state of the Model Context Protocol (MCP) in this solo episode of Risky Business Features. Despite MCP being the technology that made Large Language Models useful and AI Agents possible, the models have shown us they want to use something else instead. They want to use the shell directly, and that is going to have serious cybersecurity consequences.

MCP is Dead
0:00 / 36:42

They don't break in, they log in. What's an enterprise to do?

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this podcast James Wilson chats with Brad Arkin about how enterprises can better deal with attackers logging in with valid credentials. Stolen identities, weak special-use credentials, over-scoped API keys are the new zero-day and they’re abundantly available to attackers. Sadly, the solution here isn’t as simple as deploying phishing resistant MFA. Fixing this takes an enterprise identity strategy.

They don't break in, they log in. What's an enterprise to do?
0:00 / 32:02