Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Hidden Threads explores the intriguing and often untold stories behind private investigators' most puzzling and high-stakes cases. Each episode delves into the hidden connections, dark secrets, and unexpected twists uncovered by PI’s as they navigate the shadows of truth. 4o mini
…
continue reading
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
…
continue reading

1
Red Teaming the Unbreachable: Hacking Cyber and Physical Security Systems
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17Join Macky and Jus as they dive into the high-stakes world of red teaming, where experts simulate real-world attacks to expose vulnerabilities in cyber and physical security systems. From sneaking past state-of-the-art surveillance to cracking cutting-edge encryption, they explore the tactics, ethics, and adrenaline-pumping challenges of stress-tes…
…
continue reading

1
Securing the Foundation: Essential First Steps for Cyber-Physical System Deployment
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Deploying new CPS devices and applications is an often-overlooked part of reducing corporate risk, as it sets the stage for making efficient ongoing vulnerability remediation and cyber hygiene. Join Vince and Angela as they discuss the most important steps you should take in setting things up properly for sustainable cyber hygiene. Sponsored by Via…
…
continue reading

1
Christiaan Beek on Ransomware's Evolution and Economics
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. I…
…
continue reading

1
From Cyber to Physical: Tackling Modern Hybrid Threats with John Cohen
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53Welcome to a brand new episode of To the Point Cybersecurity! This week, hosts Rachael Lyon and Jonathan Knepher are joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security. With more than forty years of experience in law enforcement, counterintelligence, and homeland security, John …
…
continue reading

1
Taking the Stand: Macky & Jus on Court Testimony for PIs and Expert Witnesses
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47In this compelling episode, Macky and Jus dive into the high-stakes world of court testimony for private investigators and expert witnesses. They explore the dos and don’ts of presenting evidence, handling cross-examinations, and maintaining credibility in the courtroom. From preparing airtight reports to navigating tricky legal questions, they sha…
…
continue reading

1
Uncovering Alimony Secrets: Macky & Jus Dive into Cohabitation Investigations
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39Macky and Jus tackle the murky world of alimony investigations, focusing on the art of proving cohabitation. From stakeouts to digital sleuthing, they break down the tactics used to uncover hidden relationships that could end alimony payments. Expect real-world case stories, legal insights, and a few jaw-dropping surprises as they reveal what it ta…
…
continue reading

1
Simplifying risk analysis using FAIR and Wiley Coyote with Jack Freund
8:35
8:35
Play later
Play later
Lists
Like
Liked
8:35A while back we were fortunate enough to spend time with Jack Freund, coauthor and thought leader responsible for bring the FAIR methodology and practice into the main stream. A bonus from that original recording is now an espresso shot discussing how to fast track an assessment when the threat vectors are numerous. While the metaphor Jack used is …
…
continue reading

1
Preparing for Quantum Computing: Future-Proofing Cybersecurity with Bill Anderson
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46Welcome back to the To the Point cybersecurity podcast! In this episode, co-hosts Rachael Lyon and Jonathan Knepher are joined once again by Dr. Bill Anderson, Principal Product Manager at Mattermost and founder of Oculus, for a deep dive into some of the most pressing cybersecurity topics of today. Bill draws on his background in cryptography and …
…
continue reading

1
Bridging the Skills Gap: Effective Cybersecurity Leadership and Collaboration with Bill Anderson
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this episode of the "To the Point Cybersecurity" podcast, hosted by Jonathan Knepher and Rachael Lyon, we delve into the intricate world of cybersecurity with Dr. Bill Anderson, the Principal Product Manager at Mattermost. With a focus on AI, quantum cryptography, and secure communications, Bill brings a wealth of experience from his time in the…
…
continue reading

1
Unraveling Justice: Edwards, Gideon, and the Limits of Public Defenders
21:21
21:21
Play later
Play later
Lists
Like
Liked
21:21In this episode of Hidden Threads, Macky and Jus dive into two landmark Supreme Court cases—Edwards v. Arizona and Gideon v. Wainwright—that reshaped the right to counsel in America. They unpack how these rulings aimed to protect the accused but reveal the cracks in the system, spotlighting the often-overwhelmed and underfunded public defender mode…
…
continue reading

1
Unraveling Infidelity: Macky and Jus Spot the Signs
16:00
16:00
Play later
Play later
Lists
Like
Liked
16:00In this episode of Hidden Threads, Macky and Jus tackle the sensitive topic of adultery with their usual mix of empathy, insight, and straight talk. They explore the signs that might suggest infidelity in relationships—from changes in behavior and unexplained absences to digital clues and emotional distance. Sharing real-world anecdotes and listene…
…
continue reading

1
CPS Cyber Attacks Go Physical - Sewage Surges, Poisoned Water, and Risks of CPS Failure
5:11
5:11
Play later
Play later
Lists
Like
Liked
5:11Sometimes you can't help see in the news some startling examples of CPS cybersecurity failures. Vince and Angela dive into why these are happening and how organizations can be better prepared to not have literal shit hitting the fan. Sponsored by Viakoo: www.viakoo.comBy John
…
continue reading

1
CPS Security At The Center of Typhoon Threats
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01For operators of enterprise CPS environments (IoT, OT, and ISC) the cybersecurity storm threat has never been greater, and its coming in the form of Typhoons. Angela and Vince discuss how organizations should be aware of these threats and examine their own CPS deployments. Sponsored by Viakoo: www.viakoo.com…
…
continue reading

1
Decoding The CPS Security Deluge: Managed Services
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Many organizations are not able to keep up with their CPS security issues, putting thier organizations at significant risk. Angela and Vince discuss why managed services is a critical part of your cybersecurity and CPS protection strategy. Sponsored by Viakoo: www.viakoo.comBy John
…
continue reading

1
CPS Devices are Powerful and a Hackers Playground
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Whether it's advanced NPUs and TPUs, custom memory, or advanced networking, todays CPS devices are incredibly powerful. Angela and Vince do a deep dive into the mechanics of why CPS deployments are a Hackers Paradise. Sponsored by Viakoo: www.viakoo.comBy John
…
continue reading

1
CPS Security: Mitigation is a Mirage, Remediation is Reality
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39When it comes to Cyber-Physical Systems there must always be a path to remediation. Join Angela and Vince as they discuss why you should never stop at mitigation. Sponsored by Viakoo: www.viakoo.comBy John
…
continue reading

1
Cyber Experience Matters: Tackling Industry Challenges with Saaim Khan Part 2
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54In this exciting episode of "Forcepoint's To the Point Cybersecurity Podcast," hosted by Rachael Lyon and co-hosted by Jonathan Knepher, we dive back into conversation with Saaim Khan, founder, and principal adviser at Cyber Matters. Known for redefining the cyber consulting landscape with an "unconsults" approach, Saaim shares engaging stories and…
…
continue reading

1
Cyber Experience Matters: Tackling Industry Challenges with Saaim Khan
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45Welcome back to the Forcepoint podcast, where we bring you the latest in global cybersecurity. Today, we're diving into part one of our two-part series with Saaim Khan, founder and principal advisor at Cyber Matters. Saaim is redefining cyber consulting with an "unconsult" approach. In this episode, hosts Rachael Lyon and Jonathan Knepper engage Sa…
…
continue reading

1
Stand Your Ground: Self-Defense or Slippery Slope?
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15In this gripping episode of The Macky and Jus Show, hosts Macky and Jus dive deep into the controversial world of Stand Your Ground laws. They unpack the origins, implications, and real-world outcomes of these self-defense statutes, debating their impact on justice, public safety, and individual rights. From high-profile cases to the ethical gray a…
…
continue reading

1
Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39Florence Hudson, working group chair of the IEEE/UL 2933 standard and framework for Clinical IOT Data and Device Interoperability with TIPPSS, joins the Nexus Podcast. Published last September, the standard establishes a framework for secure data exchanges between clinical IoT and medical devices and systems. The frameworks is based on TIPPSS princ…
…
continue reading

1
Unmasking the Mind Games: Macky and Jus Dive into Narcissism and Gaslighting
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47In this gripping episode, Macky and Jus unravel the tangled web of narcissism and gaslighting. From subtle manipulations to outright mind games, they explore how these toxic behaviors play out in relationships, workplaces, and beyond. With their signature blend of insight and humor, the duo digs into real-life examples, psychological tactics, and p…
…
continue reading

1
SMB Resilience and lessons for larger organizations with Rochelle Clarke
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44At 45-50%, depending on your statistical source, there is no denying that small to medium sized businesses are a significant economic engine from both an employment and innovation perspective. In 1978 Microsoft numbered 11 people. Unfortunately small businesses are also the least likely to survive a major disruption, an experience that changed Roch…
…
continue reading

1
Understanding Behavioral Biometrics with Zighra's Founder Deepak Dutt
45:57
45:57
Play later
Play later
Lists
Like
Liked
45:57Welcome to another episode of "To the Point Cybersecurity," brought to you by Forcepoint. This week, hosts Rachael Lyon and Jonathan Knepper are joined by Deepak Dutt, the founder and CEO of Zighra. With over a decade of experience in behavioral biometrics, Deepak provides fascinating insights into the intersection of artificial intelligence, senso…
…
continue reading

1
On the Trail: Macky and Jus Discuss Tracking Vehicles with GPS Devices
18:42
18:42
Play later
Play later
Lists
Like
Liked
18:42Join Macky and Jus in this gripping episode as they dive into the world of vehicle tracking using GPS devices. From high-stakes surveillance to everyday applications, the duo shares their expert insights, real-life stories, and the latest tech tips for staying one step ahead. Whether you're a pro or just curious, this episode is packed with strateg…
…
continue reading

1
Macky & Jus Unpack the Apprentice Program: Skills, Struggles, and Success
23:51
23:51
Play later
Play later
Lists
Like
Liked
23:51In this episode, Macky and Jus dive into the world of the Apprentice Program, breaking down what it takes to thrive in this hands-on learning experience. From the skills you’ll master to the challenges that test your grit, they share insights, stories, and hot takes on how this program shapes the next generation of talent. Whether you’re an apprent…
…
continue reading

1
Mike Holcomb on Starting and Succeeding in OT Cybersecurity
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40Mike Holcomb, global lead for ICS and OT cybersecurity at Fluor, joins the Nexus Podcast to discuss his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems. Mike produces and hosts a learning series available for free on YouTube called "Getti…
…
continue reading

1
Michele Rigby Assad on Cybersecurity: Tackling Modern Threats and Information Security Part 2
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15Welcome back to the To the Point cybersecurity podcast, presented by Forcepoint! In this episode, hosts Rachael Lyon and Jonathan Knepper continue their engaging conversation with Michele Rigby Assad, a former CIA intelligence officer and renowned author of "Breaking Cover" and "Get Off the X." Join us as Michele shares her unique insights into the…
…
continue reading

1
Pain, Gains, and Good Times: Macky and Jus Break Down Their Toughest and Favorite Training Moments
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51In this episode, Macky and Jus dive into the wild world of training, sharing war stories about the most grueling sessions that pushed them to their limits—and the ones that made it all worth it. From brutal hill climbs to euphoric finish lines, they unpack what made these experiences unforgettable, swapping laughs, lessons, and a few hard-earned ti…
…
continue reading

1
Tracking the Untrackable: A Marine Sniper and Cop Unravel Mantracking Secrets
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16oin Macky, a former Marine sniper with a knack for reading the rural wilderness, and Jus, a seasoned police officer who’s hunted fugitives through urban sprawls, as they dive into the gritty art of mantracking. From blood trails in alleys to dust clouds in deserts, they swap stories, tactics, and hard-won lessons on stalking the ultimate prey—human…
…
continue reading

1
Behind the License: Macky & Jus Tackle Miranda, Terry, Brady, and the Fourth
27:38
27:38
Play later
Play later
Lists
Like
Liked
27:38Today, private investigator duo Macky and Jus dive deep into the legal playbook that shapes their world on the streets. From the landmark Miranda v. Arizona ruling and its famous “you have the right to remain silent” line to the nitty-gritty of Terry frisks and stop-and-search tactics, they break it all down with a PI’s eye. They’ll also unpack Bra…
…
continue reading

1
Cracking the Case: How to Track Down Macky & Jus for Your Investigation
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Today, Macky and Jus, your favorite private investigator duo, reveal the insider scoop on how to enlist their sleuthing skills for your next big case! From cryptic late-night calls to staking out their favorite diner, they dish on the best ways to get in touch and kick off an investigation. With wild stories and pro tips on what they need to hit th…
…
continue reading

1
Michele Rigby Assad on Cybersecurity: Tackling Modern Threats and Information Security
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26In this episode of the "To the Point cybersecurity podcast," hosts Rachael Lyon and Jonathan Knepper dive into a compelling conversation with Michele Rigby Assad, a former CIA intelligence officer with vast experience in The Middle East. Michele shares insights from her latest book, "Get Off the X," which explores the importance of getting out of o…
…
continue reading

1
Trailblazers & Grit: Macky & Jus Break Down the Marine Corps Leadership Traits
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09Join Macky Outlaw and Jus as they dig into the battle-tested Marine Corps Leadership Traits – the 14 principles that turn grunts into legends. From the grit of dependability to the guts of decisiveness, the duo unpacks how these traits shape warriors and winners alike. Whether you’re tracking a target or leading a team, Macky’s PI edge and Jus’s st…
…
continue reading

1
Death Row Diaries: The Story of Paul Everett
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56In this gripping episode, we dive into the chilling case of Paul Everett, a man currently awaiting his fate on death row. Convicted of a brutal crime that shocked a community, Everett’s story raises haunting questions about justice, guilt, and the ultimate penalty. We’ll explore the details of the murder that landed him here, the twists of his tria…
…
continue reading

1
Macky & Jus Dive Deep into Victimology: Unpacking the Layers
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In this gripping episode, Macky and Jus sit down to explore the complex world of victimology. From the psychological impacts on victims to the societal factors that shape their experiences, the duo unravels the layers behind crime’s often-overlooked casualties. Expect sharp insights, real-world examples, and a lively debate as they tackle tough que…
…
continue reading

1
Unmasking Cybercrime: Trevor Hilligoss on Tackling Infostealers and Ransomware, Part II
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39Welcome to Part 2 of this To the Point cybersecurity podcast episode, brought to you by Forcepoint. This week, hosts Rachael Lyon and Jonathan Knepper continue their conversation with Trevor Hilligoss, Senior Vice President at SpyCloud Labs. In this episode, Trevor provides an in-depth look at the rising use of infostealers, the changing tactics of…
…
continue reading

1
Troll Patrol: Macky Outlaw Roasts His Social Media Haters
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51In this laugh-out-loud episode, your host Macky Outlaw, the PI with a punchline, and my trusty sidekick Jus Majusiak take a wild ride through the dumpster fire of my social media mentions and negative Google reviews. I dig into the most ridiculous, unhinged, and downright savage comments and one-star rants from keyboard warriors and unhappy ‘client…
…
continue reading

1
Seeking Truth: Macky Outlaw and Jus Majusiak Tackle Wrongful Death Cases
24:01
24:01
Play later
Play later
Lists
Like
Liked
24:01In this powerful episode, your host Macky Outlaw, a seasoned private investigator, and my trusty sidekick Jus Majusiak dive into the complex world of wrongful death cases. I bring my expertise from years of uncovering hidden truths, while Jus adds his keen insights and quick wit to the mix. Together, the two of us explore the challenges, heartbreak…
…
continue reading

1
Unmasking Cybercrime: Trevor Hilligoss on Tackling Infostealers and Ransomware, Part I
34:58
34:58
Play later
Play later
Lists
Like
Liked
34:58Welcome to another thrilling episode of the To the Point cybersecurity podcast brought to you by Forcepoint. This week, hosts Rachael Lyon and Jonathan Knepper dive deep into the world of cybercrime with Trevor Hilligoss, the Senior Vice President at SpyCloud Labs. Trevor brings his expertise to the table, sharing insights into the intricate workin…
…
continue reading

1
Unveiling the Qualities of a Great Private Investigator
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46In this thrilling episode, host Macky Outlaw, a veteran private investigator, teams up with his sharp-witted sidekick Jus Majusiak to break down the must-have qualities of a stellar PI. From keen observation skills to unshakable persistence, Macky draws on his years of experience while Jus brings fresh perspective and plenty of banter. Join the duo…
…
continue reading

1
Cheaters Beware - Evidence That Breaks the Affair Wide Open
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36In this steamy episode, seasoned private investigators Macky Outlaw and Jus Majusiak pull back the curtain on the art of catching cheaters—and why solid evidence is the key to cracking adultery cases. From grainy photos to burner phone slip-ups, the duo dives into the nitty-gritty of how they’ve nailed high-profile philanderers, sharing wild tales …
…
continue reading

1
Ron Fabela on Low-Skilled OT and ICS Threat Actors
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33Ron Fabela of ABS Consulting joins the Nexus Podcast to dispel some of the myths surrounding threat actors targeting operational technology and industrial control systems. Groups such as the Russian Cyber Army, UserSec, and the CyberAv3ngers have different ideological motivations, and have decidedly carried out low-impact attacks on OT. Fabela cove…
…
continue reading

1
The Unsolved Horror of the 1977 Girl Scout Murders and Gilgo Beach
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04In this gripping double-feature episode, Macky Outlaw and Jus Majusiak tackle two of America’s most haunting unsolved cases. First, they revisit the 1977 Girl Scout murders at Camp Scott, Oklahoma, where three young girls—Lori Farmer, Michelle Guse, and Denise Milner—met a brutal end, leaving suspect Gene Leroy Hart’s guilt in question. Then, they …
…
continue reading

1
Addressing Risk and Cyber Resilience, the Alberta Approach - with Rachel Hayward
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13A surprising number of digital innovations began in Alberta, be it the world's first public digital cellular network in 1985, the DNP3 industrial controls protocol and becoming the first Google international research lab in 2017. CyberAlberta is another innovative collaboration focused on strengthening the cyber resilience of Alberta organizations.…
…
continue reading

1
The Role of Adversary Emulation in Modern Cyber Defense Strategies with Steve Kain
47:27
47:27
Play later
Play later
Lists
Like
Liked
47:27Welcome to another engaging episode of the "To the Point Cybersecurity" podcast, brought to you by Forcepoint. This week, hosts Rachael Lyon and Jonathan Knepher delve into the intersection of sports and cybersecurity with a fascinating guest, Steve Kain, an adversary emulation manager with the Maryland Department of IT. With a background spanning …
…
continue reading

1
From Battlefield to Briefcase: How Marine Skills Shape Private Investigators
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09In this episode of The Hidden Threads Podcast, we sit down with two former Marines turned private investigators to explore how their military backgrounds give them a unique edge in the world of private investigations. From discipline and tactical awareness to interrogation techniques and threat assessment, they break down the skills that translate …
…
continue reading

1
Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Munish Walther-Puri of the Center for Global Affairs at New York University joins the Claroty Nexus podcast to discuss a homegrown severity scale for critical infrastructure cybersecurity incidents. The Infrastructure Cyber Incident Scale, or INCI Scale, brings a Richter-Scale-like criticality index to incidents based on the intensity, magnitude, a…
…
continue reading

1
Crime Scene Deception: The Art of Staging and Misdirection
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12In this episode of The Hidden Threads Podcast, we dive into the intricate world of crime scene staging with seasoned private investigators. From cleverly planted evidence to red herrings designed to mislead law enforcement, we explore how perpetrators manipulate crime scenes to cover their tracks. Our guests share real cases, investigative techniqu…
…
continue reading

1
My First Case: The Highs, Lows, and Lessons Learned
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27In this episode, Macky takes you back to where it all began—his first-ever case. He shares the adrenaline, the challenges, and the unexpected twists that shaped his approach to the profession. Listen in as he reflects on the highs, the lows, and the lessons that came from navigating the unknown in his early days as an investigator.…
…
continue reading

1
Fact vs. Fiction: Debunking Myths About Private Investigations
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30In this episode, a private investigator tackles the biggest myths and misconceptions about private investigations. From Hollywood stereotypes to common misunderstandings, he separates fact from fiction and provides an inside look at what the job really entails. Tune in to uncover the truth behind the mystery!…
…
continue reading