Episodes

  • S1 E14 - Should Governments Make It Illegal To Pay Cyber Extortion Demands?
    Feb 25 2025

    Ever wonder what would happen if paying cyber ransom demands was flat-out illegal?

    In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that.

    Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation.

    We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax.

    We dig into the controversial issue of banning ransomware payments, asking if companies should be forced to fend off attackers without cutting that check.

    Real-world experiences and high-profile cases reveal the dangers of flawed decryption keys, repeated attacks, and the temptation to rely on quick fixes instead of building stronger defenses.

    Ross’s entrepreneurial insights show why cybersecurity investments might be a better bet than gambling on a criminal’s word.

    We also explore how government incentives and cyber insurance could reshape security strategies, pushing organizations to harden their defenses rather than pay their way out of trouble.

    The parallels between cybersecurity and healthcare come into focus, highlighting why threat visibility and information sharing are so crucial.

    Throughout the episode, we touch on the often-overlooked risks in operational technology and celebrate the growing influence of Chief Information Security Officers.

    Their leadership—and the rise of trusted information-sharing networks—could spell a more secure future.

    But it’s a team effort: everyone from executives to engineers plays a role in making it happen.

    Join us for an engaging discussion that blends humor, entrepreneurship, and real talk about the crossroads of innovation and cybersecurity.

    Tune in to Cyber After Hours to see how these stories and perspectives might just shape the way we tackle cyber threats moving forward.

    Ever wonder how facial hair fundraisers and cybersecurity connect?

    In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.

    From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned.

    We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and data loss prevention.

    We also delve into the importance of trust—both within cybersecurity teams and with vendors and executives—highlighting how collaboration can make or break your security posture.

    Throughout the episode, we share personal stories that reflect the passion, resilience, and occasional hilarity of working in cyber.

    Whether you’re a tech novice or a seasoned professional, this episode offers insights, camaraderie, and a glimpse into the spirited life of cybersecurity experts.

    Tune in, join the conversation, and learn how to fortify your defenses against the unknown!

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    1 hr and 10 mins
  • S1 E13 - The Role of AI in Offensive Cybersecurity
    Feb 22 2025

    AI: The Ultimate Hacker or Cybersecurity’s Best Ally?

    In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys?

    AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before.

    Financial services and other regulated industries are left wondering:

    - Can they afford to stick with the status quo?

    - And what happens when AI starts battling itself?

    - How far off is a world where autonomous AI defends against AI-driven attacks?

    Spoiler: There’s an Irish whiskey bet riding on this one.

    Of course, it wouldn’t be Cyber After Hours without a few detours—like our take on Microsoft’s latest strong-arming tactics with Outlook (seriously, who asked for this?).

    Plus, we get personal about the entrepreneurial grind and the unexpected lessons that come with it.

    So, grab a drink, tune in, and let’s talk about the future of offensive AI in cybersecurity—because ready or not, it’s already here.

    Ever wonder how facial hair fundraisers and cybersecurity connect?

    In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.

    From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned.

    We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and data loss prevention.

    We also delve into the importance of trust—both within cybersecurity teams and with vendors and executives—highlighting how collaboration can make or break your security posture.

    Throughout the episode, we share personal stories that reflect the passion, resilience, and occasional hilarity of working in cyber.

    Whether you’re a tech novice or a seasoned professional, this episode offers insights, camaraderie, and a glimpse into the spirited life of cybersecurity experts.

    Tune in, join the conversation, and learn how to fortify your defenses against the unknown!

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    57 mins
  • S1 E12 - What Cybersecurity Lessons Can We Learn From Recent Breaches?
    Feb 22 2025

    Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies?

    In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub.

    Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity.

    We dig into big-picture lessons from some high-profile breaches, exploring how data sprawl, the jump from on-prem to cloud, and the rise of AI have completely changed the security game.

    Omri also highlights the balance between unleashing innovation and staying compliant, reminding us how quickly tech advances—and how our defenses have to keep up.

    Our final deep dive zeroes in on why cybersecurity education and clear-eyed leadership matter so much.

    Whether you’re in the C-suite or managing front-line systems, Omri shares practical tips to make security everyone’s job.

    We wrap up with a pragmatic look at risk management—ultimately, it’s about dialing up your defenses just enough to keep the bad actors at bay without stifling the business you’re trying to protect.

    Join us for a conversation that blends lighthearted conference antics with serious intel on staying a step ahead of emerging threats.

    If you’re ready to sharpen your security know-how and pick up a few swag-hunting tips along the way, this episode is a must-listen.

    Enjoy the show and let us know your favorite takeaway!

    Thank you for watching / listening!

    Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    47 mins
  • S1 E11 - CISO vs. CTO: Defining Roles and Responsibilities in Security
    Feb 22 2025

    Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy?

    In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares.

    Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene.

    If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light.

    The conversation then shifts to the ever-evolving dance between CISOs and CTOs, where roles can blur depending on factors like company size and regulatory pressure.

    From personal anecdotes that highlight real-world adaptations to the subtle ways these roles overlap, we explore how today’s CISOs often juggle legal, technical, and operational responsibilities, while CTOs focus on infrastructure and operations.

    It’s a fascinating look at how businesses align these positions to stay compliant, efficient, and secure.

    Finally, we dig into the transformative power of technology and the competitive edge that emerges when security is woven into every phase of software development.

    The CIA triad—confidentiality, integrity, availability—gets a fresh spin here as a must-have foundation for any robust security strategy.

    And with identity management playing a starring role, it’s clear that integrating security from the ground up is more than just a best practice—it’s a recipe for success in our hyper-connected world.

    Tune in to discover how prioritizing security can set your organization apart and why seamless identity management might just be the key to thriving in the digital age.

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    45 mins
  • S1 E10 - The Future of Network Security: SASE, SD-WAN, and Beyond
    Feb 22 2025

    Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security?

    That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond.

    In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work.

    Once the jokes (and glasses) are topped off, we dive into the real meat: SASE and SD-WAN.

    We break down how these technologies are reshaping the old fortress mentality in network security.

    Say goodbye to the traditional perimeter and hello to modern, cloud-first proxies, firewalls, and DLP solutions built for today’s fast-moving IT world.

    Drawing on our engineering and operational chops, we clarify what’s what—like the subtle differences between LANs and WANs—and lay out a future vision of network security that might have you rethinking your entire setup ten years from now.

    But it’s not all tech talk; we also explore the financial and strategic reality of on-prem vs. cloud.

    From hidden costs and hybrid pitfalls to the absolute need for consistent security tools, we highlight why thoughtful, business-aligned planning is crucial.

    Finally, we raise our glasses to celebrate the camaraderie that keeps cybersecurity exciting—because at the end of the day, it’s our shared passion that drives every late-night troubleshooting session and ambitious network overhaul.

    Cheers to that, and cheers to you for joining us on this journey into the next frontier of network security!

    Thank you for watching / listening!

    Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    56 mins
  • S1 E09 - The Future of Cyber Threat Intelligence: Open Source vs. Proprietary
    Feb 22 2025

    Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together?

    In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales.

    Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats.

    From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the hands-on effort of free data to the plug-and-play appeal of curated subscriptions.

    We revisit the legendary bank DDoS incidents, highlighting how real-time intel sharing and genuine collaboration saved more than just the day—it saved reputations.

    Of course, we can’t forget the occasional “cyber theater” that plagues our industry, reminding everyone to invest in tools that actually protect, not just impress.

    We wrap up with a lively discussion on the nuts and bolts of building a threat intelligence program (yes, we even chat about budget surprises and potential tax write-offs).

    Laughter and lessons learned go hand in hand in this episode, so whether you’re a seasoned security pro or new to the intel game, you’ll find camaraderie, fresh insights, and plenty of fun.

    Grab your leftovers, tune in, and join us on this entertaining journey through the ever-evolving world of cyber threat intelligence!

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    50 mins
  • S1 E08 - Patch Management: How to Handle Zero-Day Vulnerabilities
    Feb 22 2025

    Ever wonder how facial hair fundraisers and cybersecurity connect?

    In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.

    From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned.

    We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and data loss prevention.

    We also delve into the importance of trust—both within cybersecurity teams and with vendors and executives—highlighting how collaboration can make or break your security posture.

    Throughout the episode, we share personal stories that reflect the passion, resilience, and occasional hilarity of working in cyber.

    Whether you’re a tech novice or a seasoned professional, this episode offers insights, camaraderie, and a glimpse into the spirited life of cybersecurity experts.

    Tune in, join the conversation, and learn how to fortify your defenses against the unknown!

    Thank you for watching / listening! Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    48 mins
  • S1 E07 - Cyber Hygiene: The Overlooked Essentials
    Feb 22 2025

    Ever catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats?

    In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches.

    We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm.

    It’s part comedy, part cautionary tale, and it sparks a lively debate about the fact that some scammers are themselves backed into a corner, while others are flat-out villains.

    From there, we pivot to the basics of cyber hygiene, comparing outdated accounts and poorly maintained inventories to that messy drawer you keep meaning to organize.

    Turns out, decluttering your digital life can make a huge difference in stopping threats before they become full-blown problems.

    We also unpack how a structured approach to evaluating security tools can help separate the real deal from the snake oil.

    Finally, we highlight the struggles that small and medium-sized businesses face in a market often overloaded with expensive enterprise products.

    Whether it’s exploring open-source gems like OpenVAS or juggling too many security tasks on a tight budget, we offer practical ways to keep your defenses strong without breaking the bank.

    If you’ve ever felt overwhelmed by endless security demands, this episode is a must-listen.

    Join us for fresh perspectives, some well-earned laughs, and tips you can put into action right away.

    Thank you for watching / listening!

    Connect with us on LinkedIn: - Evan: https://www.linkedin.com/in/evanmorgan/ - Paul: https://www.linkedin.com/in/pm01/ Want to do business with us? - Evan, Founder, Cyber Defense Army: https://www.cyberdefensearmy.com/ - Paul, Co-Founder, TALAS Security: https://www.talas.io/

    Show more Show less
    48 mins