• Episode 142 - Printer and IoT Security
    Jan 23 2026

    In this episode, Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to discuss the often-ignored threat of printer and IoT security. Jim reveals a startling set of "winning lottery numbers": printers account for 20% of network endpoints, yet 99% remain unprotected. With 67% of organizations reporting a printer-related security incident last year, these devices serve as a critical yet vulnerable vector for lateral movement and credential harvesting.

    Jim explains this widespread neglect through his "Five O's," citing the lack of a formal Owner and their Origin as business equipment rather than IT endpoints. Because printers process highly sensitive data and frequently lack unified management platforms, they offer a 360-degree risk landscape for cybercriminals. The conversation emphasizes that "locking the front door" by declaring a dedicated security owner and integrating print fleets into a unified security strategy is essential. Symphion provides a turnkey solution to bridge this visibility gap, ensuring these "graveyard endpoints" are hardened, monitored, and securely managed.

    Show More Show Less
    14 mins
  • Cybersecurity Awesomeness Podcast - Episode 141
    Jan 16 2026

    In this episode, Chris Steffen and Ken Buckler discuss the alarming security and privacy implications of the "Internet of All Things." The hosts highlight how manufacturers are connecting everything—from AI-powered treadmills to smart toothbrushes—often without considering the associated risks.

    A primary concern is the shift toward recurring revenue models, where companies gate-keep hardware features behind monthly subscriptions. Beyond the cost, Ken warns of the physical security threats posed by Bluetooth-enabled appliances. He explains how broadcasting devices can inadvertently signal a resident's presence or daily habits to malicious actors in close proximity.

    The discussion also addresses the myth of data anonymization, noting that aggregated consumer data is easily de-anonymized and sold to third parties. The hosts conclude that when a device offers "value-add" connectivity, the consumer’s personal data is often the actual product. They urge listeners to adopt a critical mindset regarding the risk-to-benefit ratio of every connected device they bring into their homes.

    Show More Show Less
    13 mins
  • Cybersecurity Awesomeness Podcast - Episode 140
    Jan 9 2026

    Chris Steffen and Ken Buckler from EMA discuss privacy concerns around generative AI.

    Show More Show Less
    12 mins
  • Cybersecurity Awesomeness Podcast - Episode 139
    Dec 19 2025

    Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.

    Show More Show Less
    16 mins
  • Cybersecurity Awesomeness Podcast - Episode 138
    Dec 12 2025

    Chris Steffen and Ken Buckler from EMA discuss API security.

    Show More Show Less
    16 mins
  • Cybersecurity Awesomeness Podcast - Episode 137
    Dec 5 2025

    Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.

    Show More Show Less
    11 mins
  • Cybersecurity Awesomeness Podcast - Episode 136
    Nov 28 2025

    Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.

    Show More Show Less
    14 mins
  • Cybersecurity Awesomeness Podcast - Episode 135
    Nov 21 2025

    Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.

    Show More Show Less
    12 mins