• Can you prove which agent did what?
    May 7 2026
    In this week's episode, Greg Otto talks with Howard Ting, CEO of Opal Security, about the growing security challenges created by AI agents inside the enterprise, especially around identity governance, access control, and runtime authorization. As organizations adopt coding agents, workplace assistants, and other AI tools, traditional approaches to managing human access are being pushed beyond their limits by the speed, scale, and context required for agent-driven decisions. The conversation explores the risks of shadow AI, overprivileged agents, unintended data exposure, and the difficulty of enforcing least privilege when agents act on behalf of employees across sensitive systems. It also looks at what CISOs and security teams need to prioritize now, from gaining visibility into agent activity to building policy-aware controls that can make real-time access decisions and safely support AI adoption. In our reporter chat, Greg talks with Derek Johnson about a lawsuit where a dating app stole an influencer's TikTok videos to use in targeted ads to people she knew, all without her consent.
    Show More Show Less
    28 mins
  • How government and Industry can raise the cost of cybercrime
    Apr 30 2026
    Sophos CEO Joe Levy and Director of Government Partnerships Alex Rose join Safe Mode from Washington, D.C. to discuss what meaningful public-private cybersecurity partnership looks like right now—moving beyond “window dressing” to real operational collaboration with agencies like CISA and the FBI. They break down the shift from Secure by Design to Secure by Demand, arguing that procurement and market forces must pressure software vendors to ship safer defaults, while AI simultaneously accelerates both vulnerability discovery and attacker capability. The conversation also spotlights why small and midsize businesses are disproportionately exposed yet often underserved, and previews Sophos’s upcoming CISO Advantage concept to help close the massive cybersecurity leadership gap. Finally, they examine rising open-source software risk—including maintainers being overwhelmed by low-quality AI-generated vulnerability reports—and why addressing OSS security will require coordinated action across government and industry. In our reporter chat, Greg talks with Tim Starks about the oral arguments held at the Supreme Court in relation to a case that deals with the future of geofence warrants.
    Show More Show Less
    43 mins
  • Proving Identity in the age of agents
    Apr 23 2026
    As AI makes deepfakes and voice cloning more convincing, attackers are shifting away from traditional vulnerabilities and focusing on identity as the easiest path to account takeover and fraud. In this conversation, Eran Haggiag of Glide Identity discusses what it will take to protect identity in an agentic world—how to prove a real user approved an action, how to establish accountability when software acts on someone’s behalf, and why cryptographic, hardware-rooted signals may be the clearest way out of the cat-and-mouse cycle. In our reporter chat, Greg talks with Matt Kapko about what led to the Vercel breach that dominated this week's headlines.
    Show More Show Less
    27 mins
  • The federal government's most underrated cybersecurity tool
    Apr 16 2026
    In this episode of Safe Mode, we sit down with Philip George, Executive Technical Strategist at Merlin Group to talk about the real challenges federal agencies face at the intersection of cybersecurity, AI adoption, and post-quantum cryptography. Philip breaks down the disconnect between cyber spending and mission outcomes, why rushing into AI without sound identity management and data integrity is a recipe for disaster, and what evolving federal cryptographic requirements and shortened certificate lifecycles mean for government IT. We dig into why visibility — simply knowing what's on your network — remains the most powerful defensive posture regardless of the threat, explore the tension between zero trust and agentic AI, and hear Philip's counterintuitive take that the answer to AI-driven security challenges might just be more AI, purpose-built and narrow in scope. Also, Greg sits down with Chris Townsend, Elastic’s Global VP of Public Sector, at the Elastic Public Sector Summit to unpack how agencies can operationalize data amid rising cyber threats. Townsend explains why open standards and cross-agency data sharing matter—and how agentic AI can help modernize SOC operations by prioritizing alerts and speeding response times.

In our reporter chat, Greg Otto and Derek Johnson break down the surge of AI-in-cybersecurity developments—from Anthropic’s Project Glasswing and the “too dangerous to release” Mythos model to OpenAI’s trusted-access approach—focusing on what these tools could mean for vulnerability discovery and the balance between real risk and hype.
    Show More Show Less
    45 mins
  • What does industry think of the White House's cybersecurity strategy?
    Apr 10 2026
    Bob Ackerman (founder of Allegis Cyber and a partner at DataTribe) joins Safe Mode to talk about where the new national cybersecurity strategy is trying to push the industry—especially around more open, coordinated “active disruption” with government support (and what that does not mean, like hack-back). He shares what he’s hearing from leaders who want clearer “rules of the road,” and why it’s tough to move from reactive collaboraBob Ackerman (founder of Allegiance Cyber and a partner at DataTribe) joins Safe Mode to talk about where the new national cybersecurity strategy is trying to push the industry—especially around more open, coordinated “active disruption” with government support (and what that does not mean, like hack-back). He shares what he’s hearing from leaders who want clearer “rules of the road,” and why it’s tough to move from reactive collaboration to getting ahead of threats. The conversation then turns to AI and why the next couple of years could get “a little spicy,” with offensive tooling accelerating fast and defenders struggling with visibility, noise, and prioritization. Ackerman’s bottom line: don’t get distracted by shiny objects—double down on fundamentals and hygiene, because you can’t defend what you can’t see.tion to getting ahead of threats. The conversation then turns to AI and why the next couple of years could get “a little spicy,” with offensive tooling accelerating fast and defenders struggling with visibility, noise, and prioritization. Ackerman’s bottom line: don’t get distracted by shiny objects—double down on fundamentals and hygiene, because you can’t defend what you can’t see. In our reporter chat, Greg talks with Tim Starks about the proposed CISA budget and warnings that Iran is going after critical infrastructure in cyber domain.
    Show More Show Less
    31 mins
  • When iPhone exploits turn into commodities
    Mar 26 2026
    A sophisticated iPhone exploit kit known as DarkSword has escaped the world of targeted espionage and landed in public view—leaked on GitHub in a form that researchers say is trivial to repurpose and deploy. With the barrier to entry collapsing to “copy, paste, host,” the immediate concern is no longer whether advanced actors can use it, but how quickly criminal groups and opportunistic attackers will operationalize it against the enormous population of out-of-date iOS devices.
 In this episode, Jame’s Michael Covington joins us for a practitioner-level breakdown of what the DarkSword leak changes, who’s exposed, and what defenders can do right now. We dig into the real enterprise blast radius for organizations with BYOD and partially managed fleets, what meaningful detection and response looks like on iOS when visibility is limited, and how to prioritize patch enforcement, quarantine decisions, and Lockdown Mode for high-risk users. We also zoom out to the bigger pattern: highly capable mobile exploitation frameworks (including recent reporting on Coruna) increasingly surfacing outside tightly controlled circles—reshaping the threat model for Apple devices in the enterprise.

In our reporter chat, Greg talks with Matt Kapko on what they heard during their many conversations during their time at the RSAC 2026 Conference.
    Show More Show Less
    35 mins
  • Behind the scenes of the Socksescort takedown
    Mar 19 2026
    In this episode, we sit down with Chris Formosa to break down the Socksescort disruption—a proxy botnet powered by AVRecon that compromised edge devices at scale. Chris walks us through why the operation was so dangerous, how investigators tracked its command-and-control infrastructure, and what changed between the 2023 disclosure and the eventual takedown in coordination with the Department of Justice. We also dig into why edge devices remain prime targets, where most organizations still have visibility gaps, and what the next evolution of this threat could be. In our reporter chat, Greg Otto and Tim Starks break down DarkSword, a iOS exploit kit that could impact hundreds of millions of people.
    Show More Show Less
    35 mins
  • What comes next for Trump's cybersecurity plan?
    Mar 12 2026
    On this episode of Safe Mode, Greg Otto and Tim Starks look past the headline release of President Trump’s new cyber strategy and focus on what comes next: the promised follow-on guidance, the rollout of an interagency “cell” spanning DOJ, State, FBI, DoD and others that pairs cyber operations with diplomacy and arrests, and the state-by-state critical infrastructure pilot programs designed to test what actually works before scaling. In our interview segment, acting Federal CISO Mike Duffy lays out his priorities for 2026.
    Show More Show Less
    29 mins