Episodes

  • Cracking the code: What encryption can (and can’t) do for you
    Jan 28 2026

    Step into the fascinating world of cryptography. Host Amy Ciminnisi sits down with Yuri Kramarz from Cisco Talos Incident Response and Tim Wadhwa-Brown from Cisco Customer Experience to learn what encryption really accomplishes, where it leaves gaps, and when defenders need to take proactive measures.

    Whether you’re picturing classic codebreakers or the latest quantum-proof ciphers, this episode unpacks the essentials: what encryption and hashing actually mean, why key management is a make-or-break factor, and how even the best algorithms can fall short if the basics aren’t handled right.

    G7's "Coordinating the Transition to Post-Quantum Cryptography in the Financial Sector" roadmap: https://home.treasury.gov/news/press-releases/sb0355



    Show More Show Less
    28 mins
  • Cybersecurity certifications and you
    Jan 15 2026

    Get ready for a brand-new era of Talos Takes! In the first episode of the year, Amy Ciminnisi, Talos’ Content Manager and new podcast host, steps up to the mic with Joe Marshall to explore certifications, one of cybersecurity’s overwhelming (and sometimes most controversial) topics. We dive into the world of vendor-specific and vendor-agnostic certs, the value they can bring to your career, and the barriers people often face to getting certified.

    Whether you’re a newcomer facing the sea of choices and feeling some analysis paralysis or a seasoned pro plotting your next move, this episode may just motivate you to tackle your next certification with confidence.

    Cybersecurity certification roadmap: https://pauljerimy.com/security-certification-roadmap/

    Show More Show Less
    28 mins
  • 2015 vs 2025: What the Last Decade of Threats Taught Us
    Dec 18 2025

    In this special, end-of-year episode (and Hazel’s final show as host) Talos Takes goes on a time-travel adventure: What would a defender from 2015 think of the cybersecurity realities of 2025? Joined by Talos teammates Pierre Cadieux, Alex Ryan, and Joe Marshall, we compare the threats, tools, and challenges of 2015 with those of 2025.

    The team recalls where they were in their careers a decade ago, then dives deep into how ransomware has evolved, how APTs and state sponsored attacks have shifted, and why identity has become the new battleground for attackers and defenders alike. They discuss the impact of AI on both sides of the security equation, share what they miss from “the good old days,” of 2015, and offer practical advice for defenders facing the challenges of 2026 and beyond.

    Show More Show Less
    45 mins
  • When You’re Told “No Budget”: The Blueprint for Staying Secure
    Nov 25 2025

    What happens when your to-do list keeps growing but your budget doesn’t? Hazel is joined by three Cisco Talos Incident Response experts to talk about the reality many organizations face: rising threats, aging infrastructure, and fewer people to defend it all.

    From configuring what you already have, to open-source strategies, to the impact of cybersecurity layoffs, this episode is packed with practical guidance for securing your organization during an economic downturn.

    Resources mentioned:

    https://blog.talosintelligence.com/cybersecurity-on-a-budget-strategies-for-an-economic-downturn/

    https://blogs.cisco.com/news/doubling-down-on-resilient-infrastructure

    https://talosintelligence.com/incident_response

    Show More Show Less
    24 mins
  • How Attackers Use Your Own Tools Against You (IR trends Q3 2025)
    Nov 13 2025

    In this episode of Talos Takes Hazel sits down with Talos' Bill Largent and Craig Jackson to discuss the latest Cisco Talos Incident Response Quarterly Trends Report (Q3 2025). From a wave of Toolshell events, to a rise in post-exploitation phishing, and the misuse of legitimate tools like Velociraptor, this quarter’s cases all point to a theme: attackers are getting very good at living off what’s already in your environment. Read the full report at https://blog.talosintelligence.com/ir-trends-q3-2025/

    Show More Show Less
    11 mins
  • Passwordless Security: Debunking the Biggest Myths
    Oct 24 2025

    On this episode of Talos Takes, Hazel welcomes Cisco Duo experts Steven Leung and Tess Mishoe to bust the most common myths around passwordless security and multi-factor authentication (MFA). Discover why not all MFA is created equal, why passwordless doesn't mean less security, and the most seamless way to adopt passwordless solutions. Plus, learn the truth about how passwordless may affect compliance and audits, and whether passwordless really is more vulnerable to phishing.

    Show More Show Less
    15 mins
  • You Can't Patch Burnout: When Cybersecurity Takes a Toll
    Oct 2 2025

    Every October, Cybersecurity Awareness Month brings a wave of tips: update your software, enable MFA, use strong passwords. But what good is any of that if the people behind the defenses are feeling burned out?

    In this episode of Talos Takes, Hazel sits down with Joe Marshall for a candid, vulnerable conversation about the human cost of cybersecurity. Joe opens up about his experience during the VPNFilter campaign — months of secrecy, long hours, immense pressure, and the trauma it left behind. Hazel shares her own journey with burnout, and together they talk about how to recognise the warning signs.

    They close with practical steps: building a personal “incident response playbook” that includes boundaries, peer support, and self-care. Because at the end of the day, you can’t patch a system if you're burned out.

    Show More Show Less
    47 mins
  • Tampered Chef: When Malvertising Serves Up Infostealers
    Sep 18 2025

    Imagine downloading a PDF Editor tool from the internet that works great...until nearly two months later, when it quietly steals your credentials. That’s the reality of “Tampered Chef,” a malvertising campaign that preyed on users searching for everyday software.
    In this episode, Nick Biasini explains how cybercriminals are investing in "malvertising", why enterprises are prime targets, and why there are additional challenges when it comes to defending against time-delayed attacks.

    Show More Show Less
    11 mins