• 58 minutes 28 seconds
    8.15 - All is Not Quiet on the Detection Front

    AI and automation are giving attackers unprecedented speed and scale — so how do defenders fight back? On this episode of Security Noise, we are joined by Carlos Perez, Director of Security Intelligence at TrustedSec, and John Dwyer, Deputy CTO and Head of ARC Labs at Binary Defense. They sit down with Geoff on Skyler to discuss how AI and automation are fundamentally reshaping the way defenders think, work, and respond. They unpack how machine speed and intelligent tooling are raising the stakes on both sides of the attack surface. From the power and limitations of open source security to the emergence of AI-assisted attack methodologies, this episode challenges defenders to rethink their strategies before adversaries outpace them. What does it takes to stay ahead in an environment where the pace of change is the biggest threat of all?

    In this episode: - How AI is transforming threat hunting and detection engineering - Why open source security is more critical than ever - How attackers are already using AI — and what that means for defenders - What the future of security operations actually looks like

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Hack the planet! Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    4 May 2026, 10:00 am
  • 44 minutes 16 seconds
    8.14 - The Game Is Over? Gamification of Infosec

    What if learning cybersecurity felt less like a compliance checkbox and more like an adventure? In this episode, Geoff and Skyler sit down with two special guests to explore how gamification is revolutionizing the way people learn about security tactics and concepts. TrustedSec's Senior Security Consultant Travis Kaun drops in to talk about his latest community offering: Dungeons and Daemons, a web-based RPG that simulates a "live" engagement as a Red Teamer. We are also joined by Tim Doerges who is Lead Developer of Backdoors & Breaches at Black Hills InfoSec to talk about how this incident response card game has taken off since its launch and what developments are on the horizon. See demos of these games on YouTube to get a better understanding of why the future of cybersecurity education could be through gamified experiences.

    YouTube podcast video - https://youtu.be/rngJj3NFk0k

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    Resources: Backdoors and Breaches - https://www.blackhillsinfosec.com/tools/backdoorsandbreaches/

    Dungeons and Demons - https://dnd.trustedsec.net

    TrustedSec - https://trustedsec.com

    Black Hills Security - https://blackhillsinfosec.com

    MetaCTF platform - https://metactf.com

    23 April 2026, 1:23 pm
  • 33 minutes 49 seconds
    8.13 - A Goblin, a Ghost, and a Ninja Walk into the Azure Bar

    On this episode of Security Noise, Geoff and Skyler are joined by NyxGeek to discuss his suite of Azure bypass techniques that focus on user enumeration (which sometimes border on absurd). Since these techniques leave no trace, what does it mean to the organizations trusting authentication logs? We also discuss Microsoft's response to his findings and Geoff's suspicion that he may be responsible for a couple of table flips over at the MS HQ. Read NyxGeek's latest blog here: https://trustedsec.com/blog/full-disclosure-a-third-and-fourth-azure-sign-in-log-bypass-found

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    6 April 2026, 2:19 pm
  • 37 minutes 47 seconds
    8.12 - AI is Exploring The Deep Blue CVEs

    Let's find a CVE! On this episode of Security Noise, we explore the cutting-edge use of AI in vulnerability research, exploit development, and cybersecurity defense. Guests Christopher Paschen, Research Practice Lead at TrustedSec, and Principal Security Consultant Justin Bollinger sit down with Geoff and Skyler to discuss how frontier AI models are transforming security practices, the ethical implications, and the future of AI-driven hacking and defense.

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    24 March 2026, 12:56 pm
  • 41 minutes 56 seconds
    8.11 - IR Evolve

    How is incident response (IR) changing as threats are advancing? Increasing attack speeds and dropping exfiltration times have responders on high alert. On this episode of Security Noise, we invite TrustedSec's Incident Response Practice Lead Ryan Macfarlane on the podcast to discuss current findings in the digital forensics and IR space and how AI impacts cybersecurity. Ryan also talks about his time as an FBI Cyber agent.

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    9 March 2026, 1:13 pm
  • 39 minutes 38 seconds
    8.10 - Ten Years: A Decade of Doing This

    It's our 10TH ANNIVERSARY! In this episode of Security Noise, we react to some significant developments in InfoSec, including Microsoft's integration of Sysmon into Windows. We are joined by TrustedSec Founder and CEO David Kennedy to celebrate a decade of our podcast and talk about the early years. As we reminisce, Skyler digs through the archives and pulls up some old clips to see how TrustedSec has evolved in the cybersecurity space over the years. Lastly, but not leastly, we are joined by Senior Security Consultant Kelsey Segrue as she gives her analysis on the U.S. Government's newly-conquered control over TikTok and we discuss the future of social media platforms.

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    23 February 2026, 3:30 pm
  • 36 minutes 21 seconds
    8.9 - LLM = Love Language Model?!

    AI seems to be everywhere in 2026. This can be problematic when it goes undetected in our personal interactions, including our romantic lives though dating apps, catfishing, or romance scams. In this special Valentine's Day episode, Geoff and Skyler talk about the rise in spam tactics, the use of AI in catfishing and social engineering, and the "Dead Internet" theory. They tested some of these tactics, armed with a highly-trained LLM (Love Language Model), and made a "phishy" phone call to TrustedSec's Director of Software Security, Scott White. Find out if their social engineering attempt works and listen now!

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    9 February 2026, 3:33 pm
  • 31 minutes 25 seconds
    8.8 - Navigating Authorization with a Copilot

    Data security relies on clarity around authorization controls and assets, but AI tools can risk exposure sensitive information as they are increasingly being integrated into everything we use. In this episode of Security Noise, Geoff is joined by Principal Security Consultant Drew Kirkpatrick as they dive into the use of LLMs such as Microsoft Copilot at organizations and its implications for data security and authorization. They explore the importance of data classification policies and the potential risks associated with using AI tools at work. The conversation also touches on the effectiveness of data leak protection controls and the need for a review process for agent deployment. What's the agent doing behind the scenes and is it connecting to other agents?

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    26 January 2026, 12:53 pm
  • 46 minutes 25 seconds
    8.7 - Hacker Family Feud

    Who will win Hacker Family Feud? On this special, year-end episode of Security Noise, we are gathering the fam around the digital fireplace for a hacker-themed game night! Geoff and Skyler are having TrustedSec's Jason Lang, Scott White, Rob Simon, Paul Koblitz, Martin Bos, and Chris Boesch duke it out to see which team can guess the most popular answers to cybersecurity industry questions. What is the most overused password in real-world breaches? What is the first thing a red teamer does after gaining access to a box? What's the most annoying part of a pentest engagement? Find out what the survey says and watch now!

    About this podcast:

    Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    5 December 2025, 11:55 am
  • 18 minutes 40 seconds
    8.6 - C2 for Me + You

    Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically use C2, how that differs from what pentesters and red teamers are using, techniques for blending into cloud environments, and the ever-growing role of AI in C2 systems. How can blue teams work to detect C2s before threat actors take control? Learn ways to reduce your risk in this episode!

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

    19 November 2025, 1:00 pm
  • 29 minutes 18 seconds
    8.5 - Footprint Discovery for Red Teamers

    Red Teaming 101: understand your target before you attack. On this episode, we invited two heavy hitters, Principal Security Consultants Hans Lakhan and Oddvar Moe on the show to talk about Red Team operations. We discuss footprinting and reconnaissance techniques including identifying a target's online presence, the tools and methods used for reconnaissance, and social engineering. Listen as we walk through how we map the digital terrain before a red team engagement!

    About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources. Red teaming services: https://trustedsec.com/services/red-teaming

    3 November 2025, 9:38 pm
  • More Episodes? Get the App