Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsHot Sauce and Hot Takes: An Only Malware in the Building Special.
Hot Sauce and Hot Takes: An Only Malware in the Building Special.
Cybersecurity

Hacking Humans

Hot Sauce and Hot Takes: An Only Malware in the Building Special.

Hacking Humans
•January 1, 2026•36 min
0
Hacking Humans•Jan 1, 2026

Key Takeaways

  • •Early passwords were simple, now use managers and MFA
  • •Phishing exploits trust and curiosity; verify links before clicking
  • •Digital detox and physical hobbies reduce cybersecurity burnout
  • •Threat modeling starts each morning with personal device checks
  • •Zero‑trust allow‑listing prevents unknown malware execution

Pulse Analysis

The episode opens with a nostalgic look at password habits, illustrating how early users relied on obvious choices like family names or simple phrases. Today, the conversation shifts to robust password hygiene: password managers, multi‑factor authentication, and regular credential audits are now standard practice for professionals. This evolution reflects broader industry pressure to mitigate credential‑stuffing attacks and underscores why modern cyber teams prioritize automated password rotation and secure storage.

A recurring theme is the human element of phishing and supply‑chain risk. Guests share personal near‑misses—clicking a friend‑sent link that mimicked a Facebook login and a mistyped airline number that exposed personal data. These stories highlight how attackers exploit trust, curiosity, and emotional triggers. The discussion emphasizes verification steps, such as confirming sender identity and using sandboxed environments for suspicious files. The panel also touches on advanced defenses like zero‑trust allow‑listing and threat‑locker style default‑deny policies, which block unknown executables before they can compromise a network.

Finally, the hosts address burnout and the need for digital detox. They admit that constant threat monitoring can lead to fatigue, recommending physical books, screen‑free zones, and scheduled breaks to maintain mental health. By delegating niche research to specialists and focusing on high‑impact alerts, security leaders can avoid the “sprint a marathon” trap. The episode concludes that balancing vigilance with self‑care is essential for sustainable cyber resilience, reinforcing that a well‑rested analyst is as critical as any technical control.

Episode Description

While our team is out on winter break, please enjoy this episode of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with  ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat.

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.

Show Notes

0

Comments

Want to join the conversation?

Loading comments...