Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading

1
401 Access Denied Podcast Ep. 126 | Power of Brand and Communications in Cybersecurity with George Kamide
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35Cybersecurity isn’t just an IT issue—it’s a societal challenge. In this special episode of 401 Access Denied, Joseph Carson sits down with Bare Knuckles and Brass Tacks host, George Kamide, to discuss how branding, community building, and effective communication are reshaping the cybersecurity landscape. From the power of podcasts in education to t…
…
continue reading

1
401 Access Denied Podcast Ep. 125 | Balancing Security and Availability in Cybersecurity with Wenzel Huettner
40:11
40:11
Play later
Play later
Lists
Like
Liked
40:11Cyber threats are evolving—are your defenses keeping up? In this episode of 401 Access Denied, host Joe Carson sits down with Wenzel Huettner, CEO and co-founder of Defend, to explore the future of cybersecurity. From the rise of Zero Trust to the critical role of incident response, they break down what organizations need to know to stay secure. Do…
…
continue reading

1
401 Access Denied Podcast Ep. 124 | 2025 State of Cybersecurity with Dan Lohrmann
41:10
41:10
Play later
Play later
Lists
Like
Liked
41:10As cybersecurity threats evolve, staying ahead is more critical than ever. In this episode, Joe Carson welcomes back Dan Lohrmann to discuss what 2025 holds—from the rise of agentic AI to deepfakes, social engineering, and shifting regulatory pressures. They explore proactive security measures, the impact of global dynamics like US-China relations,…
…
continue reading

1
401 Access Denied Podcast Ep. 123 | Securing Tomorrow: What to Expect for Cybersecurity in 2025 with Wendy Nather
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35In an ever-evolving digital landscape, how do organizations build resilience against cyber threats? In this episode, Wendy Nather, a renowned expert in cybersecurity strategy, joins us to explore what it means to think differently about security. From fostering collaboration to embracing innovative approaches, Wendy offers thought-provoking insight…
…
continue reading

1
401 Access Denied Podcast Ep. 122 | Top Trends & Future of Cybersecurity with Frank Vukovits
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44In the latest episode of 401 Access Denied, host Joseph Carson and cybersecurity expert Frank Vukovits examine 2024’s top cybersecurity trends and what lies ahead. They discuss evolving ransomware tactics, AI's dual role in defense and attack, the skills gap, and quantum computing's threat to encryption. Key topics include cloud security, AI govern…
…
continue reading

1
401 Access Denied Podcast Ep. 121 | Navigating the Future of Identity Threats with Gal Diskin
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02In this episode of 401 Access Denied, host Joe Carson and cybersecurity expert Gal Diskin explore the evolving challenges of identity threats. They discuss how attackers compromise identities, the importance of phishing-resistant multi-factor authentication (MFA), and the need for continuous monitoring and detection. The conversation highlights the…
…
continue reading

1
401 Access Denied Podcast Ep. 120 | Bridging Borders: How INTERPOL Tackles Cybercrime Worldwide with Craig Jones
40:43
40:43
Play later
Play later
Lists
Like
Liked
40:43Join us as Joe Carson sits down with Craig Jones, a former director at INTERPOL’s Global Cybercrime Programme, to explore the ever-evolving world of cybercrime. With over 40 years in public service, Craig shares unique insights on how criminals have adapted to tech advancements and the immense challenges law enforcement faces in today’s digital lan…
…
continue reading

1
401 Access Denied Podcast Ep. 119 | Segregation of Duties: A Key to Security with Chris Katz
38:30
38:30
Play later
Play later
Lists
Like
Liked
38:30In this episode of 401 Access Denied, Joe Carson and guest Chris Katz dive into identity compliance essentials. They cover the critical steps for organizations to secure access, from defining roles and managing risks to enforcing governance and regular audits. Chris shares insights on using community resources and staying up-to-date through confere…
…
continue reading

1
401 Access Denied Podcast Ep. 118 | CISO Stories: Leading Today, Shaping Tomorrow with Joshua Brown
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38H&R Block’s transformational CISO, Joshua Brown, shares lessons for building a security strategy that provides guardrails so business can move faster. He and Joe discuss how to speak the language of the business in terms of motivations and metrics, and the importance of aligning on risk management for material incidents. With a distributed attack s…
…
continue reading

1
401 Access Denied Podcast Ep. 116 | Mastering Passwords: Strategies for Security with Evil Mog
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Executive managing hacker at IBM X Force, known as Evil Mog, is a specialist in authentication security research and passwords. He joins Joe to discuss modern methods for abstracting passwords away from human decision-making and moving them into the background for stronger security. The two discuss how strategies for password management vary depend…
…
continue reading

1
401 Access Denied Podcast Ep. 116 | Security by Design: A Risk Based Approach with Nathan Wenzler
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34If you started viewing your cybersecurity program through a risk lens, rather than a technical lens, how would that change the conversations you have with business leadership? You might be asking questions like, “How valuable is the thing we’re trying to protect?” “What does it mean to the business?” “What would be the impact if it were compromised…
…
continue reading

1
401 Access Denied Podcast Ep. 115 | Balancing Access, Risk, and Interoperability with Nabeel Nizar
33:57
33:57
Play later
Play later
Lists
Like
Liked
33:57Access controls have evolved from attribute and role-based to today’s policy-based and knowledge-based access controls. Static controls miss the mark in organizations where job functions are fluid and access to IT systems and business applications must be granular. Nabeel Nizar, EVP of advisory at MajorKey Technologies, joins Joe to share strategie…
…
continue reading

1
401 Access Denied Podcast Ep. 114 | The Rise and Future of Identity with Ian Glazer
48:11
48:11
Play later
Play later
Lists
Like
Liked
48:11Join Joseph Carson and digital identity expert Ian Glazer as they dive into the complex world of identity management. Discover the evolving tech expectations, the rise of non-human identities, and why visibility and automation are crucial for incident response. They’ll explore the future of identity management, including AI’s role in detection and …
…
continue reading

1
401 Access Denied Podcast Ep. 113 | The Evolution of Platforms and the Role of AI with Phil Calvin
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platfor…
…
continue reading

1
401 Access Denied Podcast Ep. 112 | Prioritizing the Protection of the Brand for CISOs with Myrna Soto
50:01
50:01
Play later
Play later
Lists
Like
Liked
50:01In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and…
…
continue reading

1
401 Access Denied Podcast Ep. 111 | 3 Keys to Protecting Identities: Authentication, Authorization, and Governance with Frank Vukovits
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms,…
…
continue reading

1
401 Access Denied Podcast Ep. 110 | Exploring the Impact of the EU AI Act with Dr. Andrea Isoni
52:08
52:08
Play later
Play later
Lists
Like
Liked
52:08Join Joseph Carson and Dr. Andrea Isoni as they dive into the complexities of artificial intelligence. Explore AI's definition, practical applications in medicine and law, and the ethical challenges, including algorithmic bias and human oversight. They discuss the EU AI Act, its impact on AI development, and the global challenges of regulation. Dis…
…
continue reading

1
401 Access Denied Podcast Ep. 109 | The Lazarus Heist: A Cybercrime Ocean's 11 with Geoff White
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24Geoff White, author and investigative journalist, has interviewed the masterminds behind some of the most notorious cyberattacks. His new book, Rinsed, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media. In this episode, the expe…
…
continue reading

1
401 Access Denied Podcast Ep. 108 | The Rise of Ransomware and Data Exfiltration with Tony Goulding
34:38
34:38
Play later
Play later
Lists
Like
Liked
34:38Joe Carson and Tony Goulding dive into the Verizon Data Breach Investigations Report (DBIR), revealing key insights on the top threats in cybersecurity. Discover why credential compromise remains the leading attack method and how ransomware, data exfiltration, and extortion are on the rise. Learn about the critical importance of strong authenticati…
…
continue reading

1
401 Access Denied Podcast Ep. 107 | CISO Insights & Managing Risks with Brent Deterding
1:01:06
1:01:06
Play later
Play later
Lists
Like
Liked
1:01:06In this episode, join us as Brent Deterding, a cybersecurity professional with 19 years of experience, unveils his top strategies for managing stress, prioritizing risks, and building resilience in the high-stakes world of cybersecurity. Discover how Brent's focus on controllable factors and his calm, composed approach—drawn from emergency medicine…
…
continue reading

1
401 Access Denied Podcast Ep. 106 | HackTricks with Carlos Polop
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17It’s becoming more common for companies to rely on cloud platforms like AWS, SaaS tools, Okta, and Github actions on CICD pipelines. In this episode, penetration tester and creator of HackTricks Carlos Polop shares how he’s helping cloud-first organizations understand the risk of vulnerabilities, misconfigurations, and exploitation techniques such …
…
continue reading

1
401 Access Denied Podcast Ep. 105 | Passwords: Cracking, Chaos, & The Future with Evil Mog
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29Evil Mog is the Chief Architect of IBM X-Force, IBM's Hacking Incident Response and Threat Intelligence division, and a renowned password security researcher. He studies the movements of access brokers across the criminal software supply chain and warns that credentials are being traded on the Dark Web for pennies on the dollar, stored in Github, a…
…
continue reading

1
401 Access Denied Podcast Ep. 104 | The Importance of Software Bill of Materials (SBOM) with Allan Friedman
39:45
39:45
Play later
Play later
Lists
Like
Liked
39:45Allan Friedman of the Cybersecurity and Infrastructure Security Agency (CISA) explains how creating a Software Bill of Materials (SBOM) for any application you build helps you improve quality control and proactively address your customers' security questions. You'll learn how to build SBOMs into your process and increase collaboration between vendo…
…
continue reading

1
401 Access Denied Podcast Ep. 103 | The Future of Identity Security with Art Gilliland
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00In this episode, Joseph Carson interviews Art Gilliland, CEO of Delinea, about the challenges and trends in identity security. They discuss the shift in identity security from infrastructure-centric to security-centric, driven by the move to cloud and SaaS products. They highlight the importance of visibility and security controls in a decentralize…
…
continue reading

1
401 Access Denied Podcast Ep. 102 | Retro Gaming & Hacking Games with Louis Zezeran
58:35
58:35
Play later
Play later
Lists
Like
Liked
58:35Joe Carson and Louis Zezeran explore why the ethos that drives gamers is so relevant for hackers. As they note, the culture and ideas attackers are using today often stem from the environment of retro gaming. Both groups use techniques such as reverse engineering, modifying signals, upscaling, and software emulation. Though most retro games simply …
…
continue reading