Manage episode 519937500 series 3662608
In Part 2, Glen and cybersecurity expert Trey Blalock go deeper into how AI is reshaping the next generation of cyberattacks—and what defenders can still do to fight back.
Trey reveals how attackers are using LLMs for fuzzing and vulnerability discovery, enabling a surge of zero-day exploits. He shares chilling examples of deepfake-based fraud, fake Zoom meetings, and AI-assisted phishing that blur the line between real and synthetic interactions.
They also discuss the new risks of the public cloud era—where tools like “AWS Nuke” can wipe entire environments in seconds, and how attackers now clone and ransom your data inside the same cloud you trust.
This episode dives into the architecture, psychology, and policy gaps that keep organizations exposed—and why the solution isn’t more AI, but better fundamentals.
16 episodes