podcast cover

The Cybersecurity Podcast

New America and The Christian Science Monitor

Cybersecurity is not just computers and digital processes. Whether it's the threat or the response, the most important, and most interesting, part of the story is the people behind the keyboard. That’s why we’re launching The Cybersecurity Podcast...Show More
Hacker Kid

29:08 | Mar 28th, 2017

Paul Vann is the 14-year-old CEO of VannTechCyber LLC, a new cybersecurity company based out of his bedroom in Fredericksburg, Virginia. A rising star in the field, Paul has presented his research on cyberthreats conferences such as BSides Charm in B...Show More
Bonus episode #3: What to expect from President Trump on cybersecurity

08:04 | Mar 13th, 2017

On this extra episode of The Cybersecurity Podcast, reporter Jack Detsch brings you the highlights from Beat the Breach, an event cohosted by Passcode and Invincea during the RSA Conference in San Francisco. The live discussion focused on how the Tru...Show More
How to Hack the Pentagon

40:12 | Feb 28th, 2017

Last summer, more than 1,500 hackers targeted Pentagon websites – but it wasn't a massive cyberattack. These were vetted hackers invited to participate in the US government’s first ever bug bounty program. Chris Lynch, the director of the Defense Dig...Show More
What can Congress do to fight hackers

35:13 | Jan 13th, 2017

The election may be over but Washington isn’t moving on from the election hacking story just yet. With the intelligence community blaming Russian President Vladimir Putin for organizing hacks on Democratic political organizations to influence the Ame...Show More
Life After the OPM Hack

34:31 | Dec 12th, 2016

The breach at the Office of Personnel Management was one of the most significant cyberattacks in history, and now serves as a cautionary tale for many in Washington and beyond. But what do we know about it a year later? How did it happen? What are so...Show More
Cybersecurity Business is Booming

40:06 | Nov 28th, 2016

With a diverse array of threats facing companies and governments around the world, what ideas will resonate with investors? On this episode of The Cybersecurity Podcast, we interviewed Sunil James, a Silicon Valley venture capitalist investing in inf...Show More
The State of Cybersecurity in Asia

31:33 | Nov 3rd, 2016

Asia is increasingly the global center of gravity in everything from politics and economics – and, increasingly, in cybersecurity. The region has seen the build up of offensive digital capacity in nearly every state, and at the business level, compan...Show More
Bonus episode #2: Securing the Internet of Things

07:07 | Oct 26th, 2016

On this extra episode of The Cybersecurity Podcast, Passcode reporter Jack Detsch examines ideas for securing the Internet of Things in light of the recent cyberattack that took advantage of hacked web-connected gadgets. We hear from experts who spok...Show More
Rise of the Machines and Deterring Russian Infowarfare

30:18 | Oct 11th, 2016

Thomas Rid, professor in the department of War Studies at King's College London, joins the Cybersecurity Podcast to talk about his new book, "Rise of the Machines," a sweeping history of mankind's growing dependence on technology. He also discusses t...Show More
Government Hacking v. Human Rights

33:14 | Sep 7th, 2016

It sounds like a dystopian sci-fi novel, but all around the world, governments are increasingly breaking into personal computers and smartphones to carry out spy operations. Amie Stepanovich, who specializes in cybersecurity and privacy law at digita...Show More
All Hail the College Cyberdefense Champions

30:34 | Aug 15th, 2016

Heather Lawrence is the president of Hack@UCF, the team of college students from the University of Central Florida that won this summer's National Collegiate Cyber Defense Competition. She and her teammate, Alex Davis, are part of a 180-student club ...Show More
Bonus episode #1: How should the US respond to Ukraine's power grid hack?

09:04 | Jul 25th, 2016

On this extra episode of The Cybersecurity Podcast, reporter Jack Detsch brings you the highlights of a live discussion Passcode hosted in Washington on cybersecurity and the US power grid, featuring Elizabeth Sherwood-Randall, deputy secretary of En...Show More
'Zero Days' Director Alex Gibney on Making Stuxnet a Movie Star

28:49 | Jul 18th, 2016

Filmmaker Alex Gibney is known for his awardwinning documenteries on topics that range from Enron to Wikileaks, but now he's taken on a tough challenge: Making a movie about a secret program that few people will publicly acknowledge. "Zero Days" focu...Show More
Hackers infiltrated Ukraine’s power grid. What’s next?

35:04 | Jun 20th, 2016

A massive power outage in December left more than 200,000 people in the dark in Western Ukraine. It was the first time a cyberattack successfully took down a portion of a country’s power grid. Rob Lee, cofounder of cybersecurity company Dragos Securi...Show More
Cybersecurity in 2020, Hacking Ships, and the Price of Bugs

39:49 | May 26th, 2016

What will be the state of digital security in five and 10 years? That's the question Steve Weber, director of the University of California - Berkeley's Center for Long-Term Cybersecurity, and his team tried to tackle in a major research project. Webe...Show More
The Coming ‘Bloodbath’ in Cybersecurity Business, Defending US Networks & Bad Hacker Stereotypes

43:24 | Apr 20th, 2016

Jack Harrington, vice president for cybersecurity and special missions at Raytheon, joins The Cybersecurity Podcast to discuss the role the private sector can play in helping government improve its security, the Defense Department’s cyber strategy, a...Show More
Your Favorite Movies and Cyber from Down Under

53:20 | Mar 23rd, 2016

New America's Peter Singer and Passcode's Sara Sorcher interview Walter Parkes, the noted screenwriter-turned-film producer who’s behind many of your all time favorite cybersecurity movies: Sneakers and WarGames. They talk about the hacker archetypes...Show More
The Encryption Wars and Privacy Shield

59:25 | Feb 23rd, 2016

Former NSA and CIA director Michael Hayden joins The Cybersecurity Podcast to talk about his new book, "Playing to the Edge: American Intelligence in the Age of Terror." Hayden – now a principal at The Chertoff Group – discusses the need to balance n...Show More
Hack the Toaster, Cyber National Guard & Why L0pht Didn't Shutter the Internet

46:15 | Jan 14th, 2016

Chris Wysopal a.k.a Weld Pond, chief technology officer of application security firm Veracode, joins The Cybersecurity Podcast to discuss the suspected cyberattack on the Ukrainian power grid, ways to increase transparency about cybersecurity experti...Show More
Cyber Insurance, Safe Harbor 2.0, and the Human Capital Crisis

40:29 | Dec 3rd, 2015

Angela McKay, who runs Microsoft's public policy work on cybersecurity, joins The Cybersecurity Podcast to talk about the importance of developing international norms for cyberspace, European privacy concerns, why she's disappointed women comprise on...Show More
A 'Cyber Party' with John McAfee and the White House Cybersecurity Czar

59:09 | Oct 21st, 2015

For October's National Cybersecurity Awareness Month, The Cybersecurity Podcast team is bringing you an hour-long special episode featuring White House Cybersecurity Coordinator Michael Daniel, and John McAfee, the security pioneer who just founded h...Show More
Hurd on the Hill, Hacking Jeeps & the Wall of Sheep

39:26 | Sep 24th, 2015

Cybersecurity pro and undercover CIA officer-turned-Republican Rep. Will Hurd joins New America’s Peter Singer and Passcode’s Sara Sorcher to talk about what it's like to be the rare cybersecurity expert in Congress; why he went to DEF CON this summe...Show More
The Half-life of Secrets, A Golden Age of Surveillance, and the US Military's Starship Enterprise

42:36 | Aug 19th, 2015

Leading privacy and cyberlaw scholar Peter Swire joins New America’s Peter Singer and Passcode’s Sara Sorcher to talk about the difficulty of keeping secrets in the Digital Age, the differences between the East and West Coast's views on the Edward Sn...Show More
Bug Bounties, Stunt Hacks, and the Golden Rules of Breach Disclosure

36:41 | Jul 28th, 2015

Katie Moussouris, chief policy officer for HackerOne, joins New America's Peter Singer and Passcode's Sara Sorcher to talk about bug bounty programs and how to incentivize hackers to help the private sector solve cybersecurity problems. They also cha...Show More
Science Fiction, The Surveillance State and World War III

42:35 | Jun 18th, 2015

Cory Doctorow – science fiction author, journalist and co-editor of the blog Boing Boing – joins New America's Peter Singer and Passcode's Sara Sorcher to talk about society's "peak indifference" to the Surveillance State, what policies could stand i...Show More
Stuxnet, Sexism, CEOs and Surveillance

34:55 | May 14th, 2015

New America's Peter Singer and Passcode's Sara Sorcher chat with Bruce Schneier, prolific author and chief technology officer at Resilient Systems, about the challenges of publicly blaming countries for cyberattacks – and whose job it should be to de...Show More
Encryption, Innovation, and the Cyber Gold Rush

35:50 | Apr 10th, 2015

New America's Peter Singer and Passcode's Sara Sorcher chat with Alex Stamos, Yahoo's chief information security officer and world renowned cybersecurity expert, about his company's new end-to-end e-mail encryption rollout, what it’s like to lead a t...Show More
Readying the Cyber Troops

34:58 | Mar 16th, 2015

Peter Singer and Sara Sorcher interview Lt. Gen. Edward Cardon, the Army's top cyber commander, about how the Army is beefing up its cyberforces, competition for talent with the private sector, and what role the military should play when a nation-sta...Show More