Rephonic
Artwork for Decipher Security Podcast

Decipher Security Podcast

Decipher
Cybersecurity
Crowdstrike
Breach Reporting
Ransomware
Snowflake
Threat Actors
Microsoft
Heat
APT29
Teamviewer
National Security Agency
Windows
Incident Response
Mandiant
Artificial Intelligence
Azure Cloud Platform
CISA
Threatpost
Recall Feature
Systems Administration

Every week, Dennis Fisher and Lindsey O'Donnell-Welch, the editors of Decipher, bring you exclusive, in-depth conversations with security researchers, CISOs, founders, and security experts to hellp you understand the threat landscape and better protect your organizations.

PublishesTwice weeklyEpisodes342Founded7 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Decipher Security Podcast

Latest Episodes

Dennis sits down with Tom Ptacek of Fly.io, a veteran security researcher, founder, and observer of the vulnerability landscape, to talk about the recent wave of AI-assisted vulnerability discovery and exploit development, specifically from the use o... more

The internet is dark and full of terrors, but thanks to folks such as Andrew Northern, a principal security researcher at internet-mapping pioneer Censys, it doesn't have to be, Andrew joins Dennis to talk about the cybercrime ecosystem, getting his ... more

It's been quite a week in security news, and Dennis and Lindsey dig into the continued effects of the axios supply chain attack, the incredibly fast adoption of AI tools for vulnerability research and what that means for software makers and defenders... more

Dennis and Lindsey dig into what we know do far about the supply chain attack on the axios NPM package, including how the attacker gained access to the maintainer's account, the window of exposure for the malicious packages, the behavior of the RAT t... more

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Risky Bulletin
Risky BulletinRisky Business Media
Risky Business
Risky BusinessRisky Business Media
Risky Business Features
Risky Business FeaturesRisky Business Media
CyberWire Daily
CyberWire DailyN2K Networks

Recent Guests

Andrew Northern
Principal Security Researcher at Censys
Censys
Episode: Mapping the Cybercrime Ecosystem With Andrew Northern of Censys
Caitlin Condon
VP of Research at VulnCheck
VulnCheck
Episode: The Wild, Wild World of Exploits With Caitlin Condon
Tod Beardsley
Security researcher; Run⁺Zero veteran; former Metasploit contributor; KEV catalog expert
Run Zero / formerly Rapid7 / CISA KEV catalog contributor
Episode: The Zero Day Landscape, Tycoon 2FA Disruption, and KEVology
Todd Beardsley
Security researcher and former member of the Metasploit project
RunZero
Episode: China Targets Dell Flaw, New Ivanti Exploitation, and Cyber Shenanigans on The Pitt!
Ryan Dewhurst
Head of Threat Intelligence at Watchtower Labs
Watchtower Labs
Episode: How to Stay Ahead of Attackers With watchTowr's Ryan Dewhurst
Jeremiah Grossman
Cybersecurity expert and co-founder of Root Evidence
Root Evidence
Episode: A New Chinese APT Debuts and React2Shell Attacks Spike
Robert Hansen
Known as rSnake, a prominent figure in cybersecurity
Root Evidence
Episode: A New Chinese APT Debuts and React2Shell Attacks Spike
Erin Whitmore
Former CIA operations officer with a background in strategic intelligence and cybersecurity.
Cypher
Episode: More React Bugs Reaction, the Challenge of Vulnerability Management, and CI Attacks
Jeff Gothelf
Co-founder of Sense and Respond Learning, author, and thought leader in user experience design and agile methodologies.
Sense and Respond Learning
Episode: Jeff Gothelf on Designing for Users, Enterprise Agility, and the AI Conundrum

Hosts

Dennis Fisher
Host of the Decipher podcast network; seasoned cybersecurity journalist and interviewer.
Lindsey O'Donnell-Welch
Co-host and editor with a focus on interviews and episode production.

Reviews

4.2 out of 5 stars from 15 ratings
  • So so at best

    I had high hopes when I subscribed but that quickly went away when they entered into political opinion.

    Apple Podcasts
    1
    Daryl Roades
    Canada4 years ago
  • Like it but HORRIBLE audio issues

    Particularly in ep12 there are multiple examples where there are people talking over one another and then periods of silence. There’s some very annoying background noise like someone has a TV or Radio on while recording.

    Dudes. Clean it up... 🙃

    Apple Podcasts
    3
    taroliw
    United States7 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Audio quality varies across episodes, with some guests noting significant recording issues.
Some listeners feel political opinions invade discussions at times and may not align with all audiences.
The show often delivers deep dives into technical topics with practical implications for defense and risk management.

Top Technology Podcasts

Acquired
AcquiredBen Gilbert and David Rosenthal
Hard Fork
Hard ForkThe New York Times
Tomorrow, Today
Tomorrow, TodayShekhar Natarajan
Dwarkesh Podcast
Dwarkesh PodcastDwarkesh Patel

Talking Points

Recent interactions between the hosts and their guests.

Mapping the Cybercrime Ecosystem With Andrew Northern of Censys
Q: Tell me a little bit about that mentorship and how much of a difference it made in your career.
Mentorship and sponsorship from early managers and later mentors helped Andrew gain exposure across red team, blue team, and aftermaths of security incidents, giving him room to explore, learn, and specialize, which shaped the trajectory of his career.
We Need to Talk About KEV With Tod Beardsley
Q: What motivated you to dive deep into KEVology and develop a structured approach to prioritization?
Tod explains that a customer-wide desire to manage outstanding KEVs sparked the KEVology project, with the aim of turning the KEV into a practical intelligence signal rather than a blunt list of vulnerabilities. He emphasizes the need to extract relevant signals for different networks and prioritize based on CVSS attributes, exploit likelihood, and patch availability.
Chris Hughes
Q: What is your role at CISA as an Innovation Fellow?
I collaborate on cybersecurity and software supply chain issues, bringing expertise from the commercial sector to government.
Chris Hughes
Q: How challenging is that part, Chris, trying to bring the private sector mentality to the federal government?
It's definitely challenging due to longstanding cultural norms and behaviors within government agencies.
Chris Hughes
Q: What was the problem you guys were trying to solve when you started that company?
We wanted to bring some of the commercial innovation to the government space, particularly addressing their security needs.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Decipher Security Podcast

What is Decipher Security Podcast about and what kind of topics does it cover?

Hard-hitting security conversations pair weekly hosts as they interview researchers, founders, and practitioners about current threat trends, exploitation signals, vulnerability management, and incident response. Episodes often mix technical deep-dives with industry anecdotes, regulatory context, and real-world defense guidance, making it useful for security teams evaluating risk, vendors seeking technical credibility, and listeners who want practical takeaways for prioritization, patching, and threat intelligence. Noteworthy strengths include high-signal interviews with recognizable researchers and practitioners, a willingness to cover both cutting-edge topics and popular culture through security-adjacent discussions, and a candid, ribbing... more

Where can I find podcast stats for Decipher Security Podcast?

Rephonic provides a wide range of podcast stats for Decipher Security Podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Decipher Security Podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Decipher Security Podcast get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Decipher Security Podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Decipher Security Podcast?

Rephonic provides comprehensive predictive audience data for Decipher Security Podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Decipher Security Podcast have?

To see how many followers or subscribers Decipher Security Podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Decipher Security Podcast?

These podcasts share a similar audience with Decipher Security Podcast:

1. Risky Bulletin
2. Risky Business
3. Risky Business Features
4. CyberWire Daily
5. Security Now (Audio)

How many episodes of Decipher Security Podcast are there?

Decipher Security Podcast launched 7 years ago and published 342 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Decipher Security Podcast?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Decipher Security Podcast?

Rephonic pulls ratings and reviews for Decipher Security Podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Decipher Security Podcast?

Rephonic provides full transcripts for episodes of Decipher Security Podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Decipher Security Podcast?

Recent guests on Decipher Security Podcast include:

1. Andrew Northern
2. Caitlin Condon
3. Tod Beardsley
4. Todd Beardsley
5. Ryan Dewhurst
6. Jeremiah Grossman
7. Robert Hansen
8. Erin Whitmore

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days