Rephonic
Artwork for Security Intelligence

Security Intelligence

IBM
Cybersecurity
Ransomware
Romance Scams
IBM
Anthropic
Cryptocurrency
Emotional Manipulation
OWASP
Software Supply Chain
Online Dating
Cybersecurity Awareness
Phishing Attacks
Openai
Cyber Insurance
Shyhalood Worm
Cybersecurity Training
Multi-Factor Authentication (MFA)
Generative AI
Organized Crime
AI In Cybersecurity

Security Intelligence is a weekly news podcast for cybersecurity pros who need to stay ahead of fast-moving threats. Each week, we cover the latest threats, trend, and stories shaping the digital landscape, alongside expert insights that help make sense of it all. Whether you’re a builder, defender, business leader or simply curious about how to stay secure in a connected world, you’ll find timely... more

PublishesTwice weeklyEpisodes39Founded8 months ago
Number of ListenersCategories
NewsTech NewsTechnology

Listen to this Podcast

Artwork for Security Intelligence

Latest Episodes

We’ve all heard tales of what lurks on the dark web. Black markets dealing in contraband. Roving criminal gangs. Troves and troves of private data for sale. Much, much worse. 

Thankfully, most of it’s fake. The real trouble is figuring out what isn’... more

Sophos let OpenClaw run wild on its network (sort of). It wasn’t as bad an idea as it sounds!

With a few guardrails and restrictions in place, the security software firm turned OpenClaw into a serious little pen tester, surfacing “23 actionable, hi... more

YouTube

Earlier this week, OpenAI dropped GPT-5.4-Cyber, a “cyber-permissive” variant of GPT-5.4 .   

Basically: It's lets you do some things in the name of security research and defense that you can’t normally do with a regular GPT model.  

But you have t... more

YouTube

Where does that leave the rest of us, who don’t get to tinker with perhaps the most advanced model yet? 

This week on Security Intelligence, Sridhar Muppidi, Michelle Alvarez, and Dustin “EvilMog” Heywood join host Matt Kosinski to discuss what Myth... more

YouTube

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Risky Business
Risky BusinessRisky Business Media
SpyCast
SpyCastSpyCast
CyberWire Daily
CyberWire DailyN2K Networks

Recent Guests

Jeff Crume
Cybersecurity expert featured on the episode
[Not explicitly stated]
Episode: GPT-5.4-Cyber: What you need to know
Martin Keen
Cybersecurity expert featured on the episode
[Not explicitly stated]
Episode: GPT-5.4-Cyber: What you need to know
Dustin Heywood
X-Force Executive Managing Hacker, Senior Technical Staff Member
IBM Security
Episode: Claude Mythos: Marketing hype or the end of cybersecurity?
JR Rao
IBM fellow, CTO Security Research
IBM
Episode: The Claude Code source code leak: Takeaways for cybersecurity pros
Jake Lundberg
Field CTO, HashiCorp
HashiCorp
Episode: RSA recap, the LiteLLM breach, and the quest to fix AI agent security
Austin Zeizel
Threat intelligence consultant with IBM X-Force and a crypto enthusiast
IBM X-Force
Episode: Cryptocurrency: The most misunderstood technology in cybersecurity
Kimmie Farrington
Security detection engineer
IBM
Episode: Promptware, cloud security trends for 2026, and what the Xbox One hack means for cybersecurity
Ian Molloy
Department head security research
IBM
Episode: Promptware, cloud security trends for 2026, and what the Xbox One hack means for cybersecurity
Seth Glasgow
Cyber range executive advisor
IBM
Episode: Promptware, cloud security trends for 2026, and what the Xbox One hack means for cybersecurity

Host

Matt Kozinski
Host of Security Intelligence

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#123
Switzerland/Technology
Apple Podcasts
#160
South Africa/Technology
Apple Podcasts
#205
Taiwan/Technology
Apple Podcasts
#225
Hong Kong/Technology
Apple Podcasts
#232
Colombia/Technology

Talking Points

Recent interactions between the hosts and their guests.

The Claude Code source code leak: Takeaways for cybersecurity pros
Q: What does attribution matter for defenders, given the murkiness around who did what in TeamPCP?
Attribution helps identify threat actor TTPs and informs defensive detections, but the priority for defenders is to assume breach, remediate quickly, and strengthen defenses regardless of who is behind the attack.
The Claude Code source code leak: Takeaways for cybersecurity pros
Q: Is this leak worse because it comes from an AI coding tool integrated into CI/CD pipelines?
Yes, because it can enable attackers to bypass guardrails and quickly assemble malicious workflows; defenders must tighten controls around open-source dependencies and implement more robust verification and monitoring in the build process.
The Claude Code source code leak: Takeaways for cybersecurity pros
Q: What's your take on Claude Code being a supply-chain security problem rather than a Claude-specific leak?
The issue is the broader ecosystem where forks, typosquatting, and dependency confusion exist; the leak highlights that trust is decentralized and must be managed across the entire supply chain, not just within a single project.
Promptware, cloud security trends for 2026, and what the Xbox One hack means for cybersecurity
Q: Seth, what practical steps should defenders take to secure AI agents given the emphasis on identity and access management?
Treat AI agents as privileged accounts, implement strict IAM controls, monitor for unusual access patterns, ensure granular permissions, and establish telemetry to trace agent actions and potential misuse across the environment.
Promptware, cloud security trends for 2026, and what the Xbox One hack means for cybersecurity
Q: Ian, what do you think we gain by framing prompt vulnerabilities as PromptWare rather than focusing solely on prompt injections?
We gain a fuller picture of where and how attackers can pivot, showing that vulnerabilities exist across many stages of the attack lifecycle and that defending the ecosystem requires more comprehensive controls beyond just guardrails for prompts.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Security Intelligence

What is Security Intelligence about and what kind of topics does it cover?

Security-focused discussions center on the evolving cybersecurity landscape, with frequent exploration of AI-enabled threats, identity and access management, secure software lifecycles, and practical defenses. Episodes often feature IBM Security and X-Force experts alongside invited guests, offering hands-on analysis of current incidents, vulnerability trends, and governance strategies. The show stands out for bridging cutting-edge research with operational security, governance, and risk considerations, while emphasizing practical mitigations and human-centric defenses. Listeners can expect timely tech updates, strategic frameworks, and concrete takeaways useful for defenders, incident responders, and security leaders.

Where can I find podcast stats for Security Intelligence?

Rephonic provides a wide range of podcast stats for Security Intelligence. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Security Intelligence and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Security Intelligence get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Security Intelligence, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Security Intelligence?

Rephonic provides comprehensive predictive audience data for Security Intelligence, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Security Intelligence have?

To see how many followers or subscribers Security Intelligence has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Security Intelligence?

These podcasts share a similar audience with Security Intelligence:

1. Risky Business
2. Mixture of Experts
3. SpyCast
4. CyberWire Daily
5. Cybersecurity Headlines

How many episodes of Security Intelligence are there?

Security Intelligence launched 8 months ago and published 39 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Security Intelligence?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Security Intelligence?

Rephonic pulls ratings and reviews for Security Intelligence from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Security Intelligence?

Rephonic provides full transcripts for episodes of Security Intelligence. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Security Intelligence?

Recent guests on Security Intelligence include:

1. Jeff Crume
2. Martin Keen
3. Dustin Heywood
4. JR Rao
5. Jake Lundberg
6. Austin Zeizel
7. Kimmie Farrington
8. Ian Molloy

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days