
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Total monthly reach
Estimated from 1 chart position in 1 market.
By chart position
- 🇻🇳VN · Technology#4710K to 30K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
3K to 9K🎙 Daily cadence·36 episodes·Last published 6d ago - Monthly Reach
Unique listeners across all episodes (30 days)
10K to 30K🇻🇳100% - Active Followers
Loyal subscribers who consistently listen
5.5K to 17K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
Recent episodes
Claude Security’s public beta, OpenAI’s five-point plan and cybersecurity’s Y2K moment
May 6, 2026
30m 03s
Is open source safe? Featuring Mixture of Experts
Apr 29, 2026
25m 23s
Should you let OpenClaw pen test your system? Plus: Cybersecurity for ephemeral software
Apr 22, 2026
36m 12s
GPT-5.4-Cyber: What you need to know
Apr 16, 2026
11m 42s
Claude Mythos: Marketing hype or the end of cybersecurity?
Apr 15, 2026
29m 32s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Description | Length | |
|---|---|---|---|---|
| 5/6/26 | Claude Security’s public beta, OpenAI’s five-point plan and cybersecurity’s Y2K moment | Between Mythos, GPT-5.4-Cyber, Claude Security’s public beta and OpenAI’s new five-point plan for cyber defense, it seems like cybersecurity is top of mind for the major AI players today. Why—and why now? On this week’s episode of IBM Security Intelligence, Dustin “EvilMog” Heywood, Omari Jones and Kimmie Farrington discuss what CrowdStrike has called “cybersecurity’s Y2K moment.” As the major AI players roll out security-focused solutions—and sophisticated AI tools are weaponized by threat actors—we need all-hands on deck to avert disaster. But will we? Plus: The Coalition for Secure AI’s framework for AI identities and Copy Fail, a newly discovered Linux flaw with a potentially massive blast radius. All that and more on Security Intelligence. Segments: 00:00 -- Intro 1:11 - Cybersecurity’s Y2K moment 10:52 -- Framework for AI identity 22:23 -- Copy Fail The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence | 30m 03s | |
| 4/29/26 | Is open source safe? Featuring Mixture of Experts | Is open source good? Bad? Some secret third thing? Is this a silly question to even ask? In this special crossover episode of Security Intelligence and Mixture of Experts, we bring together AI and security experts to address one of the thorniest questions in tech right now: How do you enjoy the unique benefits of open source AI while managing its very real risks? MoE stalwarts Gabe Goodhart and Martin Keen join SI all-star Jeff Crume to dig into: Why open source is foundational to AI innovation Security concerns of both proprietary and open source AI infrastructure The difference between "secure" and “securable” And a whole lot more! Along the way, we hash out a robust, nuanced picture of the relationships between AI, security and open source. Go beyond the buzzwords to what really matters on this week’s episode of Security Intelligence. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence | 25m 23s | |
| 4/22/26 | Should you let OpenClaw pen test your system? Plus: Cybersecurity for ephemeral software | Learn more about how enterprises confront agentic attacks → https://newsroom.ibm.com/2026-04-15-ibm-announces-new-cybersecurity-measures-to-help-enterprises-confront-agentic-attacks Sophos let OpenClaw run wild on its network (sort of). It wasn’t as bad an idea as it sounds! With a few guardrails and restrictions in place, the security software firm turned OpenClaw into a serious little pen tester, surfacing “23 actionable, high-quality findings.” But is this a sustainable model for introducing AI agents to the security process? And how do we deal with the inevitable friction between a model meant to find exploits and the guardrails telling it to do no harm? This week, host Matt Kosinski and panelists Claire Nuñez, Dave McGinnis and Kimmie Farrington discuss the wisdom and folly of letting an AI agent pen test your system. Plus: We dig into Bruce Schneier’s thoughts on “security in the age of instant software” and a report from CipherCue that ransomware is growing three times faster than security spending. All that and more on Security Intelligence. Segments: 00:00 – Intro 1:07 -- OpenClaw as a pen tester 14:23 -- Cybersecurity for instant software 25:36 -- Ransomware outpaces security spending The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform → https://www.ibm.com/think/podcasts/security-intelligence | 36m 12s | |
| 4/16/26 | GPT-5.4-Cyber: What you need to know | Earlier this week, OpenAI dropped GPT-5.4-Cyber, a “cyber-permissive” variant of GPT-5.4 . Basically: It's lets you do some things in the name of security research and defense that you can’t normally do with a regular GPT model. But you have to prove you’re a cybersecurity pro with good intentions to get access. On this bonus episode of Security Intelligence, Jeff Crume and Martin Keen join host Matthew Kosinski to break down what the new model means for cybersecurity and the big picture trends driving the evolution of LLMs. The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence | 11m 42s | |
| 4/15/26 | Claude Mythos: Marketing hype or the end of cybersecurity? | Anthropic says its newest AI model, Claude Mythos, has found thousands of zero-day vulnerabilities across every major OS and web browser. It's so powerful, they won't release it publicly. Instead, they’re restricting access to a handful of trusted partners, who get to experiment with Mythos through a new initiative called Project Glasswing. Where does that leave the rest of us, who don’t get to tinker with perhaps the most advanced model yet? This week on Security Intelligence, Sridhar Muppidi, Michelle Alvarez, and Dustin “EvilMog” Heywood join host Matt Kosinski to discuss what Mythos and Glasswing really mean for the average security pro. How much is hype? How much is the real deal? And how could this limited release backfire? Then: The FBI’s 2025 Internet Crime Report saw scam losses jump 26%, and Accenture found a 127% increase in malicious hackers trying to recruit the employees of their targets. All that and more on Security Intelligence. Segments: 00:00 – Intro 1:22 -- Claude Mythos and Project Glasswing 12:26 -- The 2025 Internet Crime Report 20:19 -- Attackers recruiting more insiders The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Read more about AI raising cybersecurity stakes → https://www.ibm.com/think/news/anthropic-claude-ai-mythos-project-glasswing-raises-stakes-cybersecurity Follow the Security Intelligence podcast on your preferred platform → https://www.ibm.com/think/podcasts/security-intelligence | 29m 32s | |
| 4/8/26 | The Claude Code source code leak: Takeaways for cybersecurity pros | What happens when one of the world’s most popular AI coding tools falls into the wrong hands? On this episode of Security Intelligence, Nick Bradley, Dave Bales and JR Rao discuss the Claude Code source code leak. Attackers are already using the opportunity to spread malware through fake repos, but the real question is how threat actors might use their newfound knowledge of Claude Code’s internals to wreak havoc on AI agents and the CI/CD pipeline. Then, we follow up on our old friends TeamPCP, Shiny Hunters and Lapsus$, whose overlapping data breach claims are causing no small amount of confusion and consternation among security pros. We examine the credential rotation problem and the uneven security surface of modern supply chains that helped get us in this mess. Plus: Threat intelligence usually focuses on attacks that did happen. But what if we started talking about the ones that didn’t? And do cybercriminals have anything to teach us about “mature” AI adoption? Some big names seem to think so. All that and more on Security Intelligence. Segments: 00:00 – Intro 1:12 -- The Claude Code leak 11:19 -- TeamPCP’s breach spree 21:21 -- “Close-call” databases 29:28 -- Cybercrime and AI adoption The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. Follow the Security Intelligence podcast on your preferred platform: https://www.ibm.com/think/podcasts/security-intelligence | 41m 31s | |
| 9/5/25 | Introducing Security Intelligence Podcast | Cybersecurity moves fast: Old vulnerabilities are patched as new exploits appear. Cybercrime gangs form and strike and fade, disappearing with millions of ransom dollars. What protected the organization yesterday might leave it hopelessly exposed today. At the same time, cybersecurity pros rely on core principles—like the CIA triad of infosec, the principle of least privilege, zero trust architectures—to help them navigate this shifting terrain.Security Intelligence addresses both of these angles in a single, exciting, and digestible podcast episode every week. Listeners learn both the latest news and timeless insights, all from experts they can trust. This format speaks directly to the needs and preferences of cybersecurity practitioners, who want frequent, granular and technical content that gives need-to-know information. | 0m 40s |
Showing 7 of 7
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.
