<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/feed.xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:fireside="https://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>feed01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 01 May 2026 07:16:56 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Scinary Information Nexus</title>
    <link>https://scinary-info-nexus.fireside.fm</link>
    <atom:link href="https://feeds.fireside.fm/scinary-info-nexus/rss" rel="self" type="application/rss+xml"/>
    <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub"/>
    <pubDate>Fri, 01 May 2026 07:15:04 -0500</pubDate>
    <description>Scinary Cybersecurity is here to "Serve and defend those who serve and defend others". To help us "serve and defend" we pull from many different sources - experts, colleagues, industry standards, etc...   We hit every subject from all angles making it easy to understand while also letting us go in depth. Making this podcast perfect for cybersecurity beginners and experts alike.  Come join us on our journey to constantly educate ourselves and explore the amazing things that are happening in our industry. 
</description>
    <language>en-us</language>
    <copyright>© 2026 Scinary Cybersecurity</copyright>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Cybersecurity discussions, news, and expert interviews</itunes:subtitle>
    <itunes:author>Scinary Cybersecurity</itunes:author>
    <itunes:summary>Scinary Cybersecurity is here to "Serve and defend those who serve and defend others". To help us "serve and defend" we pull from many different sources - experts, colleagues, industry standards, etc...   We hit every subject from all angles making it easy to understand while also letting us go in depth. Making this podcast perfect for cybersecurity beginners and experts alike.  Come join us on our journey to constantly educate ourselves and explore the amazing things that are happening in our industry. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
    <itunes:explicit>false</itunes:explicit>
    <itunes:keywords>cybersecurity, cyber, tech, talk show, scinary, information, nexus</itunes:keywords>
    <itunes:owner>
      <itunes:name>Scinary Cybersecurity</itunes:name>
      <itunes:email>info@scinary.com</itunes:email>
    </itunes:owner>
    <podcast:podping usesPodping="true"/>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
    <item>
      <title>Episode 42: Pawn Shop Forensics, Palantir &amp; Techno-Feudalism</title>
      <link>https://scinary-info-nexus.fireside.fm/42</link>
      <guid isPermaLink="false">112af46a-3baa-4b99-b807-d0113882e350</guid>
      <pubDate>Fri, 01 May 2026 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/112af46a-3baa-4b99-b807-d0113882e350.mp3" length="53211272" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week on Scinary Information Nexus, Pierre Vivoni fills in as the crew dives into topics like pawn shop laptop forensics, BitLocker security, techno-feudalism, and how AI hardware hoarding is driving up SSD and RAM costs. They also discuss deceptive open-source models, Palantir's government ties, and why tech marketing keeps the public disconnected from basic IT realities.</itunes:subtitle>
      <itunes:duration>54:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to Scinary Information Nexus! Pierre Vivoni steps in for Brazos this week, joining Mario Ortiz and Richard Martin. We start things off with a mystery brew, react to some wild comments from last week, and share a field trip story involving pawn shop laptops, OSINT, and the surprising power of BitLocker.</p>

<p>We also talk about &quot;techno-feudalism&quot; and the massive power held by tech monopolies. We cover the influence of the PayPal Mafia, Palantir&#39;s ties to the DoD, and how AI companies hoarding hardware are driving up SSD and RAM costs. Plus, we look at the backlash against Microsoft&#39;s AI tools acting like telemetry spyware and reports of open-source models secretly exfiltrating data.</p>

<p>Later, we get into why so many people still think &quot;the cloud&quot; is magic, and why relentless tech marketing is to blame for disconnecting the public from basic IT realities. We finish out the episode talking about free will and weekend plans involving OPNsense routers.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Pawn shop forensics: What happens when you try to crack un-wiped laptops?</li>
<li>Why BitLocker is surprisingly effective against unauthorized access</li>
<li>The PayPal Mafia and Palantir&#39;s deep connections to government infrastructure</li>
<li>How AI hardware hoarding is driving up the price of SSDs and RAM</li>
<li>Reports of deceptive open-source projects secretly exfiltrating data</li>
<li>Why tech marketing wants you to think the internet is magic</li>
<li>Upgrading home networks with OPNsense firewalls</li>
</ul>

<p>Do you think tech marketing is intentionally misleading consumers? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InfoSec #OSINT #OPNsense #ThreatIntel</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to Scinary Information Nexus! Pierre Vivoni steps in for Brazos this week, joining Mario Ortiz and Richard Martin. We start things off with a mystery brew, react to some wild comments from last week, and share a field trip story involving pawn shop laptops, OSINT, and the surprising power of BitLocker.</p>

<p>We also talk about &quot;techno-feudalism&quot; and the massive power held by tech monopolies. We cover the influence of the PayPal Mafia, Palantir&#39;s ties to the DoD, and how AI companies hoarding hardware are driving up SSD and RAM costs. Plus, we look at the backlash against Microsoft&#39;s AI tools acting like telemetry spyware and reports of open-source models secretly exfiltrating data.</p>

<p>Later, we get into why so many people still think &quot;the cloud&quot; is magic, and why relentless tech marketing is to blame for disconnecting the public from basic IT realities. We finish out the episode talking about free will and weekend plans involving OPNsense routers.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Pawn shop forensics: What happens when you try to crack un-wiped laptops?</li>
<li>Why BitLocker is surprisingly effective against unauthorized access</li>
<li>The PayPal Mafia and Palantir&#39;s deep connections to government infrastructure</li>
<li>How AI hardware hoarding is driving up the price of SSDs and RAM</li>
<li>Reports of deceptive open-source projects secretly exfiltrating data</li>
<li>Why tech marketing wants you to think the internet is magic</li>
<li>Upgrading home networks with OPNsense firewalls</li>
</ul>

<p>Do you think tech marketing is intentionally misleading consumers? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InfoSec #OSINT #OPNsense #ThreatIntel</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to Scinary Information Nexus! Pierre Vivoni steps in for Brazos this week, joining Mario Ortiz and Richard Martin. We start things off with a mystery brew, react to some wild comments from last week, and share a field trip story involving pawn shop laptops, OSINT, and the surprising power of BitLocker.</p>

<p>We also talk about &quot;techno-feudalism&quot; and the massive power held by tech monopolies. We cover the influence of the PayPal Mafia, Palantir&#39;s ties to the DoD, and how AI companies hoarding hardware are driving up SSD and RAM costs. Plus, we look at the backlash against Microsoft&#39;s AI tools acting like telemetry spyware and reports of open-source models secretly exfiltrating data.</p>

<p>Later, we get into why so many people still think &quot;the cloud&quot; is magic, and why relentless tech marketing is to blame for disconnecting the public from basic IT realities. We finish out the episode talking about free will and weekend plans involving OPNsense routers.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Pawn shop forensics: What happens when you try to crack un-wiped laptops?</li>
<li>Why BitLocker is surprisingly effective against unauthorized access</li>
<li>The PayPal Mafia and Palantir&#39;s deep connections to government infrastructure</li>
<li>How AI hardware hoarding is driving up the price of SSDs and RAM</li>
<li>Reports of deceptive open-source projects secretly exfiltrating data</li>
<li>Why tech marketing wants you to think the internet is magic</li>
<li>Upgrading home networks with OPNsense firewalls</li>
</ul>

<p>Do you think tech marketing is intentionally misleading consumers? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InfoSec #OSINT #OPNsense #ThreatIntel</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+6k246-MD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+6k246-MD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 41: Is Your EDR Actually A Government Backdoor?</title>
      <link>https://scinary-info-nexus.fireside.fm/41</link>
      <guid isPermaLink="false">cd50d681-be90-4ad3-822d-f6846e683f5e</guid>
      <pubDate>Fri, 17 Apr 2026 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/cd50d681-be90-4ad3-822d-f6846e683f5e.mp3" length="59697162" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The Scinary Information Nexus crew breaks down a severe CISA advisory on Iranian cyber threats before spiraling into a hilarious and terrifying debate on cybersecurity conspiracy theories, the Third-Party Doctrine, and government surveillance.</itunes:subtitle>
      <itunes:duration>1:01:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, Richard, Joseph, Brazos, and Hunter kick things off with a look at a recent CISA advisory about Iranian threat actors targeting U.S. critical infrastructure. We break down the reality of operational technology (OT) vulnerabilities. Even though nation-state attacks are increasing, the root causes are usually the same: unpatched legacy systems, exposed PLCs, and missing MFA.</p>

<p>Then, we get into some cybersecurity conspiracy theories. The crew talks about the &quot;Death of the Internet&quot; driven by AI bots, the FCC&#39;s push for U.S.-assembled networking equipment, and the third-party doctrine. Under this doctrine, tech giants can legally hand over your user data to the government without a warrant.</p>

<p>We also ask the real questions: Are all EDR platforms just secret government backdoors? From modern tech surveillance to the Snowden leaks, we talk about what it actually takes to maintain online privacy today, or if going totally off-grid is the only option left.</p>

<p>Topics covered:</p>

<ul>
<li>The latest CISA advisory on Iranian actors hitting critical infrastructure</li>
<li>Why patching and MFA are still failing in OT environments</li>
<li>Conspiracy theories: AI bots and the &quot;Death of the Internet&quot;</li>
<li>FCC restrictions on foreign routers and supply chain realities</li>
<li>How the third-party doctrine bypasses your Fourth Amendment protections</li>
<li>Are EDR platforms actually government backdoors?</li>
<li>Modern surveillance and escaping the grid</li>
</ul>

<p>Is it still possible to maintain your online privacy, or is going off-grid the only option? Let us know your thoughts in the comments below!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<p>00:00 Intro<br>
01:45 CISA Advisory &amp; Infrastructure Threats<br>
24:25 Conspiracy Theories: Death of the Internet<br>
28:00 Router Bans &amp; Supply Chain Realities<br>
36:00 Third-Party Doctrine &amp; Digital Privacy<br>
43:55 Are EDR Platforms Government Backdoors?<br>
48:10 Escaping the Grid &amp; Tech Surveillance</p>

<h1>Cybersecurity #InfoSec #Privacy #EDR #Surveillance #Hacking #CISA #SupplyChain</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, Richard, Joseph, Brazos, and Hunter kick things off with a look at a recent CISA advisory about Iranian threat actors targeting U.S. critical infrastructure. We break down the reality of operational technology (OT) vulnerabilities. Even though nation-state attacks are increasing, the root causes are usually the same: unpatched legacy systems, exposed PLCs, and missing MFA.</p>

<p>Then, we get into some cybersecurity conspiracy theories. The crew talks about the &quot;Death of the Internet&quot; driven by AI bots, the FCC&#39;s push for U.S.-assembled networking equipment, and the third-party doctrine. Under this doctrine, tech giants can legally hand over your user data to the government without a warrant.</p>

<p>We also ask the real questions: Are all EDR platforms just secret government backdoors? From modern tech surveillance to the Snowden leaks, we talk about what it actually takes to maintain online privacy today, or if going totally off-grid is the only option left.</p>

<p>Topics covered:</p>

<ul>
<li>The latest CISA advisory on Iranian actors hitting critical infrastructure</li>
<li>Why patching and MFA are still failing in OT environments</li>
<li>Conspiracy theories: AI bots and the &quot;Death of the Internet&quot;</li>
<li>FCC restrictions on foreign routers and supply chain realities</li>
<li>How the third-party doctrine bypasses your Fourth Amendment protections</li>
<li>Are EDR platforms actually government backdoors?</li>
<li>Modern surveillance and escaping the grid</li>
</ul>

<p>Is it still possible to maintain your online privacy, or is going off-grid the only option? Let us know your thoughts in the comments below!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<p>00:00 Intro<br>
01:45 CISA Advisory &amp; Infrastructure Threats<br>
24:25 Conspiracy Theories: Death of the Internet<br>
28:00 Router Bans &amp; Supply Chain Realities<br>
36:00 Third-Party Doctrine &amp; Digital Privacy<br>
43:55 Are EDR Platforms Government Backdoors?<br>
48:10 Escaping the Grid &amp; Tech Surveillance</p>

<h1>Cybersecurity #InfoSec #Privacy #EDR #Surveillance #Hacking #CISA #SupplyChain</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, Richard, Joseph, Brazos, and Hunter kick things off with a look at a recent CISA advisory about Iranian threat actors targeting U.S. critical infrastructure. We break down the reality of operational technology (OT) vulnerabilities. Even though nation-state attacks are increasing, the root causes are usually the same: unpatched legacy systems, exposed PLCs, and missing MFA.</p>

<p>Then, we get into some cybersecurity conspiracy theories. The crew talks about the &quot;Death of the Internet&quot; driven by AI bots, the FCC&#39;s push for U.S.-assembled networking equipment, and the third-party doctrine. Under this doctrine, tech giants can legally hand over your user data to the government without a warrant.</p>

<p>We also ask the real questions: Are all EDR platforms just secret government backdoors? From modern tech surveillance to the Snowden leaks, we talk about what it actually takes to maintain online privacy today, or if going totally off-grid is the only option left.</p>

<p>Topics covered:</p>

<ul>
<li>The latest CISA advisory on Iranian actors hitting critical infrastructure</li>
<li>Why patching and MFA are still failing in OT environments</li>
<li>Conspiracy theories: AI bots and the &quot;Death of the Internet&quot;</li>
<li>FCC restrictions on foreign routers and supply chain realities</li>
<li>How the third-party doctrine bypasses your Fourth Amendment protections</li>
<li>Are EDR platforms actually government backdoors?</li>
<li>Modern surveillance and escaping the grid</li>
</ul>

<p>Is it still possible to maintain your online privacy, or is going off-grid the only option? Let us know your thoughts in the comments below!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<p>00:00 Intro<br>
01:45 CISA Advisory &amp; Infrastructure Threats<br>
24:25 Conspiracy Theories: Death of the Internet<br>
28:00 Router Bans &amp; Supply Chain Realities<br>
36:00 Third-Party Doctrine &amp; Digital Privacy<br>
43:55 Are EDR Platforms Government Backdoors?<br>
48:10 Escaping the Grid &amp; Tech Surveillance</p>

<h1>Cybersecurity #InfoSec #Privacy #EDR #Surveillance #Hacking #CISA #SupplyChain</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+cwLOOmS1</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+cwLOOmS1" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 40: When Google Deletes Your Workspace &amp; Intune Becomes a Weapon</title>
      <link>https://scinary-info-nexus.fireside.fm/40</link>
      <guid isPermaLink="false">ea5069ed-1f30-4fe8-b475-a64aa05c1aa6</guid>
      <pubDate>Fri, 03 Apr 2026 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ea5069ed-1f30-4fe8-b475-a64aa05c1aa6.mp3" length="57948291" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team tackles a trio of wild stories shaking up the tech world. They start with the breaking news of a Supermicro co-founder's arrest for allegedly smuggling $2.5 billion in GPUs to China, debating the true motives behind the crime. Next, they do a deep dive into the massive Stryker breach, revealing how attackers bypassed MFA and used a built-in Microsoft Intune "wipe" feature to cause destruction. Finally, they uncover a nightmare scenario where Google permanently deleted a K-12 school's entire digital workspace without warning after a compromised admin account was used to send bulk spam. Plus, Brazos shares a hilarious personal story about almost falling for a phone scam.</itunes:subtitle>
      <itunes:duration>59:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! Settle in, because we have a massive week of cybersecurity news to unpack covering bizarre arrests, cloud nightmares, and inside threats.</p>

<p>This week, Richard, Joseph, Mario, and Brazos kick things off with the breaking overnight news: a Supermicro co-founder has been arrested for allegedly smuggling $2.5 billion in Nvidia GPUs to China. We debate the real motives - was it just about the money, or is there a deeper, darker reason behind the black market hustle? </p>

<p>Then, we revisit the devastating Stryker attack. The team uncovers how the threat actors didn&#39;t use crazy malware to wipe the devices, but instead bypassed MFA and simply used a built-in Microsoft Intune feature to destroy the network. We discuss why a &quot;two-key&quot; admin approval system is desperately needed. </p>

<p>Finally, we share a terrifying real-world case study we&#39;re actively working on: A K-12 school had their entire Google Workspace completely deleted by Google without warning. After a super admin account was compromised to send bulk spam, Google&#39;s automated systems nuked the domain—leaving the school completely locked out of email and Drive. </p>

<p>In this episode, we discuss:</p>

<ul>
<li>The $2.5 Billion Super Micro scandal: Smuggling GPUs to China.</li>
<li>The Stryker Attack: How attackers used Microsoft Intune against them.</li>
<li>The desperate need for multi-admin approval in cloud environments.</li>
<li>Social Engineering in action: Brazos’s run-in with a fake sheriff.</li>
<li>The Google Workspace Nightmare: What happens when an automated system permanently deletes your domain.</li>
<li>The dangerous illusion of the &quot;Shared Responsibility&quot; cloud model.</li>
</ul>

<p>Could your entire infrastructure be wiped by a single rogue button? Let&#39;s discuss. </p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InfoSec #Podcast #TechNews</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! Settle in, because we have a massive week of cybersecurity news to unpack covering bizarre arrests, cloud nightmares, and inside threats.</p>

<p>This week, Richard, Joseph, Mario, and Brazos kick things off with the breaking overnight news: a Supermicro co-founder has been arrested for allegedly smuggling $2.5 billion in Nvidia GPUs to China. We debate the real motives - was it just about the money, or is there a deeper, darker reason behind the black market hustle? </p>

<p>Then, we revisit the devastating Stryker attack. The team uncovers how the threat actors didn&#39;t use crazy malware to wipe the devices, but instead bypassed MFA and simply used a built-in Microsoft Intune feature to destroy the network. We discuss why a &quot;two-key&quot; admin approval system is desperately needed. </p>

<p>Finally, we share a terrifying real-world case study we&#39;re actively working on: A K-12 school had their entire Google Workspace completely deleted by Google without warning. After a super admin account was compromised to send bulk spam, Google&#39;s automated systems nuked the domain—leaving the school completely locked out of email and Drive. </p>

<p>In this episode, we discuss:</p>

<ul>
<li>The $2.5 Billion Super Micro scandal: Smuggling GPUs to China.</li>
<li>The Stryker Attack: How attackers used Microsoft Intune against them.</li>
<li>The desperate need for multi-admin approval in cloud environments.</li>
<li>Social Engineering in action: Brazos’s run-in with a fake sheriff.</li>
<li>The Google Workspace Nightmare: What happens when an automated system permanently deletes your domain.</li>
<li>The dangerous illusion of the &quot;Shared Responsibility&quot; cloud model.</li>
</ul>

<p>Could your entire infrastructure be wiped by a single rogue button? Let&#39;s discuss. </p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InfoSec #Podcast #TechNews</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! Settle in, because we have a massive week of cybersecurity news to unpack covering bizarre arrests, cloud nightmares, and inside threats.</p>

<p>This week, Richard, Joseph, Mario, and Brazos kick things off with the breaking overnight news: a Supermicro co-founder has been arrested for allegedly smuggling $2.5 billion in Nvidia GPUs to China. We debate the real motives - was it just about the money, or is there a deeper, darker reason behind the black market hustle? </p>

<p>Then, we revisit the devastating Stryker attack. The team uncovers how the threat actors didn&#39;t use crazy malware to wipe the devices, but instead bypassed MFA and simply used a built-in Microsoft Intune feature to destroy the network. We discuss why a &quot;two-key&quot; admin approval system is desperately needed. </p>

<p>Finally, we share a terrifying real-world case study we&#39;re actively working on: A K-12 school had their entire Google Workspace completely deleted by Google without warning. After a super admin account was compromised to send bulk spam, Google&#39;s automated systems nuked the domain—leaving the school completely locked out of email and Drive. </p>

<p>In this episode, we discuss:</p>

<ul>
<li>The $2.5 Billion Super Micro scandal: Smuggling GPUs to China.</li>
<li>The Stryker Attack: How attackers used Microsoft Intune against them.</li>
<li>The desperate need for multi-admin approval in cloud environments.</li>
<li>Social Engineering in action: Brazos’s run-in with a fake sheriff.</li>
<li>The Google Workspace Nightmare: What happens when an automated system permanently deletes your domain.</li>
<li>The dangerous illusion of the &quot;Shared Responsibility&quot; cloud model.</li>
</ul>

<p>Could your entire infrastructure be wiped by a single rogue button? Let&#39;s discuss. </p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InfoSec #Podcast #TechNews</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+AEJ7zZsf</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+AEJ7zZsf" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 39: Weaponizing Trust: The Threat of Compromised MDMs</title>
      <link>https://scinary-info-nexus.fireside.fm/39</link>
      <guid isPermaLink="false">8551e5b6-5e11-47f2-b280-5d0f6356fb75</guid>
      <pubDate>Fri, 20 Mar 2026 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/8551e5b6-5e11-47f2-b280-5d0f6356fb75.mp3" length="58866183" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>Richard is back in the studio as the team dissects the massive cyberattack on medical device giant Stryker. They break down how an Iranian-backed hacktivist group (Handala) managed to shut down 70 global offices and wipe 20,000 machines-including the personal phones of employees connected to the company's mobile device management (MDM). </itunes:subtitle>
      <itunes:duration>1:00:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After a category 4 hangover (and some failed attempts to lock him out), Richard is back in the studio with the team to discuss a massive development in critical infrastructure security.</p>

<p>This week, we are breaking down the devastating cyberattack on Stryker, a major medical device manufacturer. After an Iranian-backed hacktivist group triggered a catastrophic breach, 70 global offices were shut down and 20,000 machines were wiped. We discuss why Stryker was targeted, the brutal reality of employees having their personal cell phones completely wiped via the company&#39;s MDM, and the terrifying differences between financial ransomware gangs and nation-state actors bent purely on destruction. </p>

<p>Plus, Mario and the team dive into live stock market tracking to uncover a highly suspicious multi-million dollar stock dump by insiders just weeks before the attack. Was it a coincidence, or the ultimate insider threat? </p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Stryker Breach: How Iranian hacktivists took down 20,000 machines globally.</li>
<li>BYOD Nightmare: Why connecting your personal phone to company portals can result in total data loss.</li>
<li>Cyber Warfare Motives: Sabotage and defacement vs. financial extortion.</li>
<li>The &quot;Radicalization Pipeline&quot;: How terrorist groups grow (explained via Taylor Swift and Sex and the City fans).</li>
<li>Live Conspiracy Theory: Tracking massive insider stock sell-offs right before the breach.</li>
<li>A quick teaser for next week&#39;s highly anticipated Google discussion.</li>
</ul>

<p>If a nation-state decides your company is their next target, do you stand a chance? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Stryker #Hacktivism #DataBreach #InfoSec</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After a category 4 hangover (and some failed attempts to lock him out), Richard is back in the studio with the team to discuss a massive development in critical infrastructure security.</p>

<p>This week, we are breaking down the devastating cyberattack on Stryker, a major medical device manufacturer. After an Iranian-backed hacktivist group triggered a catastrophic breach, 70 global offices were shut down and 20,000 machines were wiped. We discuss why Stryker was targeted, the brutal reality of employees having their personal cell phones completely wiped via the company&#39;s MDM, and the terrifying differences between financial ransomware gangs and nation-state actors bent purely on destruction. </p>

<p>Plus, Mario and the team dive into live stock market tracking to uncover a highly suspicious multi-million dollar stock dump by insiders just weeks before the attack. Was it a coincidence, or the ultimate insider threat? </p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Stryker Breach: How Iranian hacktivists took down 20,000 machines globally.</li>
<li>BYOD Nightmare: Why connecting your personal phone to company portals can result in total data loss.</li>
<li>Cyber Warfare Motives: Sabotage and defacement vs. financial extortion.</li>
<li>The &quot;Radicalization Pipeline&quot;: How terrorist groups grow (explained via Taylor Swift and Sex and the City fans).</li>
<li>Live Conspiracy Theory: Tracking massive insider stock sell-offs right before the breach.</li>
<li>A quick teaser for next week&#39;s highly anticipated Google discussion.</li>
</ul>

<p>If a nation-state decides your company is their next target, do you stand a chance? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Stryker #Hacktivism #DataBreach #InfoSec</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After a category 4 hangover (and some failed attempts to lock him out), Richard is back in the studio with the team to discuss a massive development in critical infrastructure security.</p>

<p>This week, we are breaking down the devastating cyberattack on Stryker, a major medical device manufacturer. After an Iranian-backed hacktivist group triggered a catastrophic breach, 70 global offices were shut down and 20,000 machines were wiped. We discuss why Stryker was targeted, the brutal reality of employees having their personal cell phones completely wiped via the company&#39;s MDM, and the terrifying differences between financial ransomware gangs and nation-state actors bent purely on destruction. </p>

<p>Plus, Mario and the team dive into live stock market tracking to uncover a highly suspicious multi-million dollar stock dump by insiders just weeks before the attack. Was it a coincidence, or the ultimate insider threat? </p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Stryker Breach: How Iranian hacktivists took down 20,000 machines globally.</li>
<li>BYOD Nightmare: Why connecting your personal phone to company portals can result in total data loss.</li>
<li>Cyber Warfare Motives: Sabotage and defacement vs. financial extortion.</li>
<li>The &quot;Radicalization Pipeline&quot;: How terrorist groups grow (explained via Taylor Swift and Sex and the City fans).</li>
<li>Live Conspiracy Theory: Tracking massive insider stock sell-offs right before the breach.</li>
<li>A quick teaser for next week&#39;s highly anticipated Google discussion.</li>
</ul>

<p>If a nation-state decides your company is their next target, do you stand a chance? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Stryker #Hacktivism #DataBreach #InfoSec</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+R6jysbZX</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+R6jysbZX" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 38: Running a Security Operations Center: The Good, The Bad &amp; The AI</title>
      <link>https://scinary-info-nexus.fireside.fm/38</link>
      <guid isPermaLink="false">b585f3e6-1011-44f8-8d99-460776442565</guid>
      <pubDate>Fri, 13 Mar 2026 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/b585f3e6-1011-44f8-8d99-460776442565.mp3" length="72730389" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>Brazos, Joseph, Hunter, and Mario-all current or former SOC managers-take over to do a deep dive into the reality of managing a Security Operations Center. They expose the truth behind fake "reseller" SOCs that rely solely on automated ticket forwarding, while discussing the critical need for human-led incident response. The team also tackles the hype around AI in cybersecurity, the pros and cons of "jack of all trades" analysts versus hyper-specialists, and shares highly practical advice for anyone trying to land their first job in the cybersecurity industry.</itunes:subtitle>
      <itunes:duration>1:15:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! The inmates are running the asylum this week as Richard steps out, leaving Brazos, Joseph, Hunter, and Mario to take the wheel. With all four of the guys having acted as Security Operations Center (SOC) Managers at some point in their careers, the team leverages their shared history to pull back the curtain on what it <em>really</em> takes to run a true SOC.</p>

<p>The team kicks things off by calling out &quot;reseller&quot; SOCs that rely purely on automated ticket generation, detailing why immediate human action and response times are critical when the defecation meets the oscillation. We also tackle the elephant in the room: AI. Is it a silver bullet that will replace an analyst, or just an expensive tool running on limited context? </p>

<p>Later, the guys debate the merits of hiring generalist analysts versus specialized experts, sharing how correlating data across multiple platforms creates true defense-in-depth. Finally, we offer invaluable, realistic advice for anyone trying to break into the cybersecurity field, and close out by revealing the absolute hardest parts of being a manager.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Fake SOC Epidemic: What defines a &quot;Real&quot; SOC vs. a reseller rebundling alerts.</li>
<li>Why AI won&#39;t replace human analysts (and why its lack of context leaves you vulnerable).</li>
<li>The &quot;Jack of All Trades&quot; vs. Specialist Analyst debate: Which is better?</li>
<li>Breaking into the Industry: Why a home lab, networking, and a degree are still critical.</li>
<li>Why soft skills and report writing are the most underrated skills in IT.</li>
<li>The absolute hardest parts of managing a SOC, from fighting complacency to avoiding alert fatigue.</li>
</ul>

<p>Want to know what it really takes to secure a network? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InformationSecurity #TechPodcast #InfoSec #CareerAdvice #Homelab</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! The inmates are running the asylum this week as Richard steps out, leaving Brazos, Joseph, Hunter, and Mario to take the wheel. With all four of the guys having acted as Security Operations Center (SOC) Managers at some point in their careers, the team leverages their shared history to pull back the curtain on what it <em>really</em> takes to run a true SOC.</p>

<p>The team kicks things off by calling out &quot;reseller&quot; SOCs that rely purely on automated ticket generation, detailing why immediate human action and response times are critical when the defecation meets the oscillation. We also tackle the elephant in the room: AI. Is it a silver bullet that will replace an analyst, or just an expensive tool running on limited context? </p>

<p>Later, the guys debate the merits of hiring generalist analysts versus specialized experts, sharing how correlating data across multiple platforms creates true defense-in-depth. Finally, we offer invaluable, realistic advice for anyone trying to break into the cybersecurity field, and close out by revealing the absolute hardest parts of being a manager.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Fake SOC Epidemic: What defines a &quot;Real&quot; SOC vs. a reseller rebundling alerts.</li>
<li>Why AI won&#39;t replace human analysts (and why its lack of context leaves you vulnerable).</li>
<li>The &quot;Jack of All Trades&quot; vs. Specialist Analyst debate: Which is better?</li>
<li>Breaking into the Industry: Why a home lab, networking, and a degree are still critical.</li>
<li>Why soft skills and report writing are the most underrated skills in IT.</li>
<li>The absolute hardest parts of managing a SOC, from fighting complacency to avoiding alert fatigue.</li>
</ul>

<p>Want to know what it really takes to secure a network? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InformationSecurity #TechPodcast #InfoSec #CareerAdvice #Homelab</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! The inmates are running the asylum this week as Richard steps out, leaving Brazos, Joseph, Hunter, and Mario to take the wheel. With all four of the guys having acted as Security Operations Center (SOC) Managers at some point in their careers, the team leverages their shared history to pull back the curtain on what it <em>really</em> takes to run a true SOC.</p>

<p>The team kicks things off by calling out &quot;reseller&quot; SOCs that rely purely on automated ticket generation, detailing why immediate human action and response times are critical when the defecation meets the oscillation. We also tackle the elephant in the room: AI. Is it a silver bullet that will replace an analyst, or just an expensive tool running on limited context? </p>

<p>Later, the guys debate the merits of hiring generalist analysts versus specialized experts, sharing how correlating data across multiple platforms creates true defense-in-depth. Finally, we offer invaluable, realistic advice for anyone trying to break into the cybersecurity field, and close out by revealing the absolute hardest parts of being a manager.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Fake SOC Epidemic: What defines a &quot;Real&quot; SOC vs. a reseller rebundling alerts.</li>
<li>Why AI won&#39;t replace human analysts (and why its lack of context leaves you vulnerable).</li>
<li>The &quot;Jack of All Trades&quot; vs. Specialist Analyst debate: Which is better?</li>
<li>Breaking into the Industry: Why a home lab, networking, and a degree are still critical.</li>
<li>Why soft skills and report writing are the most underrated skills in IT.</li>
<li>The absolute hardest parts of managing a SOC, from fighting complacency to avoiding alert fatigue.</li>
</ul>

<p>Want to know what it really takes to secure a network? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #InformationSecurity #TechPodcast #InfoSec #CareerAdvice #Homelab</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+uyQfp2iR</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+uyQfp2iR" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 37: Are Tech Vendors Gaming E-Rate?</title>
      <link>https://scinary-info-nexus.fireside.fm/37</link>
      <guid isPermaLink="false">cd4494d7-1521-4edf-8854-607bb7c77f64</guid>
      <pubDate>Fri, 06 Mar 2026 07:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/cd4494d7-1521-4edf-8854-607bb7c77f64.mp3" length="67322295" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team is joined by E-Rate expert Ginnie Harwood from Bespoke Consulting to demystify how schools and libraries actually get the money to fund their network and cybersecurity infrastructure. They dive into the history of the FCC's E-Rate program, the red tape of Universal Service Administrative Company (USAC) compliance, and expose the shady ways vendors try to game the RFP and competitive bidding systems. They also tackle the rollout of the FCC's new $200M Cybersecurity Pilot Program, questioning why massive, well-funded districts are getting a slice of a pie originally intended to help rural, under-resourced schools.</itunes:subtitle>
      <itunes:duration>1:08:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! Richard, Joseph, and Brazos are back in the studio (with Richard’s mic volume officially audited and validated) to tackle a massive topic for the K-12 sector: E-Rate funding. </p>

<p>This week, we are joined by special guest Ginnie Harwood, founder of Bespoke Consulting and a veteran of the EdTech and E-Rate space. Ginnie walks us through the 30-year evolution of the FCC’s E-Rate program, jumping from 1996 phone lines to modern-day cloud networks. We pull back the curtain on the competitive bidding process, discussing how some vendors &quot;game the system&quot; by writing hyper-specific RFPs to lock out the competition, and the headache of cost-allocating firewall hardware from its cybersecurity licensing. </p>

<p>The crew naturally pivots to the FCC&#39;s new $200M Cybersecurity Pilot Program. Is it actually helping the small, rural schools that need it the most, or are massive 150,000-student districts swooping in to claim the cash? </p>

<p>In this episode, we discuss:</p>

<ul>
<li>Ginnie’s journey from selling fiber optics to building massive E-Rate consulting departments.</li>
<li>The mechanics of E-Rate, USAC, and the Universal Service Fund tax.</li>
<li>The &quot;Rigged RFP&quot;: How vendors legally edge out competition during the bidding process.</li>
<li>The nightmare of hardware vs. licensing: Why firewalls are funded, but UTM isn&#39;t.</li>
<li>The FCC $200M Cybersecurity Pilot Program: The good, the bad, and the controversies.</li>
<li>ECF, COVID-19 connectivity, and pallets of fully-funded Chromebooks. </li>
<li>Why E-Rate compliance isn&#39;t just about cost - it&#39;s about knowing the gray areas.</li>
</ul>

<p>Are the federal funds actually leveling the playing field for education? Let&#39;s discuss. </p>

<hr>

<p>Connect with Ginnie Harwood &amp; Bespoke Consulting:<br>
<a href="https://www.bespokeconsulting.net" rel="nofollow">https://www.bespokeconsulting.net</a> </p>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #edtech  #fcc  #informationsecurity  #infosec</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! Richard, Joseph, and Brazos are back in the studio (with Richard’s mic volume officially audited and validated) to tackle a massive topic for the K-12 sector: E-Rate funding. </p>

<p>This week, we are joined by special guest Ginnie Harwood, founder of Bespoke Consulting and a veteran of the EdTech and E-Rate space. Ginnie walks us through the 30-year evolution of the FCC’s E-Rate program, jumping from 1996 phone lines to modern-day cloud networks. We pull back the curtain on the competitive bidding process, discussing how some vendors &quot;game the system&quot; by writing hyper-specific RFPs to lock out the competition, and the headache of cost-allocating firewall hardware from its cybersecurity licensing. </p>

<p>The crew naturally pivots to the FCC&#39;s new $200M Cybersecurity Pilot Program. Is it actually helping the small, rural schools that need it the most, or are massive 150,000-student districts swooping in to claim the cash? </p>

<p>In this episode, we discuss:</p>

<ul>
<li>Ginnie’s journey from selling fiber optics to building massive E-Rate consulting departments.</li>
<li>The mechanics of E-Rate, USAC, and the Universal Service Fund tax.</li>
<li>The &quot;Rigged RFP&quot;: How vendors legally edge out competition during the bidding process.</li>
<li>The nightmare of hardware vs. licensing: Why firewalls are funded, but UTM isn&#39;t.</li>
<li>The FCC $200M Cybersecurity Pilot Program: The good, the bad, and the controversies.</li>
<li>ECF, COVID-19 connectivity, and pallets of fully-funded Chromebooks. </li>
<li>Why E-Rate compliance isn&#39;t just about cost - it&#39;s about knowing the gray areas.</li>
</ul>

<p>Are the federal funds actually leveling the playing field for education? Let&#39;s discuss. </p>

<hr>

<p>Connect with Ginnie Harwood &amp; Bespoke Consulting:<br>
<a href="https://www.bespokeconsulting.net" rel="nofollow">https://www.bespokeconsulting.net</a> </p>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #edtech  #fcc  #informationsecurity  #infosec</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! Richard, Joseph, and Brazos are back in the studio (with Richard’s mic volume officially audited and validated) to tackle a massive topic for the K-12 sector: E-Rate funding. </p>

<p>This week, we are joined by special guest Ginnie Harwood, founder of Bespoke Consulting and a veteran of the EdTech and E-Rate space. Ginnie walks us through the 30-year evolution of the FCC’s E-Rate program, jumping from 1996 phone lines to modern-day cloud networks. We pull back the curtain on the competitive bidding process, discussing how some vendors &quot;game the system&quot; by writing hyper-specific RFPs to lock out the competition, and the headache of cost-allocating firewall hardware from its cybersecurity licensing. </p>

<p>The crew naturally pivots to the FCC&#39;s new $200M Cybersecurity Pilot Program. Is it actually helping the small, rural schools that need it the most, or are massive 150,000-student districts swooping in to claim the cash? </p>

<p>In this episode, we discuss:</p>

<ul>
<li>Ginnie’s journey from selling fiber optics to building massive E-Rate consulting departments.</li>
<li>The mechanics of E-Rate, USAC, and the Universal Service Fund tax.</li>
<li>The &quot;Rigged RFP&quot;: How vendors legally edge out competition during the bidding process.</li>
<li>The nightmare of hardware vs. licensing: Why firewalls are funded, but UTM isn&#39;t.</li>
<li>The FCC $200M Cybersecurity Pilot Program: The good, the bad, and the controversies.</li>
<li>ECF, COVID-19 connectivity, and pallets of fully-funded Chromebooks. </li>
<li>Why E-Rate compliance isn&#39;t just about cost - it&#39;s about knowing the gray areas.</li>
</ul>

<p>Are the federal funds actually leveling the playing field for education? Let&#39;s discuss. </p>

<hr>

<p>Connect with Ginnie Harwood &amp; Bespoke Consulting:<br>
<a href="https://www.bespokeconsulting.net" rel="nofollow">https://www.bespokeconsulting.net</a> </p>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #edtech  #fcc  #informationsecurity  #infosec</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+nKTi_yLS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+nKTi_yLS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 36: Alert Fatigue &amp; How Private Equity is Ruining Cybersecurity Tools</title>
      <link>https://scinary-info-nexus.fireside.fm/36</link>
      <guid isPermaLink="false">cbb59e5b-bceb-402f-a410-95904c9f44bc</guid>
      <pubDate>Fri, 27 Feb 2026 07:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/cbb59e5b-bceb-402f-a410-95904c9f44bc.mp3" length="60042233" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, Richard, Joseph, Hunter, and Mario tackle the double-edged sword of "Alert Fatigue," discussing how bombarding IT directors with alerts can lead to them tuning out actual threats (the "Target hack" scenario). They pull back the curtain on how the Scinary SOC operates differently, focusing on transparency and building customized network profiles to reduce noise. The conversation later pivots to the "enshittification" of cybersecurity tools by private equity firms. The guys call out Tenable (Nessus) for quietly locking basic features behind massive paywalls and discuss how Ivanti's private equity takeover crippled their engineering team, leading to critical, unpatched VPN vulnerabilities.</itunes:subtitle>
      <itunes:duration>1:01:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After last week&#39;s lost episode (thanks to some corrupted files), Richard, Joseph, Mario, and Hunter are back in the studio-while Brazos is off spreading the good word in Tennessee.</p>

<p>This week, the team tackles &quot;Alert Fatigue.&quot; If your Security Operations Center (SOC) is blasting you with a thousand alerts a day, are you actually secure, or are you just being conditioned to ignore the warning sirens? We dive into the philosophy behind how Scinary built its SOC, the difference between &quot;Alert Fatigue&quot; and &quot;Data Fatigue,&quot; and why picking up the phone to talk to your IT director is sometimes the best cybersecurity tool you can have.</p>

<p>Then, the guys drop the hammer on private equity firms and the &quot;enshittification&quot; of corporate tech. From Tenable (Nessus) quietly hiding web application plugins behind an exorbitant paywall, to Ivanti gutting their engineering teams right before suffering catastrophic VPN vulnerabilities, the truth about corporate cybersecurity might make your blood boil. </p>

<p>Plus, stick around for the end as the guys recount a hilarious team outing in Waco involving terrible hotdogs, a brutally fast chess match, and a trip to Benny&#39;s Hog Shed. </p>

<p>In this episode, we discuss:</p>

<ul>
<li>Alert Fatigue vs. Data Fatigue: What&#39;s the difference?</li>
<li>Why Scinary refuses to be a &quot;black box&quot; SOC.</li>
<li>The nightmare scenario of a student configuring &quot;Shadow IT&quot; environments.</li>
<li>Enshittification: How private equity is ruining security tools.</li>
<li>Tenable&#39;s secret paywalls and our search for OpenVAS alternatives.</li>
<li>Why CISA ordered federal agencies to rip out Ivanti VPNs.</li>
<li>Team building in Waco: Wienerschnitzel regrets and chess dismantling.</li>
</ul>

<p>Are you worn out by your security alerts? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>AlertFatigue #Cybersecurity #InfoSec #Tenable #Nessus #Ivanti #PrivateEquity #SOC #CybersecurityPodcast #ThreatHunting</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After last week&#39;s lost episode (thanks to some corrupted files), Richard, Joseph, Mario, and Hunter are back in the studio-while Brazos is off spreading the good word in Tennessee.</p>

<p>This week, the team tackles &quot;Alert Fatigue.&quot; If your Security Operations Center (SOC) is blasting you with a thousand alerts a day, are you actually secure, or are you just being conditioned to ignore the warning sirens? We dive into the philosophy behind how Scinary built its SOC, the difference between &quot;Alert Fatigue&quot; and &quot;Data Fatigue,&quot; and why picking up the phone to talk to your IT director is sometimes the best cybersecurity tool you can have.</p>

<p>Then, the guys drop the hammer on private equity firms and the &quot;enshittification&quot; of corporate tech. From Tenable (Nessus) quietly hiding web application plugins behind an exorbitant paywall, to Ivanti gutting their engineering teams right before suffering catastrophic VPN vulnerabilities, the truth about corporate cybersecurity might make your blood boil. </p>

<p>Plus, stick around for the end as the guys recount a hilarious team outing in Waco involving terrible hotdogs, a brutally fast chess match, and a trip to Benny&#39;s Hog Shed. </p>

<p>In this episode, we discuss:</p>

<ul>
<li>Alert Fatigue vs. Data Fatigue: What&#39;s the difference?</li>
<li>Why Scinary refuses to be a &quot;black box&quot; SOC.</li>
<li>The nightmare scenario of a student configuring &quot;Shadow IT&quot; environments.</li>
<li>Enshittification: How private equity is ruining security tools.</li>
<li>Tenable&#39;s secret paywalls and our search for OpenVAS alternatives.</li>
<li>Why CISA ordered federal agencies to rip out Ivanti VPNs.</li>
<li>Team building in Waco: Wienerschnitzel regrets and chess dismantling.</li>
</ul>

<p>Are you worn out by your security alerts? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>AlertFatigue #Cybersecurity #InfoSec #Tenable #Nessus #Ivanti #PrivateEquity #SOC #CybersecurityPodcast #ThreatHunting</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After last week&#39;s lost episode (thanks to some corrupted files), Richard, Joseph, Mario, and Hunter are back in the studio-while Brazos is off spreading the good word in Tennessee.</p>

<p>This week, the team tackles &quot;Alert Fatigue.&quot; If your Security Operations Center (SOC) is blasting you with a thousand alerts a day, are you actually secure, or are you just being conditioned to ignore the warning sirens? We dive into the philosophy behind how Scinary built its SOC, the difference between &quot;Alert Fatigue&quot; and &quot;Data Fatigue,&quot; and why picking up the phone to talk to your IT director is sometimes the best cybersecurity tool you can have.</p>

<p>Then, the guys drop the hammer on private equity firms and the &quot;enshittification&quot; of corporate tech. From Tenable (Nessus) quietly hiding web application plugins behind an exorbitant paywall, to Ivanti gutting their engineering teams right before suffering catastrophic VPN vulnerabilities, the truth about corporate cybersecurity might make your blood boil. </p>

<p>Plus, stick around for the end as the guys recount a hilarious team outing in Waco involving terrible hotdogs, a brutally fast chess match, and a trip to Benny&#39;s Hog Shed. </p>

<p>In this episode, we discuss:</p>

<ul>
<li>Alert Fatigue vs. Data Fatigue: What&#39;s the difference?</li>
<li>Why Scinary refuses to be a &quot;black box&quot; SOC.</li>
<li>The nightmare scenario of a student configuring &quot;Shadow IT&quot; environments.</li>
<li>Enshittification: How private equity is ruining security tools.</li>
<li>Tenable&#39;s secret paywalls and our search for OpenVAS alternatives.</li>
<li>Why CISA ordered federal agencies to rip out Ivanti VPNs.</li>
<li>Team building in Waco: Wienerschnitzel regrets and chess dismantling.</li>
</ul>

<p>Are you worn out by your security alerts? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>AlertFatigue #Cybersecurity #InfoSec #Tenable #Nessus #Ivanti #PrivateEquity #SOC #CybersecurityPodcast #ThreatHunting</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+B97PYNc_</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+B97PYNc_" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 35: The Biggest IT Mistake We Found This Week</title>
      <link>https://scinary-info-nexus.fireside.fm/35</link>
      <guid isPermaLink="false">0f77b3e2-40e7-4437-85c5-5a572c6d3655</guid>
      <pubDate>Fri, 13 Feb 2026 09:30:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/0f77b3e2-40e7-4437-85c5-5a572c6d3655.mp3" length="175924800" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This episode is a tale of two halves. In the first segment, Richard, Mario, Brazos, and Joseph discuss Scinary's new partnership to bring cybersecurity education to rural Texas schools before pivoting to a "finance corner" analysis of the slowly deflating AI and tech stock bubble.

Suddenly, [THE CUT] happens.

We pick up the next day where Mario has mysteriously vanished, only to be replaced by Pierre Vivoni. Pierre drops the quote of the year regarding a Domain Controller "raw dogging the internet," launching a discussion on the unglamorous reality of SOC work vs. Hollywood hackers. The team closes with a heated debate on Flock cameras, mass surveillance, and the hypocrisy of banning foreign tech while domestic privacy erodes.</itunes:subtitle>
      <itunes:duration>1:13:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>We start off with Richard, Mario, Brazos, and Joseph covering some heartwarming news about the Central Texas Cyber Hub and some heart-wrenching news about the current state of the AI stock market bubble.</p>

<p>Then, things went off the rails. After a discussion that was slightly <em>too</em> controversial for the internet (involving decrypted redactions), we had to cut the feed.</p>

<p>Blocking out the &quot;glitch,&quot; we pick up on Day 2 where Mario has been replaced by Pierre Vivoni (&quot;It wasn&#39;t a government coverup, we swear&quot;). Pierre helps us break down one of the wildest misconfigurations we&#39;ve seen in a while: a Domain Controller &quot;rawdogging&quot; the internet. This leads to a deep dive into the realities of working in a SOC, why &quot;make it work&quot; culture creates security nightmares, and the dystopian rise of Flock cameras and mass surveillance.</p>

<p>In this chaotic episode, we discuss:</p>

<ul>
<li>Education: Bringing cybersecurity to rural schools in Marlin, TX.</li>
<li>Finance Corner: Why the AI bubble is deflating (and Richard&#39;s failed gold investments).</li>
<li>The Incident: Finding a Domain Controller with a public IP address (and Pierre&#39;s legendary quote).</li>
<li>SOC Reality: Why cybersecurity is 90% logs and 10% adrenaline (sorry, Hollywood).</li>
<li>Surveillance: The rise of Flock cameras, license plate readers, and the &quot;Cheetos bag gun&quot; detection failure.</li>
<li>Privacy Hypocrisy: Why are we banning TikTok but allowing private companies to build nationwide surveillance networks?</li>
</ul>

<p>Don&#39;t forget to like, subscribe, and let us know in the comments if you think Mario is actually in a government black site.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #infosec  #aibubble  #techstocks  #surveillance  #privacy  #networksecurity  #podcast</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We start off with Richard, Mario, Brazos, and Joseph covering some heartwarming news about the Central Texas Cyber Hub and some heart-wrenching news about the current state of the AI stock market bubble.</p>

<p>Then, things went off the rails. After a discussion that was slightly <em>too</em> controversial for the internet (involving decrypted redactions), we had to cut the feed.</p>

<p>Blocking out the &quot;glitch,&quot; we pick up on Day 2 where Mario has been replaced by Pierre Vivoni (&quot;It wasn&#39;t a government coverup, we swear&quot;). Pierre helps us break down one of the wildest misconfigurations we&#39;ve seen in a while: a Domain Controller &quot;rawdogging&quot; the internet. This leads to a deep dive into the realities of working in a SOC, why &quot;make it work&quot; culture creates security nightmares, and the dystopian rise of Flock cameras and mass surveillance.</p>

<p>In this chaotic episode, we discuss:</p>

<ul>
<li>Education: Bringing cybersecurity to rural schools in Marlin, TX.</li>
<li>Finance Corner: Why the AI bubble is deflating (and Richard&#39;s failed gold investments).</li>
<li>The Incident: Finding a Domain Controller with a public IP address (and Pierre&#39;s legendary quote).</li>
<li>SOC Reality: Why cybersecurity is 90% logs and 10% adrenaline (sorry, Hollywood).</li>
<li>Surveillance: The rise of Flock cameras, license plate readers, and the &quot;Cheetos bag gun&quot; detection failure.</li>
<li>Privacy Hypocrisy: Why are we banning TikTok but allowing private companies to build nationwide surveillance networks?</li>
</ul>

<p>Don&#39;t forget to like, subscribe, and let us know in the comments if you think Mario is actually in a government black site.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #infosec  #aibubble  #techstocks  #surveillance  #privacy  #networksecurity  #podcast</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>We start off with Richard, Mario, Brazos, and Joseph covering some heartwarming news about the Central Texas Cyber Hub and some heart-wrenching news about the current state of the AI stock market bubble.</p>

<p>Then, things went off the rails. After a discussion that was slightly <em>too</em> controversial for the internet (involving decrypted redactions), we had to cut the feed.</p>

<p>Blocking out the &quot;glitch,&quot; we pick up on Day 2 where Mario has been replaced by Pierre Vivoni (&quot;It wasn&#39;t a government coverup, we swear&quot;). Pierre helps us break down one of the wildest misconfigurations we&#39;ve seen in a while: a Domain Controller &quot;rawdogging&quot; the internet. This leads to a deep dive into the realities of working in a SOC, why &quot;make it work&quot; culture creates security nightmares, and the dystopian rise of Flock cameras and mass surveillance.</p>

<p>In this chaotic episode, we discuss:</p>

<ul>
<li>Education: Bringing cybersecurity to rural schools in Marlin, TX.</li>
<li>Finance Corner: Why the AI bubble is deflating (and Richard&#39;s failed gold investments).</li>
<li>The Incident: Finding a Domain Controller with a public IP address (and Pierre&#39;s legendary quote).</li>
<li>SOC Reality: Why cybersecurity is 90% logs and 10% adrenaline (sorry, Hollywood).</li>
<li>Surveillance: The rise of Flock cameras, license plate readers, and the &quot;Cheetos bag gun&quot; detection failure.</li>
<li>Privacy Hypocrisy: Why are we banning TikTok but allowing private companies to build nationwide surveillance networks?</li>
</ul>

<p>Don&#39;t forget to like, subscribe, and let us know in the comments if you think Mario is actually in a government black site.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #infosec  #aibubble  #techstocks  #surveillance  #privacy  #networksecurity  #podcast</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+vZzNaSpa</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+vZzNaSpa" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 34: Texas Bans Chinese Tech &amp; The Reality of Cybersecurity Burnout</title>
      <link>https://scinary-info-nexus.fireside.fm/34</link>
      <guid isPermaLink="false">592a422d-aa99-4260-8325-6f8c8b7af329</guid>
      <pubDate>Fri, 06 Feb 2026 07:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/592a422d-aa99-4260-8325-6f8c8b7af329.mp3" length="71170970" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The Scinary team kicks things off with a look at the latest Executive Order from Texas Governor Greg Abbott, which bans specific Chinese technologies-including TP-Link, Temu, and Shein-from state agencies. The guys debate whether these bans actually protect privacy or if they are merely performative politics. Then, the conversation shifts to a serious and personal topic: Burnout in the IT and Cybersecurity industry. Richard, Mario, Brazos, and Joseph share vulnerable war stories-from the "Air Conditioner Incident of 2018" to physically getting sick before a shift-and discuss how to recognize the symptoms of "Hot Brain" before it destroys your career.</itunes:subtitle>
      <itunes:duration>1:12:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! It&#39;s a breakfast stout kind of morning as Richard, Brazos, Mario, and Joseph sit down to tackle the latest news coming out of the Texas Governor&#39;s office and a heavy topic that plagues our industry.</p>

<p>First up, we discuss the expanded list of prohibited technologies for Texas state agencies. From TP-Link routers to shopping apps like Temu and Shein, the state is cracking down on Chinese-affiliated tech. But is this actually securing our data, or is it just &quot;privacy theater&quot; while data brokers still sell our info to the highest bidder?</p>

<p>Then, we get real about Burnout. The team shares personal, unfiltered stories about the toll this industry takes-including the infamous &quot;Air Conditioner Incident,&quot; the feeling of &quot;Hot Brain,&quot; and why so many IT professionals fantasize about quitting to become restaurant managers. We discuss the difference between &quot;Burnout of Love&quot; (obsession) vs. emotional exhaustion, and how to survive through rest, delegation, and disconnecting.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Texas Executive Order: Banning TP-Link, Temu, and Chinese AI.</li>
<li>Why banning TikTok doesn&#39;t necessarily solve the data privacy problem.</li>
<li>The financial burden of &quot;Rip and Replace&quot; for underfunded schools and local governments.</li>
<li>Defining Burnout: When you&#39;d rather end up in the hospital than go to work.</li>
<li>The &quot;Air Conditioner Incident&quot;: A lesson in leadership and stress.</li>
<li>&quot;Hot Brain&quot; and Data Fatigue during internal assessments.</li>
<li>How to survive: The importance of hobbies that have nothing to do with screens.</li>
<li>Why Richard believes what we do truly matters.</li>
</ul>

<p>Are you feeling the IT burnout? Let us know in the comments how you cope.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #burnout  #mentalhealth #privacy  #infosec  #podcast</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! It&#39;s a breakfast stout kind of morning as Richard, Brazos, Mario, and Joseph sit down to tackle the latest news coming out of the Texas Governor&#39;s office and a heavy topic that plagues our industry.</p>

<p>First up, we discuss the expanded list of prohibited technologies for Texas state agencies. From TP-Link routers to shopping apps like Temu and Shein, the state is cracking down on Chinese-affiliated tech. But is this actually securing our data, or is it just &quot;privacy theater&quot; while data brokers still sell our info to the highest bidder?</p>

<p>Then, we get real about Burnout. The team shares personal, unfiltered stories about the toll this industry takes-including the infamous &quot;Air Conditioner Incident,&quot; the feeling of &quot;Hot Brain,&quot; and why so many IT professionals fantasize about quitting to become restaurant managers. We discuss the difference between &quot;Burnout of Love&quot; (obsession) vs. emotional exhaustion, and how to survive through rest, delegation, and disconnecting.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Texas Executive Order: Banning TP-Link, Temu, and Chinese AI.</li>
<li>Why banning TikTok doesn&#39;t necessarily solve the data privacy problem.</li>
<li>The financial burden of &quot;Rip and Replace&quot; for underfunded schools and local governments.</li>
<li>Defining Burnout: When you&#39;d rather end up in the hospital than go to work.</li>
<li>The &quot;Air Conditioner Incident&quot;: A lesson in leadership and stress.</li>
<li>&quot;Hot Brain&quot; and Data Fatigue during internal assessments.</li>
<li>How to survive: The importance of hobbies that have nothing to do with screens.</li>
<li>Why Richard believes what we do truly matters.</li>
</ul>

<p>Are you feeling the IT burnout? Let us know in the comments how you cope.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #burnout  #mentalhealth #privacy  #infosec  #podcast</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! It&#39;s a breakfast stout kind of morning as Richard, Brazos, Mario, and Joseph sit down to tackle the latest news coming out of the Texas Governor&#39;s office and a heavy topic that plagues our industry.</p>

<p>First up, we discuss the expanded list of prohibited technologies for Texas state agencies. From TP-Link routers to shopping apps like Temu and Shein, the state is cracking down on Chinese-affiliated tech. But is this actually securing our data, or is it just &quot;privacy theater&quot; while data brokers still sell our info to the highest bidder?</p>

<p>Then, we get real about Burnout. The team shares personal, unfiltered stories about the toll this industry takes-including the infamous &quot;Air Conditioner Incident,&quot; the feeling of &quot;Hot Brain,&quot; and why so many IT professionals fantasize about quitting to become restaurant managers. We discuss the difference between &quot;Burnout of Love&quot; (obsession) vs. emotional exhaustion, and how to survive through rest, delegation, and disconnecting.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Texas Executive Order: Banning TP-Link, Temu, and Chinese AI.</li>
<li>Why banning TikTok doesn&#39;t necessarily solve the data privacy problem.</li>
<li>The financial burden of &quot;Rip and Replace&quot; for underfunded schools and local governments.</li>
<li>Defining Burnout: When you&#39;d rather end up in the hospital than go to work.</li>
<li>The &quot;Air Conditioner Incident&quot;: A lesson in leadership and stress.</li>
<li>&quot;Hot Brain&quot; and Data Fatigue during internal assessments.</li>
<li>How to survive: The importance of hobbies that have nothing to do with screens.</li>
<li>Why Richard believes what we do truly matters.</li>
</ul>

<p>Are you feeling the IT burnout? Let us know in the comments how you cope.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity  #burnout  #mentalhealth #privacy  #infosec  #podcast</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+1DMTw6WP</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+1DMTw6WP" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 33: Turn a Failed Cybersecurity Audit into a Budget Increase</title>
      <link>https://scinary-info-nexus.fireside.fm/33</link>
      <guid isPermaLink="false">c8516838-0f00-4175-af91-cc177a083854</guid>
      <pubDate>Fri, 30 Jan 2026 07:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c8516838-0f00-4175-af91-cc177a083854.mp3" length="53598103" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The ice storm is coming (or maybe it's already here?), and the team is bunkering down with some questionable beer choices to tackle a topic that gives every IT Director nightmares: Cybersecurity Frameworks.</itunes:subtitle>
      <itunes:duration>54:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>This week, Richard, Brazos, Mario, and Joe tear apart the red tape of NIST 800-53, CIS Controls, and state-mandated audits. We discuss the disconnect between legislators in the capital and the reality of a one-person IT department in a small school district. </p>

<p>We also address the &quot;Tech Support Brain&quot; vs. &quot;Auditor Brain&quot; phenomenon and answer the burning question: Should you fudge your numbers to avoid looking bad on a state report? (Spoiler: No, and here is why). Plus, we reveal the &quot;Malicious Compliance&quot; strategy - how to use a low compliance score to force your board to finally sign that check for the tools you need.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The absurdity of &quot;one-size-fits-all&quot; government mandates.</li>
<li>Why NIST and CIS controls often fail small organizations.</li>
<li>The temptation to lie on self-assessments (and why you shouldn&#39;t).</li>
<li>&quot;Auditor Brain&quot;: Dealing with compliance officers who don&#39;t understand tech.</li>
<li>Strategic Failure: How to use a bad score to get more budget.</li>
<li>The Scinary &quot;10 Commandments&quot; of controls.</li>
<li>Also... do golden toilets actually have better Wi-Fi?</li>
</ul>

<p>If you are drowning in paperwork and compliance checklists, this episode is for you.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week, Richard, Brazos, Mario, and Joe tear apart the red tape of NIST 800-53, CIS Controls, and state-mandated audits. We discuss the disconnect between legislators in the capital and the reality of a one-person IT department in a small school district. </p>

<p>We also address the &quot;Tech Support Brain&quot; vs. &quot;Auditor Brain&quot; phenomenon and answer the burning question: Should you fudge your numbers to avoid looking bad on a state report? (Spoiler: No, and here is why). Plus, we reveal the &quot;Malicious Compliance&quot; strategy - how to use a low compliance score to force your board to finally sign that check for the tools you need.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The absurdity of &quot;one-size-fits-all&quot; government mandates.</li>
<li>Why NIST and CIS controls often fail small organizations.</li>
<li>The temptation to lie on self-assessments (and why you shouldn&#39;t).</li>
<li>&quot;Auditor Brain&quot;: Dealing with compliance officers who don&#39;t understand tech.</li>
<li>Strategic Failure: How to use a bad score to get more budget.</li>
<li>The Scinary &quot;10 Commandments&quot; of controls.</li>
<li>Also... do golden toilets actually have better Wi-Fi?</li>
</ul>

<p>If you are drowning in paperwork and compliance checklists, this episode is for you.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>This week, Richard, Brazos, Mario, and Joe tear apart the red tape of NIST 800-53, CIS Controls, and state-mandated audits. We discuss the disconnect between legislators in the capital and the reality of a one-person IT department in a small school district. </p>

<p>We also address the &quot;Tech Support Brain&quot; vs. &quot;Auditor Brain&quot; phenomenon and answer the burning question: Should you fudge your numbers to avoid looking bad on a state report? (Spoiler: No, and here is why). Plus, we reveal the &quot;Malicious Compliance&quot; strategy - how to use a low compliance score to force your board to finally sign that check for the tools you need.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The absurdity of &quot;one-size-fits-all&quot; government mandates.</li>
<li>Why NIST and CIS controls often fail small organizations.</li>
<li>The temptation to lie on self-assessments (and why you shouldn&#39;t).</li>
<li>&quot;Auditor Brain&quot;: Dealing with compliance officers who don&#39;t understand tech.</li>
<li>Strategic Failure: How to use a bad score to get more budget.</li>
<li>The Scinary &quot;10 Commandments&quot; of controls.</li>
<li>Also... do golden toilets actually have better Wi-Fi?</li>
</ul>

<p>If you are drowning in paperwork and compliance checklists, this episode is for you.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+usUkY79e</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+usUkY79e" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 32: Untitled Episode</title>
      <link>https://scinary-info-nexus.fireside.fm/32</link>
      <guid isPermaLink="false">809ce622-b185-43f0-95b5-6a5799feb40b</guid>
      <pubDate>Sat, 24 Jan 2026 08:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/809ce622-b185-43f0-95b5-6a5799feb40b.mp3" length="57622709" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, Richard, Mario, Joseph, and Brazos crack open the "ET STAY HOME" Imperial Gose and tackle a massive issue happening right in our backyards: the explosion of AI Data Centers.</itunes:subtitle>
      <itunes:duration>59:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>From Amazon to Apple, Big Tech is pouring trillions into infrastructure, but who is actually paying the price? The team breaks down how these massive facilities are straining limits on the Texas power grid and consuming alarming amounts of local water - all while residential energy costs skyrocket by 73%. We also discuss why PC gamers and tech enthusiasts are about to suffer as GPU and RAM prices surge due to AI demand.</p>

<p>Then, Brazos and Joseph put their investigator hats on. They perform a deep-dive OSINT (Open Source Intelligence) look into &quot;Infrakey&quot; - a company buying up land in Lacy Lakeview, Texas. They uncover a web of shell companies, law firms, and questionable filings that suggest there&#39;s more to these land deals than meets the eye.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;ET STAY HOME&quot; Review: Is it beer or juice?</li>
<li>The Trillion Dollar Bet: Why Big Tech is panicked about AI infrastructure.</li>
<li>The Utility Crisis: How data centers drain local water aquifers and spike electric bills.</li>
<li>Hardware Inflation: Why 32GB of RAM costs 5x what it did last year.</li>
<li>Local Corruption?: The controversy of the Lacy Lakeview city council vote.</li>
<li>Investigation: Who is behind &quot;Infrakey&quot; and where is the money coming from?</li>
<li>The &quot;Lawnmower in the Living Room&quot;: Noise pollution and imminent domain fears.</li>
</ul>

<p>Are data centers a boom for the economy or a drain on the community? Let us know your thoughts in the comments.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From Amazon to Apple, Big Tech is pouring trillions into infrastructure, but who is actually paying the price? The team breaks down how these massive facilities are straining limits on the Texas power grid and consuming alarming amounts of local water - all while residential energy costs skyrocket by 73%. We also discuss why PC gamers and tech enthusiasts are about to suffer as GPU and RAM prices surge due to AI demand.</p>

<p>Then, Brazos and Joseph put their investigator hats on. They perform a deep-dive OSINT (Open Source Intelligence) look into &quot;Infrakey&quot; - a company buying up land in Lacy Lakeview, Texas. They uncover a web of shell companies, law firms, and questionable filings that suggest there&#39;s more to these land deals than meets the eye.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;ET STAY HOME&quot; Review: Is it beer or juice?</li>
<li>The Trillion Dollar Bet: Why Big Tech is panicked about AI infrastructure.</li>
<li>The Utility Crisis: How data centers drain local water aquifers and spike electric bills.</li>
<li>Hardware Inflation: Why 32GB of RAM costs 5x what it did last year.</li>
<li>Local Corruption?: The controversy of the Lacy Lakeview city council vote.</li>
<li>Investigation: Who is behind &quot;Infrakey&quot; and where is the money coming from?</li>
<li>The &quot;Lawnmower in the Living Room&quot;: Noise pollution and imminent domain fears.</li>
</ul>

<p>Are data centers a boom for the economy or a drain on the community? Let us know your thoughts in the comments.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>From Amazon to Apple, Big Tech is pouring trillions into infrastructure, but who is actually paying the price? The team breaks down how these massive facilities are straining limits on the Texas power grid and consuming alarming amounts of local water - all while residential energy costs skyrocket by 73%. We also discuss why PC gamers and tech enthusiasts are about to suffer as GPU and RAM prices surge due to AI demand.</p>

<p>Then, Brazos and Joseph put their investigator hats on. They perform a deep-dive OSINT (Open Source Intelligence) look into &quot;Infrakey&quot; - a company buying up land in Lacy Lakeview, Texas. They uncover a web of shell companies, law firms, and questionable filings that suggest there&#39;s more to these land deals than meets the eye.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;ET STAY HOME&quot; Review: Is it beer or juice?</li>
<li>The Trillion Dollar Bet: Why Big Tech is panicked about AI infrastructure.</li>
<li>The Utility Crisis: How data centers drain local water aquifers and spike electric bills.</li>
<li>Hardware Inflation: Why 32GB of RAM costs 5x what it did last year.</li>
<li>Local Corruption?: The controversy of the Lacy Lakeview city council vote.</li>
<li>Investigation: Who is behind &quot;Infrakey&quot; and where is the money coming from?</li>
<li>The &quot;Lawnmower in the Living Room&quot;: Noise pollution and imminent domain fears.</li>
</ul>

<p>Are data centers a boom for the economy or a drain on the community? Let us know your thoughts in the comments.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+LC7ZKreY</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+LC7ZKreY" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 31: 2026 Predictions: AI Bubble Burst, Infrastructure Attacks &amp; The End of Insurance</title>
      <link>https://scinary-info-nexus.fireside.fm/31</link>
      <guid isPermaLink="false">0bc142d1-7c14-4d7d-9e06-b0fd0db5fcab</guid>
      <pubDate>Fri, 16 Jan 2026 07:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/0bc142d1-7c14-4d7d-9e06-b0fd0db5fcab.mp3" length="91564103" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The Scinary team kicks off 2026 (nursing a slight hangover from the management dinner) with a round-table on cybersecurity predictions for the new year. They debate the likelihood of a massive "Log4j-style" AI vulnerability, the potential collapse of the cybersecurity insurance market, and whether the AI investment bubble is about to pop like the Dot-com crash. They also discuss the terrifying possibility of a major attack on US critical infrastructure, specifically water treatment plants.</itunes:subtitle>
      <itunes:duration>1:02:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Happy New Year! We made it to 2026 (barely). </p>

<p>The Scinary team invites you to the first episode of the year. After recovering from the annual management dinner, Richard, Brazos, Joseph, and Mario crack open some Czech beers and the &quot;Quadfather&quot; to lay out their boldest predictions for the cybersecurity landscape in 2026.</p>

<p>We move past the hype to discuss what keeps us up at night: From the inevitable &quot;Log4j&quot; moment for Artificial Intelligence to the crumbling state of cybersecurity insurance. Is the industry about to stop writing policies altogether?</p>

<p>We also dive into the economics of tech. Brazos breaks down why the AI market looks suspiciously like the Dot-com bubble (with some Enron vibes thrown in) and why it might finally burst this year.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;AI Log4j&quot; Prediction: Will a prompt injection attack backdoor everything?</li>
<li>Why Microsoft is forcing Copilot on you whether you want it or not.</li>
<li>The End of Insurance: Why carriers might stop writing cyber policies in 2026.</li>
<li>Ransomware Theory: Did insurance companies actually cause the spike in ransom demands?</li>
<li>Critical Infrastructure: Why Richard predicts a major water plant or grid attack this year.</li>
<li>&quot;Pig Butchering&quot; Scams: It’s not what you think it is.</li>
<li>The AI Economic Bubble: Round-tripping revenue, Nvidia, and the looming market correction.</li>
<li>Privacy in 2026: Why smart TVs and appliances are making privacy a thing of the past.</li>
</ul>

<p>Are our predictions too cynical, or are we right on the money? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #2026Predictions #AIBubble #TechNews #Infosec #Ransomware #CyberInsurance #Nvidia #ScinaryNexus #Podcast</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Happy New Year! We made it to 2026 (barely). </p>

<p>The Scinary team invites you to the first episode of the year. After recovering from the annual management dinner, Richard, Brazos, Joseph, and Mario crack open some Czech beers and the &quot;Quadfather&quot; to lay out their boldest predictions for the cybersecurity landscape in 2026.</p>

<p>We move past the hype to discuss what keeps us up at night: From the inevitable &quot;Log4j&quot; moment for Artificial Intelligence to the crumbling state of cybersecurity insurance. Is the industry about to stop writing policies altogether?</p>

<p>We also dive into the economics of tech. Brazos breaks down why the AI market looks suspiciously like the Dot-com bubble (with some Enron vibes thrown in) and why it might finally burst this year.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;AI Log4j&quot; Prediction: Will a prompt injection attack backdoor everything?</li>
<li>Why Microsoft is forcing Copilot on you whether you want it or not.</li>
<li>The End of Insurance: Why carriers might stop writing cyber policies in 2026.</li>
<li>Ransomware Theory: Did insurance companies actually cause the spike in ransom demands?</li>
<li>Critical Infrastructure: Why Richard predicts a major water plant or grid attack this year.</li>
<li>&quot;Pig Butchering&quot; Scams: It’s not what you think it is.</li>
<li>The AI Economic Bubble: Round-tripping revenue, Nvidia, and the looming market correction.</li>
<li>Privacy in 2026: Why smart TVs and appliances are making privacy a thing of the past.</li>
</ul>

<p>Are our predictions too cynical, or are we right on the money? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #2026Predictions #AIBubble #TechNews #Infosec #Ransomware #CyberInsurance #Nvidia #ScinaryNexus #Podcast</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Happy New Year! We made it to 2026 (barely). </p>

<p>The Scinary team invites you to the first episode of the year. After recovering from the annual management dinner, Richard, Brazos, Joseph, and Mario crack open some Czech beers and the &quot;Quadfather&quot; to lay out their boldest predictions for the cybersecurity landscape in 2026.</p>

<p>We move past the hype to discuss what keeps us up at night: From the inevitable &quot;Log4j&quot; moment for Artificial Intelligence to the crumbling state of cybersecurity insurance. Is the industry about to stop writing policies altogether?</p>

<p>We also dive into the economics of tech. Brazos breaks down why the AI market looks suspiciously like the Dot-com bubble (with some Enron vibes thrown in) and why it might finally burst this year.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;AI Log4j&quot; Prediction: Will a prompt injection attack backdoor everything?</li>
<li>Why Microsoft is forcing Copilot on you whether you want it or not.</li>
<li>The End of Insurance: Why carriers might stop writing cyber policies in 2026.</li>
<li>Ransomware Theory: Did insurance companies actually cause the spike in ransom demands?</li>
<li>Critical Infrastructure: Why Richard predicts a major water plant or grid attack this year.</li>
<li>&quot;Pig Butchering&quot; Scams: It’s not what you think it is.</li>
<li>The AI Economic Bubble: Round-tripping revenue, Nvidia, and the looming market correction.</li>
<li>Privacy in 2026: Why smart TVs and appliances are making privacy a thing of the past.</li>
</ul>

<p>Are our predictions too cynical, or are we right on the money? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #2026Predictions #AIBubble #TechNews #Infosec #Ransomware #CyberInsurance #Nvidia #ScinaryNexus #Podcast</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+aN_azDpf</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+aN_azDpf" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 30: Mead, Deer Crashes &amp; XDR: The 2025 Cybersecurity Wrap-Up</title>
      <link>https://scinary-info-nexus.fireside.fm/30</link>
      <guid isPermaLink="false">e9be499c-827f-4f15-9869-3bdd602a8210</guid>
      <pubDate>Fri, 12 Dec 2025 07:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/e9be499c-827f-4f15-9869-3bdd602a8210.mp3" length="117840512" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>It’s the final Scinary Information Nexus of 2025! Richard, Pierre, Hunter, and Brazos take over the studio to wrap up a massive year for Scinary.</itunes:subtitle>
      <itunes:duration>1:01:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>We start by roasting ourselves with a look back at the best (and worst) podcast moments of the year, from the &quot;Wayne&#39;s East Texas Hog Farming&quot; bit to the time Richard almost died drinking Jalapeno Mead on air. We also share the behind-the-scenes chaos of our travel vlog to Illinois and the team&#39;s unfortunate luck with deer collisions in Waco.</p>

<p>Then, we get down to business. The team discusses the evolution of Scinary&#39;s tech stack this year, specifically the launch of Scinary Connect (XDR) and why the rollout was a &quot;beta within a beta.&quot; Pierre breaks down the switch to &quot;Firewall Health Checks&quot; and the common misconfigurations he&#39;s finding in Fortigate setups across the state.</p>

<p>Finally, we look ahead to 2026: New integrations with SonicWall and Palo Alto, the Central Texas Cyber Hub initiative for K-12 students, and Richard’s crusade to build the perfect Backup &amp; Recovery solution.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;Jalapeno Mead&quot; Incident: Reliving our favorite podcast clips.</li>
<li>Travel Nightmares: The Illinois Vlog and hitting deer in Texas.</li>
<li>The evolution of Scinary Connect: Bringing XDR and FortiGate logs together.</li>
<li>Why we launched &quot;Block-as-a-Service&quot; for firewalls.</li>
<li>Firewall Health Checks: Why &quot;Default Accept&quot; rules are still haunting us.</li>
<li>The Central Texas Cyber Hub: Giving rural K-12 students a shot at a cyber career.</li>
<li>2026 Roadmap: Why Backup &amp; Recovery is our next big target.</li>
<li>A final security tip: If you don&#39;t need the network this holiday, UNPLUG IT.</li>
</ul>

<p>Check out our upcoming webinar &quot;Default to Hacked&quot; on Dec 17th!<br>
<a href="https://webinar.zoho.com/meeting/register?sessionId=1034168403" rel="nofollow">https://webinar.zoho.com/meeting/register?sessionId=1034168403</a></p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #YearInReview</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We start by roasting ourselves with a look back at the best (and worst) podcast moments of the year, from the &quot;Wayne&#39;s East Texas Hog Farming&quot; bit to the time Richard almost died drinking Jalapeno Mead on air. We also share the behind-the-scenes chaos of our travel vlog to Illinois and the team&#39;s unfortunate luck with deer collisions in Waco.</p>

<p>Then, we get down to business. The team discusses the evolution of Scinary&#39;s tech stack this year, specifically the launch of Scinary Connect (XDR) and why the rollout was a &quot;beta within a beta.&quot; Pierre breaks down the switch to &quot;Firewall Health Checks&quot; and the common misconfigurations he&#39;s finding in Fortigate setups across the state.</p>

<p>Finally, we look ahead to 2026: New integrations with SonicWall and Palo Alto, the Central Texas Cyber Hub initiative for K-12 students, and Richard’s crusade to build the perfect Backup &amp; Recovery solution.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;Jalapeno Mead&quot; Incident: Reliving our favorite podcast clips.</li>
<li>Travel Nightmares: The Illinois Vlog and hitting deer in Texas.</li>
<li>The evolution of Scinary Connect: Bringing XDR and FortiGate logs together.</li>
<li>Why we launched &quot;Block-as-a-Service&quot; for firewalls.</li>
<li>Firewall Health Checks: Why &quot;Default Accept&quot; rules are still haunting us.</li>
<li>The Central Texas Cyber Hub: Giving rural K-12 students a shot at a cyber career.</li>
<li>2026 Roadmap: Why Backup &amp; Recovery is our next big target.</li>
<li>A final security tip: If you don&#39;t need the network this holiday, UNPLUG IT.</li>
</ul>

<p>Check out our upcoming webinar &quot;Default to Hacked&quot; on Dec 17th!<br>
<a href="https://webinar.zoho.com/meeting/register?sessionId=1034168403" rel="nofollow">https://webinar.zoho.com/meeting/register?sessionId=1034168403</a></p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #YearInReview</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>We start by roasting ourselves with a look back at the best (and worst) podcast moments of the year, from the &quot;Wayne&#39;s East Texas Hog Farming&quot; bit to the time Richard almost died drinking Jalapeno Mead on air. We also share the behind-the-scenes chaos of our travel vlog to Illinois and the team&#39;s unfortunate luck with deer collisions in Waco.</p>

<p>Then, we get down to business. The team discusses the evolution of Scinary&#39;s tech stack this year, specifically the launch of Scinary Connect (XDR) and why the rollout was a &quot;beta within a beta.&quot; Pierre breaks down the switch to &quot;Firewall Health Checks&quot; and the common misconfigurations he&#39;s finding in Fortigate setups across the state.</p>

<p>Finally, we look ahead to 2026: New integrations with SonicWall and Palo Alto, the Central Texas Cyber Hub initiative for K-12 students, and Richard’s crusade to build the perfect Backup &amp; Recovery solution.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;Jalapeno Mead&quot; Incident: Reliving our favorite podcast clips.</li>
<li>Travel Nightmares: The Illinois Vlog and hitting deer in Texas.</li>
<li>The evolution of Scinary Connect: Bringing XDR and FortiGate logs together.</li>
<li>Why we launched &quot;Block-as-a-Service&quot; for firewalls.</li>
<li>Firewall Health Checks: Why &quot;Default Accept&quot; rules are still haunting us.</li>
<li>The Central Texas Cyber Hub: Giving rural K-12 students a shot at a cyber career.</li>
<li>2026 Roadmap: Why Backup &amp; Recovery is our next big target.</li>
<li>A final security tip: If you don&#39;t need the network this holiday, UNPLUG IT.</li>
</ul>

<p>Check out our upcoming webinar &quot;Default to Hacked&quot; on Dec 17th!<br>
<a href="https://webinar.zoho.com/meeting/register?sessionId=1034168403" rel="nofollow">https://webinar.zoho.com/meeting/register?sessionId=1034168403</a></p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #YearInReview</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+1ZA812nP</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+1ZA812nP" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
    </item>
    <item>
      <title>Episode 29: MIT &amp; Safe Security's "AI Slop" Research</title>
      <link>https://scinary-info-nexus.fireside.fm/29</link>
      <guid isPermaLink="false">05f665a2-7c5c-4a68-9d73-e9e2e687b0b6</guid>
      <pubDate>Fri, 14 Nov 2025 15:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/05f665a2-7c5c-4a68-9d73-e9e2e687b0b6.mp3" length="102777036" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team dissects two major scams shaking the cybersecurity world. First, they delve into the recent federal indictment of ransomware negotiators and incident responders, revealing how insiders allegedly colluded with the infamous Black Cat (ALPHV) ransomware group to extort their own clients. They explore the "fraud triangle" and question just how widespread this type of corruption is within the cyber insurance ecosystem.

The main event is a takedown of what security researcher Kevin Beaumont calls "AI Slop"—a deeply flawed research paper co-authored by MIT and the vendor Safe Security. The team systematically debunks the paper's central, fear-mongering claim that "80% of ransomware attacks are now AI-driven," exposing how it uses fabricated data, cites defunct malware groups, and ultimately functions as a marketing scam disguised as legitimate academic research.</itunes:subtitle>
      <itunes:duration>1:10:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After Richard lost all his wisdom (literally, from a wisdom tooth removal) and with Joseph Hamilton out celebrating the birth of his new baby boy, the team is back to tackle corruption and controversy in the cybersecurity industry.</p>

<p>First, the guys break down the shocking federal indictment of cybersecurity insiders—including ransomware negotiators and incident response managers from major firms—for allegedly colluding with the Black Cat (ALPHV) ransomware group. Is this an anomaly, or a sign of a much deeper problem within the cyber insurance and incident response world? We discuss the fraud triangle and the troubling incentives at play.</p>

<p>Then, we dive headfirst into the main event: &quot;AI Slop.&quot; Richard, Mario, Pierre, and Brazos pull apart the now-deleted research paper from MIT and vendor Safe Security that falsely claims &quot;80% of ransomware attacks are AI-driven.&quot; Citing research from Kevin Beaumont and Marcus Hutchins, they expose how this marketing piece, disguised as academic research, uses defunct malware groups and nonsensical data to create a problem that only the vendor can solve.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Black Cat Indictment: When your ransomware negotiators are in on the scam.</li>
<li>How the &quot;Fraud Triangle&quot; (Motive, Opportunity, Rationale) explains insider threats.</li>
<li>Deconstructing the MIT &amp; Safe Security &quot;AI Slop&quot; research paper.</li>
<li>Why the &quot;80% AI-driven ransomware&quot; claim is pure nonsense.</li>
<li>How defunct malware like Emotet ended up in a 2025 AI study.</li>
<li>The danger of prestigious institutions lending their credibility to marketing stunts.</li>
<li>Thoughts on a dentist who is also a certified &quot;Whiskey Master&quot; (thanks to our sponsor, Greg Babbitt!).</li>
</ul>

<p>Has the AI hype bubble reached the point where our most trusted institutions are selling snake oil? Let&#39;s get into it.</p>

<p>A huge thank you to Greg Babbitt for sponsoring this week&#39;s episode with a fantastic bottle of Wild Turkey Kentucky Spirit!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Ransomware #InsiderThreat #BlackCat #AI #ArtificialIntelligence #MIT #CyberScam #InfoSec #CybersecurityPodcast</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After Richard lost all his wisdom (literally, from a wisdom tooth removal) and with Joseph Hamilton out celebrating the birth of his new baby boy, the team is back to tackle corruption and controversy in the cybersecurity industry.</p>

<p>First, the guys break down the shocking federal indictment of cybersecurity insiders—including ransomware negotiators and incident response managers from major firms—for allegedly colluding with the Black Cat (ALPHV) ransomware group. Is this an anomaly, or a sign of a much deeper problem within the cyber insurance and incident response world? We discuss the fraud triangle and the troubling incentives at play.</p>

<p>Then, we dive headfirst into the main event: &quot;AI Slop.&quot; Richard, Mario, Pierre, and Brazos pull apart the now-deleted research paper from MIT and vendor Safe Security that falsely claims &quot;80% of ransomware attacks are AI-driven.&quot; Citing research from Kevin Beaumont and Marcus Hutchins, they expose how this marketing piece, disguised as academic research, uses defunct malware groups and nonsensical data to create a problem that only the vendor can solve.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Black Cat Indictment: When your ransomware negotiators are in on the scam.</li>
<li>How the &quot;Fraud Triangle&quot; (Motive, Opportunity, Rationale) explains insider threats.</li>
<li>Deconstructing the MIT &amp; Safe Security &quot;AI Slop&quot; research paper.</li>
<li>Why the &quot;80% AI-driven ransomware&quot; claim is pure nonsense.</li>
<li>How defunct malware like Emotet ended up in a 2025 AI study.</li>
<li>The danger of prestigious institutions lending their credibility to marketing stunts.</li>
<li>Thoughts on a dentist who is also a certified &quot;Whiskey Master&quot; (thanks to our sponsor, Greg Babbitt!).</li>
</ul>

<p>Has the AI hype bubble reached the point where our most trusted institutions are selling snake oil? Let&#39;s get into it.</p>

<p>A huge thank you to Greg Babbitt for sponsoring this week&#39;s episode with a fantastic bottle of Wild Turkey Kentucky Spirit!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Ransomware #InsiderThreat #BlackCat #AI #ArtificialIntelligence #MIT #CyberScam #InfoSec #CybersecurityPodcast</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After Richard lost all his wisdom (literally, from a wisdom tooth removal) and with Joseph Hamilton out celebrating the birth of his new baby boy, the team is back to tackle corruption and controversy in the cybersecurity industry.</p>

<p>First, the guys break down the shocking federal indictment of cybersecurity insiders—including ransomware negotiators and incident response managers from major firms—for allegedly colluding with the Black Cat (ALPHV) ransomware group. Is this an anomaly, or a sign of a much deeper problem within the cyber insurance and incident response world? We discuss the fraud triangle and the troubling incentives at play.</p>

<p>Then, we dive headfirst into the main event: &quot;AI Slop.&quot; Richard, Mario, Pierre, and Brazos pull apart the now-deleted research paper from MIT and vendor Safe Security that falsely claims &quot;80% of ransomware attacks are AI-driven.&quot; Citing research from Kevin Beaumont and Marcus Hutchins, they expose how this marketing piece, disguised as academic research, uses defunct malware groups and nonsensical data to create a problem that only the vendor can solve.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Black Cat Indictment: When your ransomware negotiators are in on the scam.</li>
<li>How the &quot;Fraud Triangle&quot; (Motive, Opportunity, Rationale) explains insider threats.</li>
<li>Deconstructing the MIT &amp; Safe Security &quot;AI Slop&quot; research paper.</li>
<li>Why the &quot;80% AI-driven ransomware&quot; claim is pure nonsense.</li>
<li>How defunct malware like Emotet ended up in a 2025 AI study.</li>
<li>The danger of prestigious institutions lending their credibility to marketing stunts.</li>
<li>Thoughts on a dentist who is also a certified &quot;Whiskey Master&quot; (thanks to our sponsor, Greg Babbitt!).</li>
</ul>

<p>Has the AI hype bubble reached the point where our most trusted institutions are selling snake oil? Let&#39;s get into it.</p>

<p>A huge thank you to Greg Babbitt for sponsoring this week&#39;s episode with a fantastic bottle of Wild Turkey Kentucky Spirit!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Ransomware #InsiderThreat #BlackCat #AI #ArtificialIntelligence #MIT #CyberScam #InfoSec #CybersecurityPodcast</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+U1qVtoZy</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+U1qVtoZy" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
    </item>
    <item>
      <title>Episode 28: Nightmare on AWS Street: Halloween Special</title>
      <link>https://scinary-info-nexus.fireside.fm/28</link>
      <guid isPermaLink="false">26772a76-5d6b-44e5-b273-dae68d493ac7</guid>
      <pubDate>Fri, 31 Oct 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/26772a76-5d6b-44e5-b273-dae68d493ac7.mp3" length="78433397" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>In this Halloween special, the team discusses the massive AWS outage that recently brought large swaths of the internet to a halt. They break down the technical "race condition" that caused the DNS failure, explore the comical real-world consequences like smart beds getting stuck, and analyze why even competitors like Microsoft were affected. The conversation broadens into a critical look at the tech industry's single points of failure (AWS, AT&amp;T), the dangerous trade-off between efficiency and resiliency, and whether our critical infrastructure is too reliant on a few monopolies. Additionally, they provide an update on the Salesforce breach, revealing that data belonging to personnel in major US government departments (DOD, DHS, ICE) was compromised by the threat group "Scattered Lapsus$ Hunters"</itunes:subtitle>
      <itunes:duration>53:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to a very spooky Scinary Information Nexus! Richard, Joseph, Tye, and Hunter are in full costume for this Halloween special to discuss a truly terrifying event: the day the internet broke.</p>

<p>This week, the team tackles the massive AWS outage that took down services from Microsoft to your smart home devices. We break down the technical jargon to explain the &quot;race condition&quot; that caused a critical DNS failure and explore the cascade effect that left companies scrambling. Why were multi-billion dollar firms operating without a failover plan? We also share some of the hilarious real-world consequences, like smart beds trapping their owners in a heated, upright position.</p>

<p>Then, we revisit the massive Salesforce data breach with a frightening new update: the threat group &quot;Scattered Lapsus$ Hunters&quot; has leaked data belonging to personnel from the Department of Defense, DHS, ICE, and other critical US government agencies. This leads to a larger discussion on the fragility of our digital world.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The technical cause of the AWS outage: What is a DNS &quot;race condition&quot;?</li>
<li>Why competitors like Microsoft were also taken offline.</li>
<li>The critical debate: Are we prioritizing efficiency over resiliency?</li>
<li>Hilarious IoT failures: When your smart bed turns against you.</li>
<li>Update on the Salesforce Breach: US Government data now exposed.</li>
<li>The danger of monopolies: How AWS, Google, and AT&amp;T create single points of failure.</li>
<li>The importance of having an analog (pen and paper) backup plan.</li>
</ul>

<p>Is our critical infrastructure built on a house of cards? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to a very spooky Scinary Information Nexus! Richard, Joseph, Tye, and Hunter are in full costume for this Halloween special to discuss a truly terrifying event: the day the internet broke.</p>

<p>This week, the team tackles the massive AWS outage that took down services from Microsoft to your smart home devices. We break down the technical jargon to explain the &quot;race condition&quot; that caused a critical DNS failure and explore the cascade effect that left companies scrambling. Why were multi-billion dollar firms operating without a failover plan? We also share some of the hilarious real-world consequences, like smart beds trapping their owners in a heated, upright position.</p>

<p>Then, we revisit the massive Salesforce data breach with a frightening new update: the threat group &quot;Scattered Lapsus$ Hunters&quot; has leaked data belonging to personnel from the Department of Defense, DHS, ICE, and other critical US government agencies. This leads to a larger discussion on the fragility of our digital world.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The technical cause of the AWS outage: What is a DNS &quot;race condition&quot;?</li>
<li>Why competitors like Microsoft were also taken offline.</li>
<li>The critical debate: Are we prioritizing efficiency over resiliency?</li>
<li>Hilarious IoT failures: When your smart bed turns against you.</li>
<li>Update on the Salesforce Breach: US Government data now exposed.</li>
<li>The danger of monopolies: How AWS, Google, and AT&amp;T create single points of failure.</li>
<li>The importance of having an analog (pen and paper) backup plan.</li>
</ul>

<p>Is our critical infrastructure built on a house of cards? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to a very spooky Scinary Information Nexus! Richard, Joseph, Tye, and Hunter are in full costume for this Halloween special to discuss a truly terrifying event: the day the internet broke.</p>

<p>This week, the team tackles the massive AWS outage that took down services from Microsoft to your smart home devices. We break down the technical jargon to explain the &quot;race condition&quot; that caused a critical DNS failure and explore the cascade effect that left companies scrambling. Why were multi-billion dollar firms operating without a failover plan? We also share some of the hilarious real-world consequences, like smart beds trapping their owners in a heated, upright position.</p>

<p>Then, we revisit the massive Salesforce data breach with a frightening new update: the threat group &quot;Scattered Lapsus$ Hunters&quot; has leaked data belonging to personnel from the Department of Defense, DHS, ICE, and other critical US government agencies. This leads to a larger discussion on the fragility of our digital world.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The technical cause of the AWS outage: What is a DNS &quot;race condition&quot;?</li>
<li>Why competitors like Microsoft were also taken offline.</li>
<li>The critical debate: Are we prioritizing efficiency over resiliency?</li>
<li>Hilarious IoT failures: When your smart bed turns against you.</li>
<li>Update on the Salesforce Breach: US Government data now exposed.</li>
<li>The danger of monopolies: How AWS, Google, and AT&amp;T create single points of failure.</li>
<li>The importance of having an analog (pen and paper) backup plan.</li>
</ul>

<p>Is our critical infrastructure built on a house of cards? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+zoh-Txgt</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+zoh-Txgt" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 27: The New Rules of War: Cyber &amp; Disinformation</title>
      <link>https://scinary-info-nexus.fireside.fm/27</link>
      <guid isPermaLink="false">a39423d4-38ac-4ff2-b1fd-5efd97b2fde3</guid>
      <pubDate>Fri, 24 Oct 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a39423d4-38ac-4ff2-b1fd-5efd97b2fde3.mp3" length="91150321" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team is joined by special guest Lieutenant Colonel Steven Beseda, a retired U.S. Army Armor and Information Operations officer, for a deep dive into modern warfare. The discussion clarifies the critical differences between misinformation (unintentional falsehoods) and disinformation (deliberate deception), using historical examples from Schwarzkopf’s "left hook" in Desert Storm to Russia's ongoing campaign in Ukraine. The conversation pivots to the escalating tensions between China and Taiwan, analyzing how China is "prepping the battlespace" with information warfare and the strategic importance of Taiwan's semiconductor industry. Finally, they explore the chilling concept of a new "Cyber MAD" (Mutually Assured Destruction), questioning whether the next global conflict will be fought with bombs or with bytes targeting critical infrastructure.</itunes:subtitle>
      <itunes:duration>1:02:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>This week on the Scinary Information Nexus, we are honored to welcome a very special guest: Lieutenant Colonel Steven Beseda, United States Army (Retired). With a deep background in both armored forces and Information Operations, Colonel Beseda joins Richard, Brazos, and John to pull back the curtain on the modern battlefield.</p>

<p>Forget everything you think you know about traditional warfare. We break down the crucial difference between misinformation and disinformation, exploring how state actors like Russia use it to shape narratives at home and abroad. Using fascinating historical examples-from General Schwarzkopf&#39;s classic deception operation in Desert Storm to the unprecedented OSINT (Open-Source Intelligence) coming out of the Ukraine war-we reveal how information has become a primary weapon.</p>

<p>The conversation then focuses on one of the world&#39;s most critical flashpoints: Taiwan. How is China using information warfare to prep the battlespace and undermine Taiwanese and U.S. resolve? And how does the global reliance on Taiwan&#39;s semiconductor industry play into this new era of conflict?</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Misinformation vs. Disinformation: A military definition you need to know.</li>
<li>Deception Operations: How the U.S. military fooled Saddam Hussein.</li>
<li>The Russia-Ukraine War as a live-fire information warfare laboratory.</li>
<li>The strategic use of OSINT and platforms like Telegram in modern conflicts.</li>
<li>China&#39;s doctrine to win without fighting by targeting Taiwan&#39;s cognitive space.</li>
<li>The shift from Nuclear MAD to a new &quot;Cyber MAD&quot; (Mutually Assured Destruction).</li>
<li>The vulnerability of U.S. critical infrastructure to Chinese technology.</li>
<li>Soft Power &amp; Economic Warfare: China&#39;s &quot;Belt and Road&quot; initiative.</li>
</ul>

<p>Is the next world war one that will be fought not with soldiers and tanks, but with keyboards and data streams? Let&#39;s get into it.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>CyberWarfare #Disinformation #InformationWarfare #MilitaryStrategy #China #Taiwan #USArmy #Cybersecurity #OSINT #Geopolitics</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week on the Scinary Information Nexus, we are honored to welcome a very special guest: Lieutenant Colonel Steven Beseda, United States Army (Retired). With a deep background in both armored forces and Information Operations, Colonel Beseda joins Richard, Brazos, and John to pull back the curtain on the modern battlefield.</p>

<p>Forget everything you think you know about traditional warfare. We break down the crucial difference between misinformation and disinformation, exploring how state actors like Russia use it to shape narratives at home and abroad. Using fascinating historical examples-from General Schwarzkopf&#39;s classic deception operation in Desert Storm to the unprecedented OSINT (Open-Source Intelligence) coming out of the Ukraine war-we reveal how information has become a primary weapon.</p>

<p>The conversation then focuses on one of the world&#39;s most critical flashpoints: Taiwan. How is China using information warfare to prep the battlespace and undermine Taiwanese and U.S. resolve? And how does the global reliance on Taiwan&#39;s semiconductor industry play into this new era of conflict?</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Misinformation vs. Disinformation: A military definition you need to know.</li>
<li>Deception Operations: How the U.S. military fooled Saddam Hussein.</li>
<li>The Russia-Ukraine War as a live-fire information warfare laboratory.</li>
<li>The strategic use of OSINT and platforms like Telegram in modern conflicts.</li>
<li>China&#39;s doctrine to win without fighting by targeting Taiwan&#39;s cognitive space.</li>
<li>The shift from Nuclear MAD to a new &quot;Cyber MAD&quot; (Mutually Assured Destruction).</li>
<li>The vulnerability of U.S. critical infrastructure to Chinese technology.</li>
<li>Soft Power &amp; Economic Warfare: China&#39;s &quot;Belt and Road&quot; initiative.</li>
</ul>

<p>Is the next world war one that will be fought not with soldiers and tanks, but with keyboards and data streams? Let&#39;s get into it.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>CyberWarfare #Disinformation #InformationWarfare #MilitaryStrategy #China #Taiwan #USArmy #Cybersecurity #OSINT #Geopolitics</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>This week on the Scinary Information Nexus, we are honored to welcome a very special guest: Lieutenant Colonel Steven Beseda, United States Army (Retired). With a deep background in both armored forces and Information Operations, Colonel Beseda joins Richard, Brazos, and John to pull back the curtain on the modern battlefield.</p>

<p>Forget everything you think you know about traditional warfare. We break down the crucial difference between misinformation and disinformation, exploring how state actors like Russia use it to shape narratives at home and abroad. Using fascinating historical examples-from General Schwarzkopf&#39;s classic deception operation in Desert Storm to the unprecedented OSINT (Open-Source Intelligence) coming out of the Ukraine war-we reveal how information has become a primary weapon.</p>

<p>The conversation then focuses on one of the world&#39;s most critical flashpoints: Taiwan. How is China using information warfare to prep the battlespace and undermine Taiwanese and U.S. resolve? And how does the global reliance on Taiwan&#39;s semiconductor industry play into this new era of conflict?</p>

<p>In this episode, we discuss:</p>

<ul>
<li>Misinformation vs. Disinformation: A military definition you need to know.</li>
<li>Deception Operations: How the U.S. military fooled Saddam Hussein.</li>
<li>The Russia-Ukraine War as a live-fire information warfare laboratory.</li>
<li>The strategic use of OSINT and platforms like Telegram in modern conflicts.</li>
<li>China&#39;s doctrine to win without fighting by targeting Taiwan&#39;s cognitive space.</li>
<li>The shift from Nuclear MAD to a new &quot;Cyber MAD&quot; (Mutually Assured Destruction).</li>
<li>The vulnerability of U.S. critical infrastructure to Chinese technology.</li>
<li>Soft Power &amp; Economic Warfare: China&#39;s &quot;Belt and Road&quot; initiative.</li>
</ul>

<p>Is the next world war one that will be fought not with soldiers and tanks, but with keyboards and data streams? Let&#39;s get into it.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>CyberWarfare #Disinformation #InformationWarfare #MilitaryStrategy #China #Taiwan #USArmy #Cybersecurity #OSINT #Geopolitics</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+2oRAkVFb</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+2oRAkVFb" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
    </item>
    <item>
      <title>Episode 26: A Tech Director's Perspective on School Cyber Threats</title>
      <link>https://scinary-info-nexus.fireside.fm/26</link>
      <guid isPermaLink="false">edb09f0c-7c44-482a-b036-85d8048b7d65</guid>
      <pubDate>Fri, 17 Oct 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/edb09f0c-7c44-482a-b036-85d8048b7d65.mp3" length="114351480" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The Scinary team, along with special guest Greg Babbitt, Technology Director at Palmer ISD, tackles a massive week in cybersecurity news. They dissect the colossal Salesforce breach allegedly carried out by the "Scattered Lapsis Hunters," breaking down the OAuth attack vector, the $1 billion ransom, and the major companies affected like Disney and Home Depot. The discussion then pivots to the unique and often overlooked cybersecurity challenges within K-12 education. Greg provides a frontline perspective on the constant battle against the "human element," the difficulties of managing third-party vendor risk with limited leverage, and the hidden costs and security gaps in "free" educational tools like Google Workspace.</itunes:subtitle>
      <itunes:duration>1:18:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, we&#39;re joined by a special guest from the educational front lines, Greg Babbitt, the Technology Director at Palmer ISD, for a packed episode you can&#39;t afford to miss.</p>

<p>First, we tackle one of the biggest stories of the year: the Salesforce breach. Richard, Brazos, and Joseph break down how the &quot;Scattered Lapsus Hunters&quot; allegedly compromised giants like Disney, Home Depot, and Google through sophisticated OAuth and API attacks. We discuss the billion-dollar ransom, the responsibility of SaaS providers, and what this means for every company that entrusts their data to a third party.</p>

<p>Then, with Greg&#39;s expertise, we dive deep into the unique cybersecurity landscape of K-12 education. We explore why the biggest threat is often the human element inside the network and discuss the immense challenges of vetting and securing countless third-party apps and services-from bus routing software to Google Workspace. It&#39;s a candid look at the real-world tightrope walk between security, usability, and budget that every school district faces.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Salesforce Breach: How OAuth tokens and API keys led to a potential catastrophe.</li>
<li>The &quot;Scattered Lapsis Hunters&quot; and their tactics.</li>
<li>Why companies like Disney can&#39;t just blame their vendors.</li>
<li>The C-Suite conversation: Communicating reputational risk to non-technical leadership.</li>
<li>The &quot;Human Element&quot;: Why training isn&#39;t enough to stop phishing.</li>
<li>Third-Party Risk in K-12: What happens when you have no leverage over your vendors?</li>
<li>The &quot;Free&quot; Trap: Uncovering the hidden security costs of Google Workspace for Education.</li>
<li>The importance of a &quot;no-blame&quot; culture when security incidents happen.</li>
</ul>

<p>Is your organization truly prepared for the risks buried in your supply chain and your own hallways? Let&#39;s get into it.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Salesforce #DataBreach #K12 #EdTech #InfoSec #ThirdPartyRisk #CybersecurityPodcast #Education #Phishing</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, we&#39;re joined by a special guest from the educational front lines, Greg Babbitt, the Technology Director at Palmer ISD, for a packed episode you can&#39;t afford to miss.</p>

<p>First, we tackle one of the biggest stories of the year: the Salesforce breach. Richard, Brazos, and Joseph break down how the &quot;Scattered Lapsus Hunters&quot; allegedly compromised giants like Disney, Home Depot, and Google through sophisticated OAuth and API attacks. We discuss the billion-dollar ransom, the responsibility of SaaS providers, and what this means for every company that entrusts their data to a third party.</p>

<p>Then, with Greg&#39;s expertise, we dive deep into the unique cybersecurity landscape of K-12 education. We explore why the biggest threat is often the human element inside the network and discuss the immense challenges of vetting and securing countless third-party apps and services-from bus routing software to Google Workspace. It&#39;s a candid look at the real-world tightrope walk between security, usability, and budget that every school district faces.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Salesforce Breach: How OAuth tokens and API keys led to a potential catastrophe.</li>
<li>The &quot;Scattered Lapsis Hunters&quot; and their tactics.</li>
<li>Why companies like Disney can&#39;t just blame their vendors.</li>
<li>The C-Suite conversation: Communicating reputational risk to non-technical leadership.</li>
<li>The &quot;Human Element&quot;: Why training isn&#39;t enough to stop phishing.</li>
<li>Third-Party Risk in K-12: What happens when you have no leverage over your vendors?</li>
<li>The &quot;Free&quot; Trap: Uncovering the hidden security costs of Google Workspace for Education.</li>
<li>The importance of a &quot;no-blame&quot; culture when security incidents happen.</li>
</ul>

<p>Is your organization truly prepared for the risks buried in your supply chain and your own hallways? Let&#39;s get into it.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Salesforce #DataBreach #K12 #EdTech #InfoSec #ThirdPartyRisk #CybersecurityPodcast #Education #Phishing</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, we&#39;re joined by a special guest from the educational front lines, Greg Babbitt, the Technology Director at Palmer ISD, for a packed episode you can&#39;t afford to miss.</p>

<p>First, we tackle one of the biggest stories of the year: the Salesforce breach. Richard, Brazos, and Joseph break down how the &quot;Scattered Lapsus Hunters&quot; allegedly compromised giants like Disney, Home Depot, and Google through sophisticated OAuth and API attacks. We discuss the billion-dollar ransom, the responsibility of SaaS providers, and what this means for every company that entrusts their data to a third party.</p>

<p>Then, with Greg&#39;s expertise, we dive deep into the unique cybersecurity landscape of K-12 education. We explore why the biggest threat is often the human element inside the network and discuss the immense challenges of vetting and securing countless third-party apps and services-from bus routing software to Google Workspace. It&#39;s a candid look at the real-world tightrope walk between security, usability, and budget that every school district faces.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Salesforce Breach: How OAuth tokens and API keys led to a potential catastrophe.</li>
<li>The &quot;Scattered Lapsis Hunters&quot; and their tactics.</li>
<li>Why companies like Disney can&#39;t just blame their vendors.</li>
<li>The C-Suite conversation: Communicating reputational risk to non-technical leadership.</li>
<li>The &quot;Human Element&quot;: Why training isn&#39;t enough to stop phishing.</li>
<li>Third-Party Risk in K-12: What happens when you have no leverage over your vendors?</li>
<li>The &quot;Free&quot; Trap: Uncovering the hidden security costs of Google Workspace for Education.</li>
<li>The importance of a &quot;no-blame&quot; culture when security incidents happen.</li>
</ul>

<p>Is your organization truly prepared for the risks buried in your supply chain and your own hallways? Let&#39;s get into it.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>Cybersecurity #Salesforce #DataBreach #K12 #EdTech #InfoSec #ThirdPartyRisk #CybersecurityPodcast #Education #Phishing</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+MdVuXCX9</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+MdVuXCX9" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 25: Your TV is Watching You: ATSC 3 / NextGen Broadcast</title>
      <link>https://scinary-info-nexus.fireside.fm/25</link>
      <guid isPermaLink="false">2b967cf0-72b9-4186-a08c-6fbce0c25d6a</guid>
      <pubDate>Fri, 10 Oct 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2b967cf0-72b9-4186-a08c-6fbce0c25d6a.mp3" length="86237758" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, the team is joined by broadcast television veteran Daniel Hamilton to explore two major technological shifts with significant cybersecurity and privacy implications. First, they dive into ATSC 3.0 (NextGen TV), the new standard that will transform free over-the-air television into an interactive, IP-based platform. The discussion unpacks how this technology will enable hyper-targeted advertising by collecting and correlating viewer data—much like Google and Meta do—and raises questions about the new security vulnerabilities and privacy trade-offs for consumers.

The conversation then pivots to the impending government ban on Chinese-made drones (like those from DJI). Daniel, who administers a national drone program, details the operational and financial chaos this legislation is causing. The team critically examines the policy, labeling it "political theater" that targets consumer tech while ignoring the widespread use of Chinese components in America's critical infrastructure, and highlights the lack of viable, cost-effective American alternatives.</itunes:subtitle>
      <itunes:duration>59:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, we have a very special guest: Daniel Hamilton, a 38-year veteran of the broadcast industry, drone program administrator, and Joseph&#39;s dad!</p>

<p>Richard, Mario, and Joseph sit down with Daniel to discuss the massive technological changes happening just behind your TV screen. We&#39;re talking about ATSC 3.0, or &quot;NextGen TV,&quot; the new broadcast standard poised to turn free over-the-air television into a data-driven powerhouse. Learn how your viewing habits could soon be correlated with your online searches to deliver hyper-targeted ads, and what this IP-based system means for your privacy and cybersecurity. Could a hijacked broadcast signal one day be used to push malware directly to your smart TV?</p>

<p>Then, the conversation takes to the skies as we tackle the U.S. government&#39;s impending ban on Chinese-made drones. As an administrator for a fleet of nearly 500 drones, Daniel gives us a frontline report on the chaos this policy is causing. We break down why this move feels like political theater, cripples industries from journalism to agriculture, and ignores the bigger national security picture of where our technology REALLY comes from.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>What is ATSC 3.0 and how will it change &quot;free&quot; TV forever?</li>
<li>The end of anonymity: How broadcasters will track what you watch.</li>
<li>Geo-targeting alerts: Ending &quot;alert fatigue&quot; during severe weather.</li>
<li>The new cybersecurity risks of IP-connected broadcasting.</li>
<li>The government&#39;s ban on Chinese drones (DJI) and its real-world impact.</li>
<li>Why American-made drone alternatives aren&#39;t ready to fill the gap.</li>
<li>The hypocrisy: Banning consumer drones while critical infrastructure runs on Chinese chips.</li>
<li>Will your next drone cost you $25,000?</li>
</ul>

<p>Is a &quot;smarter&quot; TV worth giving up another layer of your personal data? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>NextGenTV #ATSC3 #Cybersecurity #Privacy #DroneBan #DJI #Broadcast #InfoSec #CybersecurityPodcast #NationalSecurity</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, we have a very special guest: Daniel Hamilton, a 38-year veteran of the broadcast industry, drone program administrator, and Joseph&#39;s dad!</p>

<p>Richard, Mario, and Joseph sit down with Daniel to discuss the massive technological changes happening just behind your TV screen. We&#39;re talking about ATSC 3.0, or &quot;NextGen TV,&quot; the new broadcast standard poised to turn free over-the-air television into a data-driven powerhouse. Learn how your viewing habits could soon be correlated with your online searches to deliver hyper-targeted ads, and what this IP-based system means for your privacy and cybersecurity. Could a hijacked broadcast signal one day be used to push malware directly to your smart TV?</p>

<p>Then, the conversation takes to the skies as we tackle the U.S. government&#39;s impending ban on Chinese-made drones. As an administrator for a fleet of nearly 500 drones, Daniel gives us a frontline report on the chaos this policy is causing. We break down why this move feels like political theater, cripples industries from journalism to agriculture, and ignores the bigger national security picture of where our technology REALLY comes from.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>What is ATSC 3.0 and how will it change &quot;free&quot; TV forever?</li>
<li>The end of anonymity: How broadcasters will track what you watch.</li>
<li>Geo-targeting alerts: Ending &quot;alert fatigue&quot; during severe weather.</li>
<li>The new cybersecurity risks of IP-connected broadcasting.</li>
<li>The government&#39;s ban on Chinese drones (DJI) and its real-world impact.</li>
<li>Why American-made drone alternatives aren&#39;t ready to fill the gap.</li>
<li>The hypocrisy: Banning consumer drones while critical infrastructure runs on Chinese chips.</li>
<li>Will your next drone cost you $25,000?</li>
</ul>

<p>Is a &quot;smarter&quot; TV worth giving up another layer of your personal data? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>NextGenTV #ATSC3 #Cybersecurity #Privacy #DroneBan #DJI #Broadcast #InfoSec #CybersecurityPodcast #NationalSecurity</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, we have a very special guest: Daniel Hamilton, a 38-year veteran of the broadcast industry, drone program administrator, and Joseph&#39;s dad!</p>

<p>Richard, Mario, and Joseph sit down with Daniel to discuss the massive technological changes happening just behind your TV screen. We&#39;re talking about ATSC 3.0, or &quot;NextGen TV,&quot; the new broadcast standard poised to turn free over-the-air television into a data-driven powerhouse. Learn how your viewing habits could soon be correlated with your online searches to deliver hyper-targeted ads, and what this IP-based system means for your privacy and cybersecurity. Could a hijacked broadcast signal one day be used to push malware directly to your smart TV?</p>

<p>Then, the conversation takes to the skies as we tackle the U.S. government&#39;s impending ban on Chinese-made drones. As an administrator for a fleet of nearly 500 drones, Daniel gives us a frontline report on the chaos this policy is causing. We break down why this move feels like political theater, cripples industries from journalism to agriculture, and ignores the bigger national security picture of where our technology REALLY comes from.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>What is ATSC 3.0 and how will it change &quot;free&quot; TV forever?</li>
<li>The end of anonymity: How broadcasters will track what you watch.</li>
<li>Geo-targeting alerts: Ending &quot;alert fatigue&quot; during severe weather.</li>
<li>The new cybersecurity risks of IP-connected broadcasting.</li>
<li>The government&#39;s ban on Chinese drones (DJI) and its real-world impact.</li>
<li>Why American-made drone alternatives aren&#39;t ready to fill the gap.</li>
<li>The hypocrisy: Banning consumer drones while critical infrastructure runs on Chinese chips.</li>
<li>Will your next drone cost you $25,000?</li>
</ul>

<p>Is a &quot;smarter&quot; TV worth giving up another layer of your personal data? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>NextGenTV #ATSC3 #Cybersecurity #Privacy #DroneBan #DJI #Broadcast #InfoSec #CybersecurityPodcast #NationalSecurity</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+9_xnMwOV</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+9_xnMwOV" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 24: Phishing 3.0: AI Threats Beyond Email (ft. Ironscales CEO)</title>
      <link>https://scinary-info-nexus.fireside.fm/24</link>
      <guid isPermaLink="false">68f622e1-d9cd-4ed5-99dd-a7cbdbb43843</guid>
      <pubDate>Fri, 03 Oct 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/68f622e1-d9cd-4ed5-99dd-a7cbdbb43843.mp3" length="124135353" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team sits down with Eyal Benishti, the CEO of our partner Ironscales, for a deep dive into the evolution of email security. Eyal shares the origin story of Ironscales and explains why traditional Secure Email Gateways (SEGs) are no longer sufficient to stop modern, sophisticated "Phishing 2.0" attacks like Business Email Compromise. The core of the discussion explores the emerging frontier of "Phishing 3.0," a new threat landscape driven by generative AI, deepfakes, and multi-channel attacks that weaponize platforms like Teams and Slack. Eyal explains how the defense must shift towards adaptive, agentic AI to protect all forms of communication and rebuild trust in a world where you can't always believe what you see or hear.</itunes:subtitle>
      <itunes:duration>1:04:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>This week on the Scinary Information Nexus, we&#39;re joined by a special guest, Eyal Benishti, the CEO of our email security partner, Ironscales!</p>

<p>Richard, Brazos, Joseph, and John sit down with Eyal to discuss the massive shifts in the threat landscape, from the early days of obvious malware attachments (Phishing 1.0) to the sophisticated social engineering attacks that plague businesses today (Phishing 2.0).</p>

<p>But the real focus is on the future: What is &quot;Phishing 3.0&quot;? Eyal breaks down how generative AI, deepfake voice and video, and prompt injection attacks are creating a new reality where phishing is no longer confined to email. We explore how attackers are using tools like Teams, Slack, and other communication channels to create persistent, multi-modal attacks that are virtually indistinguishable from legitimate requests. How do we fight back when we can&#39;t trust what we see and hear? The answer lies in adaptive, agentic AI.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The origin story of Ironscales and why a new approach to email security was needed.</li>
<li>Phishing 1.0 vs 2.0 vs 3.0: The evolution of the attack.</li>
<li>Why traditional Secure Email Gateways (SEGs) miss modern threats.</li>
<li>Deepfakes &amp; Voice Cloning: The weaponization of generative AI.</li>
<li>Agentic AI: How to fight fire with fire.</li>
<li>The future of security: Protecting communication, not just email inboxes.</li>
<li>Why the &quot;human in the loop&quot; is still critical for training AI models.</li>
<li>How your employees can become your strongest defense layer.</li>
</ul>

<p>As AI makes attacks more convincing than ever, how do we rebuild trust in our digital communications? Let&#39;s discuss.</p>

<hr>

<p>Connect with our guest, Eyal Benishti, and Ironscales:<br>
<a href="https://www.ironscales.com/" rel="nofollow">https://www.ironscales.com/</a><br>
<a href="https://www.linkedin.com/in/eyalbd1" rel="nofollow">https://www.linkedin.com/in/eyalbd1</a></p>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>phishing #cybersecurity #AI #infosec #socialengineering #podcast #sysadmin</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week on the Scinary Information Nexus, we&#39;re joined by a special guest, Eyal Benishti, the CEO of our email security partner, Ironscales!</p>

<p>Richard, Brazos, Joseph, and John sit down with Eyal to discuss the massive shifts in the threat landscape, from the early days of obvious malware attachments (Phishing 1.0) to the sophisticated social engineering attacks that plague businesses today (Phishing 2.0).</p>

<p>But the real focus is on the future: What is &quot;Phishing 3.0&quot;? Eyal breaks down how generative AI, deepfake voice and video, and prompt injection attacks are creating a new reality where phishing is no longer confined to email. We explore how attackers are using tools like Teams, Slack, and other communication channels to create persistent, multi-modal attacks that are virtually indistinguishable from legitimate requests. How do we fight back when we can&#39;t trust what we see and hear? The answer lies in adaptive, agentic AI.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The origin story of Ironscales and why a new approach to email security was needed.</li>
<li>Phishing 1.0 vs 2.0 vs 3.0: The evolution of the attack.</li>
<li>Why traditional Secure Email Gateways (SEGs) miss modern threats.</li>
<li>Deepfakes &amp; Voice Cloning: The weaponization of generative AI.</li>
<li>Agentic AI: How to fight fire with fire.</li>
<li>The future of security: Protecting communication, not just email inboxes.</li>
<li>Why the &quot;human in the loop&quot; is still critical for training AI models.</li>
<li>How your employees can become your strongest defense layer.</li>
</ul>

<p>As AI makes attacks more convincing than ever, how do we rebuild trust in our digital communications? Let&#39;s discuss.</p>

<hr>

<p>Connect with our guest, Eyal Benishti, and Ironscales:<br>
<a href="https://www.ironscales.com/" rel="nofollow">https://www.ironscales.com/</a><br>
<a href="https://www.linkedin.com/in/eyalbd1" rel="nofollow">https://www.linkedin.com/in/eyalbd1</a></p>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>phishing #cybersecurity #AI #infosec #socialengineering #podcast #sysadmin</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>This week on the Scinary Information Nexus, we&#39;re joined by a special guest, Eyal Benishti, the CEO of our email security partner, Ironscales!</p>

<p>Richard, Brazos, Joseph, and John sit down with Eyal to discuss the massive shifts in the threat landscape, from the early days of obvious malware attachments (Phishing 1.0) to the sophisticated social engineering attacks that plague businesses today (Phishing 2.0).</p>

<p>But the real focus is on the future: What is &quot;Phishing 3.0&quot;? Eyal breaks down how generative AI, deepfake voice and video, and prompt injection attacks are creating a new reality where phishing is no longer confined to email. We explore how attackers are using tools like Teams, Slack, and other communication channels to create persistent, multi-modal attacks that are virtually indistinguishable from legitimate requests. How do we fight back when we can&#39;t trust what we see and hear? The answer lies in adaptive, agentic AI.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The origin story of Ironscales and why a new approach to email security was needed.</li>
<li>Phishing 1.0 vs 2.0 vs 3.0: The evolution of the attack.</li>
<li>Why traditional Secure Email Gateways (SEGs) miss modern threats.</li>
<li>Deepfakes &amp; Voice Cloning: The weaponization of generative AI.</li>
<li>Agentic AI: How to fight fire with fire.</li>
<li>The future of security: Protecting communication, not just email inboxes.</li>
<li>Why the &quot;human in the loop&quot; is still critical for training AI models.</li>
<li>How your employees can become your strongest defense layer.</li>
</ul>

<p>As AI makes attacks more convincing than ever, how do we rebuild trust in our digital communications? Let&#39;s discuss.</p>

<hr>

<p>Connect with our guest, Eyal Benishti, and Ironscales:<br>
<a href="https://www.ironscales.com/" rel="nofollow">https://www.ironscales.com/</a><br>
<a href="https://www.linkedin.com/in/eyalbd1" rel="nofollow">https://www.linkedin.com/in/eyalbd1</a></p>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>phishing #cybersecurity #AI #infosec #socialengineering #podcast #sysadmin</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+1pTGGqi3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+1pTGGqi3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 23: Debunking VPN Myths: Are You Really Anonymous Online?</title>
      <link>https://scinary-info-nexus.fireside.fm/23</link>
      <guid isPermaLink="false">ccbff439-1f9a-4128-97df-38d07f8849d6</guid>
      <pubDate>Fri, 26 Sep 2025 12:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ccbff439-1f9a-4128-97df-38d07f8849d6.mp3" length="113118041" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team pulls back the curtain on the consumer VPN and data privacy industry. They conduct a deep-dive into the privacy policies of major players like NordVPN and Surfshark, revealing how "no-log" claims can be misleading due to DNS logging and financial transaction records. They also present compelling research on PII (Personally Identifiable Information) removal services like Incogni and DeleteMe, exposing their surprisingly low success and accuracy rates, and questioning if these expensive subscriptions are truly worth the cost.</itunes:subtitle>
      <itunes:duration>58:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After a technical mishap involving an unplugged cable (we&#39;re looking at you, Mario), the team is back to tackle a topic that affects almost every internet user: online privacy.</p>

<p>This week, Brazos, Tye, and Mario dive deep into the privacy policies of the VPNs you see advertised everywhere—from NordVPN to Surfshark. They uncover the fine print that contradicts the &quot;no-log&quot; promises and reveal how everything from your DNS requests to your credit card payment can instantly de-anonymize you. We also discuss what makes a VPN provider like Mullvad trustworthy in a sea of questionable marketing.</p>

<p>Then, we turn our sights to PII (Personally Identifiable Information) removal services like Incogni and DeleteMe. Are they the silver bullet for data brokers, or are you paying a premium for a service with a less than 50% success rate? The research might shock you.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;No-Log&quot; Myth: What your VPN provider isn&#39;t telling you.</li>
<li>How paying for a VPN by credit card can compromise your identity.</li>
<li>The surprising ownership structure behind NordVPN and Surfshark.</li>
<li>Shocking research: The 48% success rate and 41% accuracy rate of PII removal services.</li>
<li>A trustworthy alternative: What makes services like Mullvad different?</li>
<li>Data Brokers 101: How they get your information and why it&#39;s so hard to remove.</li>
<li>Why you need to ask yourself what you&#39;re <em>really</em> using a VPN for.</li>
</ul>

<p>Is your online privacy just a product being sold back to you? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>VPN #Cybersecurity #Privacy #NordVPN #Surfshark #DataBroker #OnlineSafety #InfoSec #CybersecurityPodcast #Mullvad</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After a technical mishap involving an unplugged cable (we&#39;re looking at you, Mario), the team is back to tackle a topic that affects almost every internet user: online privacy.</p>

<p>This week, Brazos, Tye, and Mario dive deep into the privacy policies of the VPNs you see advertised everywhere—from NordVPN to Surfshark. They uncover the fine print that contradicts the &quot;no-log&quot; promises and reveal how everything from your DNS requests to your credit card payment can instantly de-anonymize you. We also discuss what makes a VPN provider like Mullvad trustworthy in a sea of questionable marketing.</p>

<p>Then, we turn our sights to PII (Personally Identifiable Information) removal services like Incogni and DeleteMe. Are they the silver bullet for data brokers, or are you paying a premium for a service with a less than 50% success rate? The research might shock you.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;No-Log&quot; Myth: What your VPN provider isn&#39;t telling you.</li>
<li>How paying for a VPN by credit card can compromise your identity.</li>
<li>The surprising ownership structure behind NordVPN and Surfshark.</li>
<li>Shocking research: The 48% success rate and 41% accuracy rate of PII removal services.</li>
<li>A trustworthy alternative: What makes services like Mullvad different?</li>
<li>Data Brokers 101: How they get your information and why it&#39;s so hard to remove.</li>
<li>Why you need to ask yourself what you&#39;re <em>really</em> using a VPN for.</li>
</ul>

<p>Is your online privacy just a product being sold back to you? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>VPN #Cybersecurity #Privacy #NordVPN #Surfshark #DataBroker #OnlineSafety #InfoSec #CybersecurityPodcast #Mullvad</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! After a technical mishap involving an unplugged cable (we&#39;re looking at you, Mario), the team is back to tackle a topic that affects almost every internet user: online privacy.</p>

<p>This week, Brazos, Tye, and Mario dive deep into the privacy policies of the VPNs you see advertised everywhere—from NordVPN to Surfshark. They uncover the fine print that contradicts the &quot;no-log&quot; promises and reveal how everything from your DNS requests to your credit card payment can instantly de-anonymize you. We also discuss what makes a VPN provider like Mullvad trustworthy in a sea of questionable marketing.</p>

<p>Then, we turn our sights to PII (Personally Identifiable Information) removal services like Incogni and DeleteMe. Are they the silver bullet for data brokers, or are you paying a premium for a service with a less than 50% success rate? The research might shock you.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The &quot;No-Log&quot; Myth: What your VPN provider isn&#39;t telling you.</li>
<li>How paying for a VPN by credit card can compromise your identity.</li>
<li>The surprising ownership structure behind NordVPN and Surfshark.</li>
<li>Shocking research: The 48% success rate and 41% accuracy rate of PII removal services.</li>
<li>A trustworthy alternative: What makes services like Mullvad different?</li>
<li>Data Brokers 101: How they get your information and why it&#39;s so hard to remove.</li>
<li>Why you need to ask yourself what you&#39;re <em>really</em> using a VPN for.</li>
</ul>

<p>Is your online privacy just a product being sold back to you? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>VPN #Cybersecurity #Privacy #NordVPN #Surfshark #DataBroker #OnlineSafety #InfoSec #CybersecurityPodcast #Mullvad</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+jcwb5ynI</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+jcwb5ynI" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
    </item>
    <item>
      <title>Episode 22: The MSP Playbook: Building a Business with Brian Kane</title>
      <link>https://scinary-info-nexus.fireside.fm/22</link>
      <guid isPermaLink="false">3e9e120a-740d-4c4b-bfb6-d80ce1e114ad</guid>
      <pubDate>Fri, 19 Sep 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/3e9e120a-740d-4c4b-bfb6-d80ce1e114ad.mp3" length="97884669" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader.</itunes:subtitle>
      <itunes:duration>1:07:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes.</p>

<p>Join us for an insider&#39;s look into the trenches of the Managed Service Provider (MSP) world. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader. We discuss hilarious war stories about ancient technology, the critical importance of building trust, and why the infamous &quot;Seagull Method&quot; of consulting is so destructive. This episode is a masterclass for anyone looking to start their own IT business or for organizations seeking to find a true technology partner.</p>

<p>In this episode, we discuss:</p>

<p>00:00 - Introducing Brian Kane from Threatdown/Malwarebytes<br>
02:35 - The Journey of Starting Your Own MSP<br>
07:03 - Inventing &quot;SHAPE&quot;: The Precursor to Modern Managed Services<br>
13:13 - War Story: The $3 Million Machine Running on Windows XP<br>
16:21 - The &quot;Seagull Method&quot; of I.T. Consulting<br>
29:34 - The Hard Truth About an MSP&#39;s First Three Years (MRR)<br>
31:23 - The &quot;Dentist Strategy&quot; for Getting Your First Clients<br>
39:28 - Where MSPs REALLY Make Money (Hint: It&#39;s Efficiency)<br>
43:03 - When is it Time to FIRE a Client?<br>
48:33 - The Dangerous Gap Between Client Perception and Reality<br>
55:43 - &quot;The Cloud is Just a Computer Somewhere Else&quot;: The Shared Responsibility Model</p>

<p>If you&#39;ve ever wondered what it takes to survive and thrive in the I.T. services industry, this is the episode for you. Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>MSP #ManagedServiceProvider #Cybersecurity #ITBusiness #SmallBusinessIT #Threatdown #Malwarebytes #TechPodcast #CybersecurityPodcast #Entrepreneurship</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes.</p>

<p>Join us for an insider&#39;s look into the trenches of the Managed Service Provider (MSP) world. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader. We discuss hilarious war stories about ancient technology, the critical importance of building trust, and why the infamous &quot;Seagull Method&quot; of consulting is so destructive. This episode is a masterclass for anyone looking to start their own IT business or for organizations seeking to find a true technology partner.</p>

<p>In this episode, we discuss:</p>

<p>00:00 - Introducing Brian Kane from Threatdown/Malwarebytes<br>
02:35 - The Journey of Starting Your Own MSP<br>
07:03 - Inventing &quot;SHAPE&quot;: The Precursor to Modern Managed Services<br>
13:13 - War Story: The $3 Million Machine Running on Windows XP<br>
16:21 - The &quot;Seagull Method&quot; of I.T. Consulting<br>
29:34 - The Hard Truth About an MSP&#39;s First Three Years (MRR)<br>
31:23 - The &quot;Dentist Strategy&quot; for Getting Your First Clients<br>
39:28 - Where MSPs REALLY Make Money (Hint: It&#39;s Efficiency)<br>
43:03 - When is it Time to FIRE a Client?<br>
48:33 - The Dangerous Gap Between Client Perception and Reality<br>
55:43 - &quot;The Cloud is Just a Computer Somewhere Else&quot;: The Shared Responsibility Model</p>

<p>If you&#39;ve ever wondered what it takes to survive and thrive in the I.T. services industry, this is the episode for you. Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>MSP #ManagedServiceProvider #Cybersecurity #ITBusiness #SmallBusinessIT #Threatdown #Malwarebytes #TechPodcast #CybersecurityPodcast #Entrepreneurship</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes.</p>

<p>Join us for an insider&#39;s look into the trenches of the Managed Service Provider (MSP) world. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader. We discuss hilarious war stories about ancient technology, the critical importance of building trust, and why the infamous &quot;Seagull Method&quot; of consulting is so destructive. This episode is a masterclass for anyone looking to start their own IT business or for organizations seeking to find a true technology partner.</p>

<p>In this episode, we discuss:</p>

<p>00:00 - Introducing Brian Kane from Threatdown/Malwarebytes<br>
02:35 - The Journey of Starting Your Own MSP<br>
07:03 - Inventing &quot;SHAPE&quot;: The Precursor to Modern Managed Services<br>
13:13 - War Story: The $3 Million Machine Running on Windows XP<br>
16:21 - The &quot;Seagull Method&quot; of I.T. Consulting<br>
29:34 - The Hard Truth About an MSP&#39;s First Three Years (MRR)<br>
31:23 - The &quot;Dentist Strategy&quot; for Getting Your First Clients<br>
39:28 - Where MSPs REALLY Make Money (Hint: It&#39;s Efficiency)<br>
43:03 - When is it Time to FIRE a Client?<br>
48:33 - The Dangerous Gap Between Client Perception and Reality<br>
55:43 - &quot;The Cloud is Just a Computer Somewhere Else&quot;: The Shared Responsibility Model</p>

<p>If you&#39;ve ever wondered what it takes to survive and thrive in the I.T. services industry, this is the episode for you. Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>MSP #ManagedServiceProvider #Cybersecurity #ITBusiness #SmallBusinessIT #Threatdown #Malwarebytes #TechPodcast #CybersecurityPodcast #Entrepreneurship</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+3WbyvJ0s</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+3WbyvJ0s" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
    </item>
    <item>
      <title>Episode 21: Cybersecurity Tools of the Trade: Our Top Picks</title>
      <link>https://scinary-info-nexus.fireside.fm/21</link>
      <guid isPermaLink="false">2b9a8eda-03f9-4c17-95bc-5edd793cb6b2</guid>
      <pubDate>Fri, 12 Sep 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2b9a8eda-03f9-4c17-95bc-5edd793cb6b2.mp3" length="65091478" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can't live without.</itunes:subtitle>
      <itunes:duration>44:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can&#39;t live without. From command-line powerhouses to invaluable web utilities, this is the ultimate list of free and open-source tools for both seasoned professionals and aspiring enthusiasts.</p>

<p>Plus, we break down two major developing stories: the Texas AG&#39;s massive lawsuit against PowerSchools over a student data breach and a sophisticated new EDR bypass technique that every defender needs to know about. Stick around to hear why a simple calculator might be one of the most-used tools in our arsenal.</p>

<p>In this episode, we discuss:</p>

<p>00:00 - Intro, Beer Reviews &amp; Upcoming Conferences<br>
05:37 - Texas Sues PowerSchools Over Massive Student Data Breach<br>
14:37 - Can Hackers Bypass Your EDR With Raw Disk Reads?<br>
20:52 - Our Go-To Cybersecurity Tools<br>
22:48 - Richard&#39;s List: Nmap, DNSDumpster, Shodan &amp; More<br>
24:18 - Brazos&#39;s List: MXToolbox, URLscan.io, and... Calculator<br>
29:10 - Mario&#39;s List: CyberChef, 1Password, Wireshark &amp; VSCode<br>
41:12 - Joseph&#39;s List: KASM, Metasploit &amp; the Power of a Good EDR<br>
44:18 - Duty Calls... 🪖</p>

<p>From foundational utilities to advanced analysis platforms, this episode is packed with recommendations to build out your own toolkit. What are your go-to tools? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can&#39;t live without. From command-line powerhouses to invaluable web utilities, this is the ultimate list of free and open-source tools for both seasoned professionals and aspiring enthusiasts.</p>

<p>Plus, we break down two major developing stories: the Texas AG&#39;s massive lawsuit against PowerSchools over a student data breach and a sophisticated new EDR bypass technique that every defender needs to know about. Stick around to hear why a simple calculator might be one of the most-used tools in our arsenal.</p>

<p>In this episode, we discuss:</p>

<p>00:00 - Intro, Beer Reviews &amp; Upcoming Conferences<br>
05:37 - Texas Sues PowerSchools Over Massive Student Data Breach<br>
14:37 - Can Hackers Bypass Your EDR With Raw Disk Reads?<br>
20:52 - Our Go-To Cybersecurity Tools<br>
22:48 - Richard&#39;s List: Nmap, DNSDumpster, Shodan &amp; More<br>
24:18 - Brazos&#39;s List: MXToolbox, URLscan.io, and... Calculator<br>
29:10 - Mario&#39;s List: CyberChef, 1Password, Wireshark &amp; VSCode<br>
41:12 - Joseph&#39;s List: KASM, Metasploit &amp; the Power of a Good EDR<br>
44:18 - Duty Calls... 🪖</p>

<p>From foundational utilities to advanced analysis platforms, this episode is packed with recommendations to build out your own toolkit. What are your go-to tools? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome back to the Scinary Information Nexus! This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can&#39;t live without. From command-line powerhouses to invaluable web utilities, this is the ultimate list of free and open-source tools for both seasoned professionals and aspiring enthusiasts.</p>

<p>Plus, we break down two major developing stories: the Texas AG&#39;s massive lawsuit against PowerSchools over a student data breach and a sophisticated new EDR bypass technique that every defender needs to know about. Stick around to hear why a simple calculator might be one of the most-used tools in our arsenal.</p>

<p>In this episode, we discuss:</p>

<p>00:00 - Intro, Beer Reviews &amp; Upcoming Conferences<br>
05:37 - Texas Sues PowerSchools Over Massive Student Data Breach<br>
14:37 - Can Hackers Bypass Your EDR With Raw Disk Reads?<br>
20:52 - Our Go-To Cybersecurity Tools<br>
22:48 - Richard&#39;s List: Nmap, DNSDumpster, Shodan &amp; More<br>
24:18 - Brazos&#39;s List: MXToolbox, URLscan.io, and... Calculator<br>
29:10 - Mario&#39;s List: CyberChef, 1Password, Wireshark &amp; VSCode<br>
41:12 - Joseph&#39;s List: KASM, Metasploit &amp; the Power of a Good EDR<br>
44:18 - Duty Calls... 🪖</p>

<p>From foundational utilities to advanced analysis platforms, this episode is packed with recommendations to build out your own toolkit. What are your go-to tools? Let us know in the comments!</p>

<hr>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+wXBeqJZI</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+wXBeqJZI" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 20: From Our First Intern to Rival CEO: Hacking with Jason Phillips</title>
      <link>https://scinary-info-nexus.fireside.fm/20</link>
      <guid isPermaLink="false">a0c64b42-d412-4d44-97f3-504f724fa21f</guid>
      <pubDate>Tue, 02 Sep 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a0c64b42-d412-4d44-97f3-504f724fa21f.mp3" length="151516800" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, we go back to our roots and sit down with a very special guest: Jason Phillips, the founder of Mustang Cyber and, once upon a time, the very first intern at Scinary Cybersecurity.</itunes:subtitle>
      <itunes:duration>1:03:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Join us for a journey through the past, present, and future of offensive security. Jason shares his &#39;living off the land&#39; techniques, discusses the very real threat of AI-driven ransomware, and explains why even the most sophisticated EDR solutions might not be enough to stop a determined attacker. Stick around for some hilarious and humbling stories from the scrappy early days of Scinary.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Rise of AI Ransomware: Is your network ready for polymorphic malware?</li>
<li>EDR Evasion: How attackers use simple tools to bypass complex defenses.</li>
<li>Living Off The Land: Exploiting MS SQL and other built-in tools.</li>
<li>The day Richard deleted a client&#39;s <em>entire</em> Active directory.</li>
<li>The &quot;Abraham Lincoln&quot; philosophy for running a successful pen test team.</li>
<li>War stories from physical penetration tests and red team engagements.</li>
</ul>

<p>From disastrous first jobs to building successful companies, this is an episode you don&#39;t want to miss. Let&#39;s discuss.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us for a journey through the past, present, and future of offensive security. Jason shares his &#39;living off the land&#39; techniques, discusses the very real threat of AI-driven ransomware, and explains why even the most sophisticated EDR solutions might not be enough to stop a determined attacker. Stick around for some hilarious and humbling stories from the scrappy early days of Scinary.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Rise of AI Ransomware: Is your network ready for polymorphic malware?</li>
<li>EDR Evasion: How attackers use simple tools to bypass complex defenses.</li>
<li>Living Off The Land: Exploiting MS SQL and other built-in tools.</li>
<li>The day Richard deleted a client&#39;s <em>entire</em> Active directory.</li>
<li>The &quot;Abraham Lincoln&quot; philosophy for running a successful pen test team.</li>
<li>War stories from physical penetration tests and red team engagements.</li>
</ul>

<p>From disastrous first jobs to building successful companies, this is an episode you don&#39;t want to miss. Let&#39;s discuss.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Join us for a journey through the past, present, and future of offensive security. Jason shares his &#39;living off the land&#39; techniques, discusses the very real threat of AI-driven ransomware, and explains why even the most sophisticated EDR solutions might not be enough to stop a determined attacker. Stick around for some hilarious and humbling stories from the scrappy early days of Scinary.</p>

<p>In this episode, we discuss:</p>

<ul>
<li>The Rise of AI Ransomware: Is your network ready for polymorphic malware?</li>
<li>EDR Evasion: How attackers use simple tools to bypass complex defenses.</li>
<li>Living Off The Land: Exploiting MS SQL and other built-in tools.</li>
<li>The day Richard deleted a client&#39;s <em>entire</em> Active directory.</li>
<li>The &quot;Abraham Lincoln&quot; philosophy for running a successful pen test team.</li>
<li>War stories from physical penetration tests and red team engagements.</li>
</ul>

<p>From disastrous first jobs to building successful companies, this is an episode you don&#39;t want to miss. Let&#39;s discuss.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+YpuLWBug</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+YpuLWBug" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
    </item>
    <item>
      <title>Episode 19: Why Your Cybersecurity Bill Is a Ripoff</title>
      <link>https://scinary-info-nexus.fireside.fm/19</link>
      <guid isPermaLink="false">0083e158-6860-483b-8256-3304c769ab18</guid>
      <pubDate>Tue, 26 Aug 2025 08:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/0083e158-6860-483b-8256-3304c769ab18.mp3" length="74930093" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, we're going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity.</itunes:subtitle>
      <itunes:duration>1:18:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, we&#39;re going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they tear apart the industry&#39;s worst business practices.</p>

<p>From bandwidth-based pricing that increases your bill during DDoS attacks to gamified token systems designed to separate you from your money, we&#39;re calling out the vendors who prioritize profit over protection.</p>

<p>🗡️ In this episode, we expose:</p>

<ul>
<li>ClickFix Attacks: Why users keep copying malicious PowerShell commands and how to stop them</li>
<li>Bandwidth Pricing Scams: How your security bill skyrockets when you&#39;re under attack</li>
<li>Token-Based Ripoffs: Why cybersecurity borrowed the worst parts of mobile gaming</li>
<li>Email Security Highway Robbery: Charging for every mailbox whether you need protection or not</li>
<li>The 90-Day Contract Trap: How vendors lock you in with buried renewal clauses</li>
<li>Cost-Plus vs. Predatory: Why simple pricing beats convoluted schemes every time</li>
<li>Network Monitoring vs. EDR: Why you need both for complete protection</li>
</ul>

<p>From Texas Mead Works&#39; finest beverages to exposing vendors who can&#39;t give you a quote without calling France, this episode covers everything wrong with cybersecurity pricing - and how to avoid getting ripped off.</p>

<p><em>&quot;If you can&#39;t tell me what I&#39;m going to pay within 30 minutes, that&#39;s a scam.&quot;</em> - Richard Martin</p>

<hr>

<p>🍯 Featured Mead (Texas Mead Works - not a sponsor, but they should be):</p>

<ul>
<li>Blackberry Melomel</li>
<li>Jalapeño Mead</li>
<li>Dark Wizard</li>
<li>Sweet Honey</li>
</ul>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity #podcast #infosec #sysadmin</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, we&#39;re going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they tear apart the industry&#39;s worst business practices.</p>

<p>From bandwidth-based pricing that increases your bill during DDoS attacks to gamified token systems designed to separate you from your money, we&#39;re calling out the vendors who prioritize profit over protection.</p>

<p>🗡️ In this episode, we expose:</p>

<ul>
<li>ClickFix Attacks: Why users keep copying malicious PowerShell commands and how to stop them</li>
<li>Bandwidth Pricing Scams: How your security bill skyrockets when you&#39;re under attack</li>
<li>Token-Based Ripoffs: Why cybersecurity borrowed the worst parts of mobile gaming</li>
<li>Email Security Highway Robbery: Charging for every mailbox whether you need protection or not</li>
<li>The 90-Day Contract Trap: How vendors lock you in with buried renewal clauses</li>
<li>Cost-Plus vs. Predatory: Why simple pricing beats convoluted schemes every time</li>
<li>Network Monitoring vs. EDR: Why you need both for complete protection</li>
</ul>

<p>From Texas Mead Works&#39; finest beverages to exposing vendors who can&#39;t give you a quote without calling France, this episode covers everything wrong with cybersecurity pricing - and how to avoid getting ripped off.</p>

<p><em>&quot;If you can&#39;t tell me what I&#39;m going to pay within 30 minutes, that&#39;s a scam.&quot;</em> - Richard Martin</p>

<hr>

<p>🍯 Featured Mead (Texas Mead Works - not a sponsor, but they should be):</p>

<ul>
<li>Blackberry Melomel</li>
<li>Jalapeño Mead</li>
<li>Dark Wizard</li>
<li>Sweet Honey</li>
</ul>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity #podcast #infosec #sysadmin</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, we&#39;re going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they tear apart the industry&#39;s worst business practices.</p>

<p>From bandwidth-based pricing that increases your bill during DDoS attacks to gamified token systems designed to separate you from your money, we&#39;re calling out the vendors who prioritize profit over protection.</p>

<p>🗡️ In this episode, we expose:</p>

<ul>
<li>ClickFix Attacks: Why users keep copying malicious PowerShell commands and how to stop them</li>
<li>Bandwidth Pricing Scams: How your security bill skyrockets when you&#39;re under attack</li>
<li>Token-Based Ripoffs: Why cybersecurity borrowed the worst parts of mobile gaming</li>
<li>Email Security Highway Robbery: Charging for every mailbox whether you need protection or not</li>
<li>The 90-Day Contract Trap: How vendors lock you in with buried renewal clauses</li>
<li>Cost-Plus vs. Predatory: Why simple pricing beats convoluted schemes every time</li>
<li>Network Monitoring vs. EDR: Why you need both for complete protection</li>
</ul>

<p>From Texas Mead Works&#39; finest beverages to exposing vendors who can&#39;t give you a quote without calling France, this episode covers everything wrong with cybersecurity pricing - and how to avoid getting ripped off.</p>

<p><em>&quot;If you can&#39;t tell me what I&#39;m going to pay within 30 minutes, that&#39;s a scam.&quot;</em> - Richard Martin</p>

<hr>

<p>🍯 Featured Mead (Texas Mead Works - not a sponsor, but they should be):</p>

<ul>
<li>Blackberry Melomel</li>
<li>Jalapeño Mead</li>
<li>Dark Wizard</li>
<li>Sweet Honey</li>
</ul>

<p>Connect with Scinary Cybersecurity:<br>
<a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>cybersecurity #podcast #infosec #sysadmin</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+V-djJ7Jm</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+V-djJ7Jm" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 18: Incident Response War Stories: How We Stop Real-World Cyberattacks</title>
      <link>https://scinary-info-nexus.fireside.fm/18</link>
      <guid isPermaLink="false">ba9e6eb4-4b5f-4eaa-b55b-52c57c3bf640</guid>
      <pubDate>Tue, 19 Aug 2025 07:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ba9e6eb4-4b5f-4eaa-b55b-52c57c3bf640.mp3" length="129246857" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.</itunes:subtitle>
      <itunes:duration>1:07:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, the beer is flowing and the IR line is ringing off the hook. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they pull back the curtain on the chaotic, non-stop world of Incident Response.</p>

<p>When an attacker is inside your network, every second counts. The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.</p>

<p>In this episode, we expose:</p>

<ul>
<li>The &quot;Oh Sh*t!&quot; Moment: The real stages of Incident Response.</li>
<li>The &quot;ClickFix&quot; Attack: How SEO poisoning tricks users into handing over the keys.</li>
<li>Business Email Compromise (BEC): How one click can infect an entire network.</li>
<li>MFA Isn&#39;t Enough: Bypassing security with Adversary-in-the-Middle proxy attacks.</li>
<li>Your Biggest Weakness: Why misconfigured SSL-VPNs are a gateway for ransomware.</li>
<li>The Great Debate: Who has better logs, Microsoft O365 or Google Workspace?</li>
<li>Portable Executables: The reason &quot;no local admin rights&quot; won&#39;t save you.</li>
<li>Your First Move: What to do (and NOT do) when you find an intruder.</li>
</ul>

<p>From compromised student accounts to brazen attackers who don&#39;t bother hiding their tracks, this is an unfiltered look at what it takes to defend a network.</p>

<hr>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>incidentresponse #cybersecurity #infosec</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, the beer is flowing and the IR line is ringing off the hook. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they pull back the curtain on the chaotic, non-stop world of Incident Response.</p>

<p>When an attacker is inside your network, every second counts. The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.</p>

<p>In this episode, we expose:</p>

<ul>
<li>The &quot;Oh Sh*t!&quot; Moment: The real stages of Incident Response.</li>
<li>The &quot;ClickFix&quot; Attack: How SEO poisoning tricks users into handing over the keys.</li>
<li>Business Email Compromise (BEC): How one click can infect an entire network.</li>
<li>MFA Isn&#39;t Enough: Bypassing security with Adversary-in-the-Middle proxy attacks.</li>
<li>Your Biggest Weakness: Why misconfigured SSL-VPNs are a gateway for ransomware.</li>
<li>The Great Debate: Who has better logs, Microsoft O365 or Google Workspace?</li>
<li>Portable Executables: The reason &quot;no local admin rights&quot; won&#39;t save you.</li>
<li>Your First Move: What to do (and NOT do) when you find an intruder.</li>
</ul>

<p>From compromised student accounts to brazen attackers who don&#39;t bother hiding their tracks, this is an unfiltered look at what it takes to defend a network.</p>

<hr>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>incidentresponse #cybersecurity #infosec</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, the beer is flowing and the IR line is ringing off the hook. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they pull back the curtain on the chaotic, non-stop world of Incident Response.</p>

<p>When an attacker is inside your network, every second counts. The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.</p>

<p>In this episode, we expose:</p>

<ul>
<li>The &quot;Oh Sh*t!&quot; Moment: The real stages of Incident Response.</li>
<li>The &quot;ClickFix&quot; Attack: How SEO poisoning tricks users into handing over the keys.</li>
<li>Business Email Compromise (BEC): How one click can infect an entire network.</li>
<li>MFA Isn&#39;t Enough: Bypassing security with Adversary-in-the-Middle proxy attacks.</li>
<li>Your Biggest Weakness: Why misconfigured SSL-VPNs are a gateway for ransomware.</li>
<li>The Great Debate: Who has better logs, Microsoft O365 or Google Workspace?</li>
<li>Portable Executables: The reason &quot;no local admin rights&quot; won&#39;t save you.</li>
<li>Your First Move: What to do (and NOT do) when you find an intruder.</li>
</ul>

<p>From compromised student accounts to brazen attackers who don&#39;t bother hiding their tracks, this is an unfiltered look at what it takes to defend a network.</p>

<hr>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a><br>
<a href="https://www.linkedin.com/company/scinarycyber/" rel="nofollow">https://www.linkedin.com/company/scinarycyber/</a></p>

<h1>incidentresponse #cybersecurity #infosec</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+nwEGqrza</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+nwEGqrza" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 17: Revenge Hacking: Justice or Just Illegal?</title>
      <link>https://scinary-info-nexus.fireside.fm/17</link>
      <guid isPermaLink="false">b58d758d-0171-4d27-b1a6-2c014b459a41</guid>
      <pubDate>Mon, 11 Aug 2025 00:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/b58d758d-0171-4d27-b1a6-2c014b459a41.mp3" length="114439048" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to "hack back". When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism?</itunes:subtitle>
      <itunes:duration>59:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to &quot;hack back&quot;</p>

<p>When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.</p>

<p>In this episode, we expose:</p>

<ul>
<li>The &quot;Burn the House Down&quot; Dilemma</li>
<li>Offensive Security vs. Revenge Hacking: What&#39;s the difference?</li>
<li>The Attribution Problem: Who are you <em>really</em> attacking?</li>
<li>Collateral Damage &amp; Poking the Nation-State Bear</li>
<li>Why Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)</li>
<li>Real-World Examples: Stuxnet, Microsoft, and the Government</li>
<li>Why &quot;Cyber-Batman&quot; Has No Jurisdiction</li>
</ul>

<p>Is taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a></p>

<h1>OffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON</h1>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to &quot;hack back&quot;</p>

<p>When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.</p>

<p>In this episode, we expose:</p>

<ul>
<li>The &quot;Burn the House Down&quot; Dilemma</li>
<li>Offensive Security vs. Revenge Hacking: What&#39;s the difference?</li>
<li>The Attribution Problem: Who are you <em>really</em> attacking?</li>
<li>Collateral Damage &amp; Poking the Nation-State Bear</li>
<li>Why Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)</li>
<li>Real-World Examples: Stuxnet, Microsoft, and the Government</li>
<li>Why &quot;Cyber-Batman&quot; Has No Jurisdiction</li>
</ul>

<p>Is taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a></p>

<h1>OffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON</h1>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to &quot;hack back&quot;</p>

<p>When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.</p>

<p>In this episode, we expose:</p>

<ul>
<li>The &quot;Burn the House Down&quot; Dilemma</li>
<li>Offensive Security vs. Revenge Hacking: What&#39;s the difference?</li>
<li>The Attribution Problem: Who are you <em>really</em> attacking?</li>
<li>Collateral Damage &amp; Poking the Nation-State Bear</li>
<li>Why Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)</li>
<li>Real-World Examples: Stuxnet, Microsoft, and the Government</li>
<li>Why &quot;Cyber-Batman&quot; Has No Jurisdiction</li>
</ul>

<p>Is taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let&#39;s discuss.</p>

<hr>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a></p>

<h1>OffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON</h1>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+llGgvogI</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+llGgvogI" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Tye Valdis</podcast:person>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 16: The Dark Side of Venture Capital</title>
      <link>https://scinary-info-nexus.fireside.fm/16</link>
      <guid isPermaLink="false">fa4df968-97f3-4dae-94d9-0dfdbe36b9cd</guid>
      <pubDate>Fri, 08 Aug 2025 21:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/fa4df968-97f3-4dae-94d9-0dfdbe36b9cd.mp3" length="119184529" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.

Is the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people's money? Join the discussion.</itunes:subtitle>
      <itunes:duration>1:02:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we&#39;re on camera to pull back the curtain on one of the tech world&#39;s most powerful and misunderstood forces: Venture Capital.</p>

<p>Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.</p>

<p>We expose:</p>

<ul>
<li>The VC Gamble</li>
<li>Is Your Pension at Risk?</li>
<li>The TikTok Ban Hypocrisy</li>
<li>Hype Over Diligence</li>
<li>Exit Strategy Over Everything</li>
<li>The Transparency Black Hole</li>
</ul>

<p>Is the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people&#39;s money? Join the discussion.</p>

<hr>

<p>This episode is proudly sponsored by:</p>

<p><em>Southern Roots Brewing Company:</em> A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!</p>

<p><em>AdiraNow:</em> The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton&#39;s!).</p>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we&#39;re on camera to pull back the curtain on one of the tech world&#39;s most powerful and misunderstood forces: Venture Capital.</p>

<p>Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.</p>

<p>We expose:</p>

<ul>
<li>The VC Gamble</li>
<li>Is Your Pension at Risk?</li>
<li>The TikTok Ban Hypocrisy</li>
<li>Hype Over Diligence</li>
<li>Exit Strategy Over Everything</li>
<li>The Transparency Black Hole</li>
</ul>

<p>Is the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people&#39;s money? Join the discussion.</p>

<hr>

<p>This episode is proudly sponsored by:</p>

<p><em>Southern Roots Brewing Company:</em> A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!</p>

<p><em>AdiraNow:</em> The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton&#39;s!).</p>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we&#39;re on camera to pull back the curtain on one of the tech world&#39;s most powerful and misunderstood forces: Venture Capital.</p>

<p>Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.</p>

<p>We expose:</p>

<ul>
<li>The VC Gamble</li>
<li>Is Your Pension at Risk?</li>
<li>The TikTok Ban Hypocrisy</li>
<li>Hype Over Diligence</li>
<li>Exit Strategy Over Everything</li>
<li>The Transparency Black Hole</li>
</ul>

<p>Is the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people&#39;s money? Join the discussion.</p>

<hr>

<p>This episode is proudly sponsored by:</p>

<p><em>Southern Roots Brewing Company:</em> A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!</p>

<p><em>AdiraNow:</em> The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton&#39;s!).</p>

<p>Connect with Scinary Cybersecurity:</p>

<p><a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a><br>
<a href="https://x.com/scinarycyber" rel="nofollow">https://x.com/scinarycyber</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+qXA-gb6u</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+qXA-gb6u" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="" role="host">Brazos Wortham</podcast:person>
      <podcast:person email="" href="" role="host">Richard Martin</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 15: Recall, Copilot and Your Data Security</title>
      <link>https://scinary-info-nexus.fireside.fm/15</link>
      <guid isPermaLink="false">038955cd-c502-4083-8336-a40a3a2057e7</guid>
      <pubDate>Fri, 25 Jul 2025 16:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/038955cd-c502-4083-8336-a40a3a2057e7.mp3" length="111709576" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>58:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>In this episode we discuss Microsoft&#39;s implementation of AI in the form of Copilot and Recall.  We also drink beer from Southern Roots Brewing Company in Waco, Texas. <a href="https://southernrootsbrewingco.com/" rel="nofollow">https://southernrootsbrewingco.com/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode we discuss Microsoft&#39;s implementation of AI in the form of Copilot and Recall.  We also drink beer from Southern Roots Brewing Company in Waco, Texas. <a href="https://southernrootsbrewingco.com/" rel="nofollow">https://southernrootsbrewingco.com/</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In this episode we discuss Microsoft&#39;s implementation of AI in the form of Copilot and Recall.  We also drink beer from Southern Roots Brewing Company in Waco, Texas. <a href="https://southernrootsbrewingco.com/" rel="nofollow">https://southernrootsbrewingco.com/</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+O-wUnZEa</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+O-wUnZEa" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 14: TikTok, TikTok</title>
      <link>https://scinary-info-nexus.fireside.fm/14</link>
      <guid isPermaLink="false">c8645d7e-3d08-4373-a5a8-035cf6eafce9</guid>
      <pubDate>Fri, 18 Jul 2025 06:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c8645d7e-3d08-4373-a5a8-035cf6eafce9.mp3" length="98798309" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>In this episode we discuss the absurdity of politicians fascination with TikTok</itunes:subtitle>
      <itunes:duration>51:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+7FAlUHl3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+7FAlUHl3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 13: Is it a Pen Test or a Pen Test?</title>
      <link>https://scinary-info-nexus.fireside.fm/13</link>
      <guid isPermaLink="false">a43ed1ca-0fbb-4b00-9074-31847ec90f1c</guid>
      <pubDate>Fri, 11 Jul 2025 14:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a43ed1ca-0fbb-4b00-9074-31847ec90f1c.mp3" length="88188512" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>We discuss the varying definitions of penetration testing and what to look for in a pen test.</itunes:subtitle>
      <itunes:duration>1:01:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+vOq5mmu3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+vOq5mmu3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 12: Your Cybersecurity Insurance is Judging You</title>
      <link>https://scinary-info-nexus.fireside.fm/12</link>
      <guid isPermaLink="false">60d1967d-df60-4e83-91df-87bc847baafd</guid>
      <pubDate>Fri, 27 Jun 2025 14:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/60d1967d-df60-4e83-91df-87bc847baafd.mp3" length="67120160" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>We discuss cybersecurity insurance and our opinions on the industry</itunes:subtitle>
      <itunes:duration>46:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+-otkfxMp</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+-otkfxMp" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 11: Our Take on Cybersecurity Jobs</title>
      <link>https://scinary-info-nexus.fireside.fm/11</link>
      <guid isPermaLink="false">8efde36f-5ac8-4561-8cf5-fbdc78e4abcd</guid>
      <pubDate>Fri, 06 Jun 2025 14:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/8efde36f-5ac8-4561-8cf5-fbdc78e4abcd.mp3" length="79637942" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:duration>1:22:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>In this episode, we drink beer and tell you what we really think about cybersecurity career paths.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we drink beer and tell you what we really think about cybersecurity career paths.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In this episode, we drink beer and tell you what we really think about cybersecurity career paths.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+KM2DsluB</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+KM2DsluB" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 10: Acronym Hell</title>
      <link>https://scinary-info-nexus.fireside.fm/10</link>
      <guid isPermaLink="false">633724c7-99ee-4c23-957c-da57587e4095</guid>
      <pubDate>Fri, 30 May 2025 13:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/633724c7-99ee-4c23-957c-da57587e4095.mp3" length="30325446" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>In this episode we explore the ridiculousness that are acronyms in cybersec.</itunes:subtitle>
      <itunes:duration>31:35</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+WXuoSPOk</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+WXuoSPOk" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 9: We put the government in its place...kinda.</title>
      <link>https://scinary-info-nexus.fireside.fm/9</link>
      <guid isPermaLink="false">c4edb9d0-92ac-4e03-a8db-b96b43d2bb81</guid>
      <pubDate>Fri, 16 May 2025 14:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c4edb9d0-92ac-4e03-a8db-b96b43d2bb81.mp3" length="49335066" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>We go into the role of government in cybersecurity, drink a new beer, and talk about recent event in the ransomware space.</itunes:subtitle>
      <itunes:duration>51:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <itunes:keywords>government, cybersecurity, IT, fun, Scinary, Information, nexus</itunes:keywords>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+Lgwwa69E</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+Lgwwa69E" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 8: One year later</title>
      <link>https://scinary-info-nexus.fireside.fm/8</link>
      <guid isPermaLink="false">899d4e80-e684-48a6-a91a-8f134aab375a</guid>
      <pubDate>Fri, 09 May 2025 14:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/899d4e80-e684-48a6-a91a-8f134aab375a.mp3" length="54775222" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>We've done some things... I promise.</itunes:subtitle>
      <itunes:duration>57:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <itunes:keywords>Cybersecurity, Cyber, tech, fun, security, Ransomware, attack chains, malware, AI</itunes:keywords>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+DlDsMJyh</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+DlDsMJyh" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 7: Vault7: Part 2</title>
      <link>https://scinary-info-nexus.fireside.fm/7</link>
      <guid isPermaLink="false">9fd99aec-5c6e-4f47-a541-a104d211d80d</guid>
      <pubDate>Mon, 10 Apr 2023 14:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/9fd99aec-5c6e-4f47-a541-a104d211d80d.mp3" length="76878141" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>Continuation our talk about the Vault 7 leak and what the C.I.A. used for their clandestine information gathering. We get into the details of each part of the leak and give our ample conjecture on what that may mean for the Cybersecurity industry today.</itunes:subtitle>
      <itunes:duration>42:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Part 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it&#39;s a few years too late.</p>]]>
      </description>
      <itunes:keywords>Vault7, leaks, cybersecurity, cyber, security, tech, fun</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Part 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it&#39;s a few years too late.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Part 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it&#39;s a few years too late.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+48rPf0iW</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+48rPf0iW" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 6: Vault7: Part 1</title>
      <link>https://scinary-info-nexus.fireside.fm/6</link>
      <guid isPermaLink="false">c4bc39ca-ed64-4ea4-a5d6-8b6f9d26614f</guid>
      <pubDate>Wed, 22 Feb 2023 15:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c4bc39ca-ed64-4ea4-a5d6-8b6f9d26614f.mp3" length="89674893" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>Today we talk about the Vault 7 leak and what the C.I.A. used for their clandestine information gathering. We get into the details of each part of the leak and give our ample conjecture on what that may mean for the Cybersecurity industry today.</itunes:subtitle>
      <itunes:duration>48:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it&#39;s a few years too late.</p>]]>
      </description>
      <itunes:keywords>Vault7, leaks, cybersecurity, cyber, security, tech, fun</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it&#39;s a few years too late.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it&#39;s a few years too late.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+4uX1f27v</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+4uX1f27v" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 5: PenTesting with Jason Phillips</title>
      <link>https://scinary-info-nexus.fireside.fm/5</link>
      <guid isPermaLink="false">3e6c8f66-5e6f-4c24-b3b4-1caf92b682ca</guid>
      <pubDate>Mon, 28 Nov 2022 14:00:00 -0600</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/3e6c8f66-5e6f-4c24-b3b4-1caf92b682ca.mp3" length="71855301" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>A conversation with the CEO of Mustang Cyber and our very own Director of Operations Tye Valdis.</itunes:subtitle>
      <itunes:duration>44:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>On this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they&#39;ve experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.</p>

<p>Mustang Cyber: <a href="https://mustangcyber.com" rel="nofollow">https://mustangcyber.com</a></p>

<p>Scinary Cybersecurity: <a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a></p>]]>
      </description>
      <itunes:keywords>Cybersecurity, tech, cyber, security, penetration test, pentest, red team, Mustang Cyber, Scinary, fun, experts, vulnerability, assessments, cyber auditing</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>On this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they&#39;ve experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.</p>

<p>Mustang Cyber: <a href="https://mustangcyber.com" rel="nofollow">https://mustangcyber.com</a></p>

<p>Scinary Cybersecurity: <a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a></p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>On this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they&#39;ve experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.</p>

<p>Mustang Cyber: <a href="https://mustangcyber.com" rel="nofollow">https://mustangcyber.com</a></p>

<p>Scinary Cybersecurity: <a href="https://www.scinary.com" rel="nofollow">https://www.scinary.com</a></p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+FOgP0xrU</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+FOgP0xrU" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 4: Ant Catalogue/Conspiracy Theories</title>
      <link>https://scinary-info-nexus.fireside.fm/4</link>
      <guid isPermaLink="false">cbd9a7ce-342e-4e08-a70f-f92e01590f69</guid>
      <pubDate>Mon, 19 Sep 2022 17:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/cbd9a7ce-342e-4e08-a70f-f92e01590f69.mp3" length="102918669" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>We take a dive into the world of Advanced Persistent Threat actors as we look at Nation State actors and their capabilities. We'll look at the NSA A.N.T. catalogue and see if we can't shine a little light on the shadow organizations of the world.</itunes:subtitle>
      <itunes:duration>57:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Fair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It&#39;s a conspiracy nut convention and we&#39;re the squirrels. Come joing us on this fun ride into state threat actors.</p>]]>
      </description>
      <itunes:keywords>conspiracy, cybersecurity, cyber, technology, tech, security, government, networking, fun, gadgets, spy</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Fair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It&#39;s a conspiracy nut convention and we&#39;re the squirrels. Come joing us on this fun ride into state threat actors.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Fair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It&#39;s a conspiracy nut convention and we&#39;re the squirrels. Come joing us on this fun ride into state threat actors.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+krKtJt3n</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+krKtJt3n" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 3: *BACK TO SCHOOL SPECIAL*</title>
      <link>https://scinary-info-nexus.fireside.fm/3</link>
      <guid isPermaLink="false">589ad254-87db-460b-b840-e2919e0063d4</guid>
      <pubDate>Wed, 07 Sep 2022 18:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/589ad254-87db-460b-b840-e2919e0063d4.mp3" length="53219622" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>Our managing partner of Sales and Co-founder of Scinary Cybersecurity, Richard Martin, gives an honest assessment of the things tech departments in K-12 education can do to help secure themselves in today's threat landscape.</itunes:subtitle>
      <itunes:duration>55:26</itunes:duration>
      <itunes:explicit>true</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[<p>Introducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he&#39;s a man who speaks his mind and the filter doesn&#39;t always stay on. That being said, we had a few slip ups in the obscene language department, but we&#39;re talking about things that can destroy lives and organizations. Our boss don&#39;t play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, cyber, tech, security, back to school, k-12, advice</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Introducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he&#39;s a man who speaks his mind and the filter doesn&#39;t always stay on. That being said, we had a few slip ups in the obscene language department, but we&#39;re talking about things that can destroy lives and organizations. Our boss don&#39;t play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Introducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he&#39;s a man who speaks his mind and the filter doesn&#39;t always stay on. That being said, we had a few slip ups in the obscene language department, but we&#39;re talking about things that can destroy lives and organizations. Our boss don&#39;t play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+-UOQJmCk</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+-UOQJmCk" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 2: Intern Insights</title>
      <link>https://scinary-info-nexus.fireside.fm/2</link>
      <guid isPermaLink="false">ef80115e-cd37-464a-8e99-e29f44f88e28</guid>
      <pubDate>Mon, 08 Aug 2022 15:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ef80115e-cd37-464a-8e99-e29f44f88e28.mp3" length="46342269" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>a conversation with our new batch of interns asking them what they've learned and where they might go next.</itunes:subtitle>
      <itunes:duration>31:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <itunes:keywords>scinary, cybersecurity, nerd, security, information, nexus, tech, cyber, intern, insights</itunes:keywords>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+gUKT9dJN</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+gUKT9dJN" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Episode 1: P@ssw0rd!</title>
      <link>https://scinary-info-nexus.fireside.fm/1</link>
      <guid isPermaLink="false">2e53fce6-3dcb-4e6d-8d68-8bed3fceaea0</guid>
      <pubDate>Mon, 08 Aug 2022 15:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2e53fce6-3dcb-4e6d-8d68-8bed3fceaea0.mp3" length="51058797" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>a brief overview of passwords, why they frustrate us, what we should do about it, and what might happen to them in the future.</itunes:subtitle>
      <itunes:duration>29:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <itunes:keywords>scinary, cybersecurity, nerd, security, information, nexus, tech, cyber, password</itunes:keywords>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+55rOig0Z</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+55rOig0Z" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
    <item>
      <title>Introduction to the Scinary Information Nexus</title>
      <link>https://scinary-info-nexus.fireside.fm/intro</link>
      <guid isPermaLink="false">c6c29777-1172-4e4b-9f72-64ff3ba2ed4b</guid>
      <pubDate>Mon, 08 Aug 2022 15:00:00 -0500</pubDate>
      <author>info@scinary.com (Scinary Cybersecurity)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c6c29777-1172-4e4b-9f72-64ff3ba2ed4b.mp3" length="11608077" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Scinary Cybersecurity</itunes:author>
      <itunes:subtitle>An introduction to your hosts Joe and Mario. Come join us as we learn from industry experts and our peers about what it means to work in cybersecurity and what to keep an eye on in the future.</itunes:subtitle>
      <itunes:duration>7:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"/>
      <description>
        <![CDATA[]]>
      </description>
      <itunes:keywords>scinary, cybersecurity, nerd, security, information, nexus, tech, cyber, intro, introduction</itunes:keywords>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/dnQJ2FcE+JIBW9OXN</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/dnQJ2FcE+JIBW9OXN" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Mario Ortiz</podcast:person>
      <podcast:person email="" href="https://www.nexus.scinary.com" role="host">Joseph Hamilton</podcast:person>
    </item>
  </channel>
</rss>
