Join reformed CTO James Wilson as he dives deep on cybersecurity topics through an enterprise lens. From solo content and interviews with CISOs and researchers to vendor and startup deep dives, James does a bit of everything.

Hosts

  • James Wilson

Copyright Risky Business Media 2007-2026

Recent reviews on Apple Podcasts (1)
  • Top notch work

    Excellent addition to the Risky podcasts

    Laughedoutloud ·

View all reviews on Apple Podcasts

Episodes (20)

  1. What a great agentic AI deployment plan looks like

    May 12, 202639m

    In this podcast James Wilson and Brad Arkin workshop the advice they think the industry needs to hear when it comes to deploying agentic AI in the enterprise. Relegating agentic AI to non-sensitive and low-risk tasks doe

  2. Mythos smythos! How to find 0day with lesser models

    May 8, 20261h 27m

    In this podcast James Wilson chats with Niels Provos about his research into using older AI models to successfully hunt for 0day vulnerabilities. Niels has had a long and prolific career in cybersecurity, having worked a

  3. Solving the AI agent identity problem

    May 4, 202640m

    In this podcast James Wilson and Brad Arkin chat about emerging trends in AI agent identity and credential management. Brad was formerly the CISO of Adobe, Cisco and Salesforce, and is now working with all sorts of compa

  4. A deep dive on AI model distillation attacks

    Apr 29, 20261h 12m

    In this solo episode of Risky Business Features James Wilson explores how distillation techniques are both a legitimate way to train smaller models, as well as a way to steal model capabilities. It’s not just a problem f

  5. Feature Interview: Nicholas Carlini, Anthropic

    Apr 24, 202642m

    In this episode, Anthropic’s Nicholas Carlini joins Patrick Gray and James Wilson to talk about advancements in AI-driven vulnerability research and exploit development. Nicholas’ talk at the recent [un]prompted conferen

  6. A builder's perspective on Mythos and frontier models

    Apr 20, 202632m

    In this episode, James Wilson is joined by entrepreneur and investor Yaniv Bernstein to discuss Anthropic’s Mythos through the lens of startups and growing businesses. Yaniv is Google’s former VP of Engineering, and is f

  7. Mythos and 0day: Fixing exploits is not safety

    Apr 17, 202621m

    In this episode, James Wilson is joined by Brad Arkin who provides a CISO’s perspective on Anthropic’s Mythos. As former CISO at Adobe, Cisco and Salesforce, Brad’s perspective challenges the notion that finding and fixi

  8. Mythos and 0day: A hacker’s perspective

    Apr 13, 202632m

    In this episode of Risky Business Features, James Wilson chats to professional hacker Jamieson O’Reilly about Anthropic’s Mythos and the impact it could have on offensive security. Jamieson is CEO of DVULN and co-founder

  9. What happens after North Korea infiltrates?

    Apr 8, 202651m

    In this episode, investigative journalist Geoff White joins James Wilson for a look into the complex machine that is North Korea’s IT worker infiltration scheme. They discuss the interview process, what happens once the

  10. Why CISOs need to be more flexible in the AI era

    Apr 3, 202618m

    In this episode, James Wilson chats with Brad Arkin (former CISO of Adobe, Cisco and Salesforce) to talk about the mounting pressure that CISOs are under in the AI era. Attackers are operating at unprecedented scale, and

  11. A Risky Biz Experiment: Hunting for iOS 0day with AI

    Mar 31, 202656m

    In this sort-of-solo episode, James Wilson is “joined” by one of his OpenClaw AI agents for a chat about whether or not an LLM can understand, modify or even create a sophisticated nation-state grade iOS exploit kit. Tec

  12. Interview: Former NSA and CIA cyber leaders on offensive AI

    Mar 27, 202615m

    In this interview you’ll hear former NSA executive Rob Joyce and former CIA cyber intelligence leader Andy Boyd talk to host Patrick Gray about how AI is changing the state of art in offensive security. Recorded in front

  13. When disaster strykes

    Mar 23, 202640m

    In this episode of Risky Business Features, James Wilson and Brad Arkin discuss the attack that devastated medtech company Stryker. It turns out the attackers used Microsoft’s inTune to wipe the company’s devices, but wh

  14. MCP is Dead

    Mar 18, 202636m

    James Wilson delivers his take on the state of the Model Context Protocol (MCP) in this solo episode of Risky Business Features. Despite MCP being the technology that made Large Language Models useful and AI Agents possi

  15. They don't break in, they log in. What's an enterprise to do?

    Mar 12, 202632m

    In this podcast James Wilson chats with Brad Arkin about how enterprises can better deal with attackers logging in with valid credentials. Stolen identities, weak special-use credentials, and over-scoped API keys are the

  16. A ridiculously deep dive into the Coruna Exploits

    Mar 11, 20261h 17m

    Join James Wilson in this solo podcast as he takes a (ridiculously) deep dive into the Coruna exploit kit. James was a software engineer and senior manager at Apple for many years, so he has an intimate knowledge of iOS

  17. Being a wartime CISO

    Mar 6, 202631m

    In this edition of Risky Business Features James Wilson chats with cohost Brad Arkin about what it’s like being a CISO for a global company when a war starts. How do you deal with a branch office full of important key ma

  18. What to do about North Korean remote workers

    Feb 27, 202627m

    In this podcast James Wilson chats with Brad Arkin about North Korea’s sprawling fake IT worker ecosystem. From fake interviews, to stolen identities, basement laptop farms and IP-KVM tricks, the North Koreans are operat

  19. Former Adobe, Cisco and Salesforce CISO talks AI pentesting

    Feb 19, 202625m

    In this debut feature conversation in the Risky Business Features feed James Wilson sits down with Brad Arkin, the former CSO of Adobe, Cisco, and Salesforce, to talk all about AI pentesting. Finding and fixing bugs is g

  20. History Repeats: Security in the AI Agent Era

    Feb 17, 202629m

    AI agents are being deployed with the same trust-by-default architecture the early internet had. Same mistakes, MUCH faster timeline. OpenClaw has hit 180K+ GitHub stars. But in the past week: 341 malicious skills on Cla