loader from loading.io
AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA’s Nick Andersen show art AI-Orchestrated Cyber Espionage and the Future of Cyber Defense with CISA’s Nick Andersen

Cyber Focus

AI is speeding up cyber operations and shrinking the window for defenders to respond. Nick Andersen, who leads CISA’s Cybersecurity Division, explains why Anthropic’s recent report caught attention: it described what Anthropic called the first publicly reported AI-orchestrated cyber espionage campaign, in which threat actors misused its Claude models to automate and scale parts of an intrusion. Andersen and Frank Cilluffo unpack what that signal means for resilience, from model safeguards to the infrastructure and people surrounding them. They apply secure-by-design thinking to frontier...

info_outline
Revisiting Offensive Cyber Discussion with Adm. Mike Rogers (Ret.) show art Revisiting Offensive Cyber Discussion with Adm. Mike Rogers (Ret.)

Cyber Focus

In this re-releases episode of Cyber Focus, host Frank Cilluffo sits down with Admiral Mike Rogers (Ret.), former Commander of U.S. Cyber Command and Director of the National Security Agency. Rogers shares insights from his leadership across two administrations, discussing offensive cyber operations, the evolution of Cyber Command, and pressing national security challenges. The conversation spans from undersea cable vulnerabilities to public-private integration, the future of quantum and AI, and the enduring need for clarity in cyber policy. A decorated Auburn alum, Rogers reflects on...

info_outline
The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting show art The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting

Cyber Focus

Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent “accidental” disruptions and growing geopolitical risk. Listeners hear why chokepoints, island dependencies, and hotspots from the Red Sea to the Taiwan Strait keep national security officials up at night. The conversation also explores how redundancy, smarter investigations, and faster permitting can harden this hidden backbone against both...

info_outline
The Army’s “No Fail” Cyber Mission with Brandon Pugh show art The Army’s “No Fail” Cyber Mission with Brandon Pugh

Cyber Focus

Army Principal Cyber Advisor Brandon Pugh joins Frank Cilluffo to address a stark reality: if critical infrastructure fails, the Army cannot mobilize. To meet this “no fail” mission, Pugh explains how the service is aggressively merging cyber with electronic warfare and cutting red tape to field new technology in days rather than years. They also discuss the Army’s unique edge in this digital fight—Reservists who bring high-level private sector expertise directly to the battlefield. The conversation also explores how AI and operational technology are reshaping the Army’s cyber...

info_outline
Inside State Cyber Defense: Whole-of-State Security with Alabama's Daniel Urquhart and Chad Smith show art Inside State Cyber Defense: Whole-of-State Security with Alabama's Daniel Urquhart and Chad Smith

Cyber Focus

State and local governments are stepping up to defend critical services against fast-evolving cyber threats. In this episode of Cyber Focus, Alabama’s top IT leaders show how they’re staying ahead of the curve. They explain how a hybrid, highly decentralized environment forces them to lean on shared standards, SLCGP funding, and whole-of-state partnerships. Along the way, they unpack a recent incident that came dangerously close to crisis and what it revealed about tools, visibility, and trust. They also look ahead to AI-enabled attacks, deepfakes, and “distortion,” and why automation...

info_outline
The Hidden Dangers in Your Supply Chain with SecurityScorecard's Aleksandr Yampolskiy show art The Hidden Dangers in Your Supply Chain with SecurityScorecard's Aleksandr Yampolskiy

Cyber Focus

SecurityScorecard CEO Aleksandr Yampolskiy joins Cyber Focus to warn that third-party risk is now the dominant cybersecurity epidemic. With just 150 companies responsible for 90% of the global attack surface, a single compromise can ripple across sectors and continents. He and host Frank Cilluffo explore the cascading risks of software dependencies, fourth- and fifth-party exposure, and the challenges of shadow IT and shadow AI. Yampolskiy outlines where companies fall short on governance and calls for outcome-driven oversight, not just busywork. They also discuss how AI can be both a...

info_outline
CVE at a Crossroads: Global Standards, Local Failures, and What Comes Next with Nick Leiserson show art CVE at a Crossroads: Global Standards, Local Failures, and What Comes Next with Nick Leiserson

Cyber Focus

Cybersecurity veteran joins Cyber Focus this week to break down critical governance gaps in the Common Vulnerabilities and Exposures (CVE) system and what’s at stake if they’re not fixed. He and host Frank Cilluffo explore the risks of global fragmentation, the lingering fallout from the F5 breach, and why policy tools like Executive Order 14028 remain stalled. Leiserson warns that the U.S. court system faces an under-the-radar cyber crisis, and shares specific, actionable funding priorities Congress should tackle now. From software supply chain failures to operational coordination gaps,...

info_outline
Code Red: Breaking Down China’s Cyber Offensive—Volt, Salt, and Flax Typhoon show art Code Red: Breaking Down China’s Cyber Offensive—Volt, Salt, and Flax Typhoon

Cyber Focus

What do Volt Typhoon, Salt Typhoon, and Flax Typhoon reveal about China's cyber playbook? This episode of Cyber Focus breaks down a new McCrary Institute report on China’s advanced persistent threat campaigns—and what they mean for U.S. national security. Frank Cilluffo sits down with Mark Montgomery, Brad Medairy, and Bill Evanina to explain how China is embedding itself in American infrastructure, telecom, and data systems. They warn that Beijing is laying the groundwork for future conflict and that the U.S. response has been dangerously slow. The guests call for stronger deterrence,...

info_outline
Fuel, Force, and the Frontlines: Critical Infrastructure in Conflict with Chris Cleary show art Fuel, Force, and the Frontlines: Critical Infrastructure in Conflict with Chris Cleary

Cyber Focus

What if the easiest way to disrupt U.S. military operations isn’t with missiles—but by targeting fuel logistics? In this episode, Chris Cleary explains how civilian infrastructure has become a frontline in national defense. He and Frank Cilluffo discuss how adversaries exploit cyber vulnerabilities to slow military response, and why deterrence requires more than just rhetoric. They unpack the case for a dedicated Cyber Force, the suprising way Chris thinks it should be structured, and the challenges of coordinating across government and industry. With prepositioned threats like Volt...

info_outline
Cyber Force, ROI, and the Case for Reform with Ed Cardon & Josh Stiefel show art Cyber Force, ROI, and the Case for Reform with Ed Cardon & Josh Stiefel

Cyber Focus

Should the U.S. have a dedicated Cyber Force? In this episode, General Ed Cardon and Josh Stiefel examine persistent gaps in the nation’s cyber posture, from undefined mission boundaries to unclear return on billions in cyber spending. They explore the organizational tradeoffs, workforce realities, and coordination challenges that have stalled progress, despite years of warnings. With host Frank Cilluffo, they unpack what it would take to move beyond patchwork solutions. Main Topics Covered The failure of past “wake-up calls” to drive meaningful cyber reform Gaps in command,...

info_outline
 
More Episodes

In this episode of Cyber Focus, host Frank Cilluffo speaks with Ambassador Toby Feakin, Australia’s first Ambassador for Cyber Affairs and Critical Technologies. Feakin reflects on the evolving cyber threat landscape in the Asia-Pacific region, Australia's cybersecurity strategy, and its growing focus on balancing economic ties with China while addressing critical security risks. The conversation delves into Australia’s international partnerships, public attribution of cyber threats, and critical infrastructure protection. Feakin also shares insights into his role in spearheading Australia's cyber policy and the future of technological leadership in quantum computing, AI, and supply chain security.

Main Topics Covered:

  • Australia’s evolving cybersecurity strategy and public attribution of threats like the Cloud Hopper incident
  • The balance between economic ties with China and cybersecurity risks
  • International partnerships with Five Eyes and regional players like South Korea and Japan
  • Critical infrastructure protection, including undersea cables and cyber-kinetic threats
  • The significance of China's pre-positioning cyberattacks
  • Emerging technologies, including AI, quantum computing, and their impact on geopolitics
  • Feakin’s role in shaping Australia’s cyber diplomacy and international engagement

Key Quotes:

"Something that Australia continually has to balance is this kind of multifaceted relationship with China... it's balancing the economic ties that you have with such a behemoth in the Asia-Pacific and globally, economically, alongside a growing understanding of security risk." - Toby Feakin

"[China's pre-positioning] absolutely should concern not just other governments, but it should concern industry because they are the guys... who own and operate a majority of infrastructure and they need to know clearly that's the level of threat they're dealing with." - Toby Feakin

"If you look at that tech convergence, you cannot afford to sit still for one second because it's all moving such a fast rate that even the developers themselves have no idea where this journey is ending up." - Toby Feakin

"[To safeguard supply chains] Australia in making much more rigorous assessments of not only where does the equipment come from, but where does the money flow from." - Toby Feakin

"Businesses need to feel comfortable in the chaos of trying out new technologies and creating right pockets of environments and business cases so that they can trial new tech and not be frightened of it." - Toby Feakin

Related Links:
 

  • https://insights.sei.cmu.edu/blog/operation-cloud-hopper-case-study/
  • https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
  • https://www.iiss.org/publications/strategic-comments/2019/australia-huawei-and-5g/


Guest Bio:
Ambassador Tobias (Toby) Feakin served as Australia's inaugural Ambassador for Cyber Affairs and Critical Technologies. He was responsible for shaping Australia's international cyber engagement strategy and has been instrumental in fostering partnerships across the Asia-Pacific. Feakin has played a crucial role in Australia's public attribution of cyber threats and has been a key advocate for balancing technological innovation with security risks.