Reimagining Cyber - real world perspectives on cybersecurity
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape.
As featured on MillionPodcasts'
Best 100 Cybersecurity Podcasts
https://www.millionpodcasts.com/cyber-security-podcasts/
Top 50 Chief Information Security Officer CISO Podcasts
https://www.millionpodcasts.com/ciso-podcasts/
Top 70 Security Hacking Podcasts
https://www.millionpodcasts.com/security-hacking-podcasts/
Reimagining Cyber - real world perspectives on cybersecurity
They Didn't Hack You. They Logged In - #196
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
In this episode, cybersecurity expert Tyler Moffitt unpacks how modern cyberattacks have evolved into a seamless, scalable pipeline. What once appeared as separate threats—phishing, info stealers, credential theft, and ransomware—are now deeply interconnected stages of a single attack chain.
The conversation explores how attackers no longer need to “hack” their way in. Instead, they log in using stolen credentials and session data bought and sold in thriving underground marketplaces. With the rise of automated platforms and tools powered by AI, cybercrime has become more accessible, efficient, and difficult to detect than ever before.
Tyler breaks down the full attack lifecycle—from initial infection to credential theft, marketplace distribution, and eventual account takeover—highlighting why traditional defenses are struggling to keep up. The episode also examines the declining reliance on ransomware, as attackers increasingly favor silent data exfiltration and extortion tactics that are faster, quieter, and often more profitable.
For defenders, the message is clear: identity is now the frontline. With attackers blending in as legitimate users, organizations must shift their focus from keeping threats out to detecting suspicious behavior from within.
A sobering look at the current state of cybersecurity—and why the biggest threat may already be inside.
As featured on Million Podcasts'
Best 100 Cybersecurity Podcasts
Top 50 Chief Information Security Officer CISO Podcasts
Top 70 Security Hacking Podcasts
This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best!
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via reimaginingcyber@gmail.com