NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
February 17, 2023

The Top 8 Pwned Episodes of 2022

Justin Fimlaid Justin Fimlaid

When we started PWNED in 2018, our goal was to connect with cybersecurity leaders and enthusiasts by producing a weekly podcast to address real-world security challenges. Since then, we’ve created 160+ episodes and are frequently in the top 100 technology podcasts in both the U.S. and the U.K.  

If you haven’t heard the show yet, co-host Jack Danahy and I discuss current trends in cybersecurity, the latest and greatest in security technology, and the volatile investment and M&A environment that’s fueling so much change. We chat with industry leaders to learn how they got where they are, what they see coming, and how they’ve learned from their mistakes. 

Below is a list of our top episodes from 2022. We hope you’ll find them as interesting as we did while making them, and share PWNED with others as a resource for candid advice and timely assessment of news from the cybersecurity industry.  

1. Pwned GigaByte – The Pit of Despair
Justin and Jack introduce the Pit of Despair – a place (i.e., ditch) where marketing terms end up when their strong start and promising future is so diluted from overuse that they’ve lost all flavor and meaning. Who will the first victim be? 

2. Two Old Friends Together – TrelliXDR
The creation of Trellix, the result of the marriage between McAfee and the post-Mandiant remnants of FireEye, gives the team a chance to visit an old friend, XDR, in the Pit of Despair. It’s an episode on finance, security technology, relevance, and potential new directions for the future.  

3. Breach of the Week – Log4j Vulnerability
Justin and Jack cover the base and wind up of the Log4j vulnerability and its impact on the world’s supply chain. Listen to hear more! 

4. Zero Trust, No Trust
Zero trust has grown from a good idea to a requirement for many companies, whether through the expansion of remote work or by government mandate. Widely overused, it’s also inconsistently defined. In this trustworthy episode, Justin and Jack spend some time highlighting its value and clearing things up. 

5. Punxsutawney Programmer
The debate over supporting open-source software and software supply chain security keeps repeating itself. In this episode, learn how one programmer uses their access to get some attention while putting an explanation point on the potential risk to users posed by unvetted open-source software.  

6. Right Swipe – Google Takes Siemplify Home
Google acquired Siemplify to integrate it into Google Cloud Chronicle. Does the match have chemistry? Will the relationship thrive, or should Google have gone home alone? Get the team’s take in this episode.  

7. Zero-Sum Breach of the Week
This episode came with a zero-sum Breach of the Week! Jack and Justin discuss one publicly disclosed breach, and one publicly disclosed breach that really wasn’t. 

8. Butts as Biometrics
A rant about “eyes on glass” and a new entry finds its glassy way into the Pit of Despair. 

Want to hear more? There’s much more where this came from – subscribe today!

Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS 

Included Topics

  • NuHarbor
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Industry Insights 3 min read
Cybersecurity Podcast: The Top 10 Pwned Episodes of 2023
Pwned Podcast Logo with
Read More
2 min read
Top Five Security Podcasts You Should Be Listening To Read More
1 min read
Third-Party Security in the Healthcare Industry [Infographic] Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.