
Episodes

4 days ago
4 days ago
Trevor Hilligoss, Head of Security Research at SpyCloud and former FBI agent, joins the show to discuss why humans remain the biggest security risk facing organizations today. From reused credentials to commoditized cybercrime tools, Trevor breaks down how attackers actually gain access — and why focusing on real-world human behavior is more effective than worrying about sophisticated nation-state threats.
Trevor: www.linkedin.com/in/thilligoss/
SpyCloud: spycloud.com
Jon: www.linkedin.com/in/jon-mclachlan
Sasha: www.linkedin.com/in/aliaksandr-sinkevich
YSecurity: www.ysecurity.io

Tuesday Dec 30, 2025
85. How Companies Lose $197 Million in Seconds (with Channi Greenwall, Olympix)
Tuesday Dec 30, 2025
Tuesday Dec 30, 2025
What if 90% of “secured” smart contracts were still exploitable? That’s the reality Olympix founder and CEO Channi Greenwall is seeing on-chain today. She breaks down why traditional audits are failing Web3 teams, why the attack surface is bigger than most founders realize, and how automated security is starting to close the gap.
You’ll learn:
- Why Web3 security is closer to medical devices and aviation than typical SaaS risk
- How one exploit can wipe out years of startup effort in seconds
- The hidden overlap between Web2 and Web3 attack surfaces that founders underestimate
- What it actually looks like to automate 60–80% of what human auditors do today
Listen to the full episode on your favorite platform.
Channi: www.linkedin.com/in/channi-greenwall
Olympix: www.olympix.security/
Jon: www.linkedin.com/in/jon-mclachlan
Sasha: www.linkedin.com/in/aliaksandr-sinkevich
YSecurity: www.ysecurity.io

Tuesday Dec 16, 2025
84. What gets missed when nobody reviews the code (with Jack Cable, Corridor)
Tuesday Dec 16, 2025
Tuesday Dec 16, 2025
Code ships faster than anyone can review it. Jack Cable, CEO and Co-Founder of Corridor, explains what actually gets missed when teams stop reviewing every pull request, why most security tools surface noise instead of risk, and how Corridor approaches secure-by-design when speed is non-negotiable.
Jack: https://www.linkedin.com/in/jackcable
Corridor: https://www.corridor.dev
Jon: https://www.linkedin.com/in/jon-mclachlan
Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich
YSecurity: https://www.ysecurity.io

Tuesday Dec 02, 2025
83. How small companies can make their security doable (with Phil Howie)
Tuesday Dec 02, 2025
Tuesday Dec 02, 2025
What if your first security hire wasn’t a person, but a simple, guided program that made sense to everyone in your company? In this conversation, Sidekick founder and CEO Phil Howie breaks down how SMBs can build a security and privacy practice from the ground up—long before they can afford a full internal team. We cover the reality of compliance vs real security, working with MSPs, the role of design in security tools, and how founders should think about AI, governance, and future regulation. If you’re a founder trying to grow in regulated markets, this one’s for you.
Phil: https://www.linkedin.com/in/philhowie
Sidekick: https://www.sidekick.co
Jon: https://www.linkedin.com/in/jon-mclachlan/
Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich/
YSecurity: https://www.ysecurity.io/

Tuesday Nov 18, 2025
82. Automating app security for modern dev teams (with Rejah Rehim)
Tuesday Nov 18, 2025
Tuesday Nov 18, 2025
Most companies still test security long after code is shipped. That delay creates blind spots.
In this episode, Rejah Rehim, Co-Founder & CEO of Beagle Security, explains how automated penetration testing gives teams a clearer picture of their real exposure—while keeping the process simple enough for developers to run themselves.
Rejah: https://www.linkedin.com/in/rejah/
Beagle Security: https://beaglesecurity.com/
Jon: https://www.linkedin.com/in/jon-mclachlan/
Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich/
YSecurity: https://www.ysecurity.io/

Tuesday Nov 04, 2025
How to put AI agents safely into production (with Eric Olden)
Tuesday Nov 04, 2025
Tuesday Nov 04, 2025
AI agents can burn through budgets and trust in minutes. Eric Olden, Co-Founder and CEO of Strata Identity, breaks down the control plane founders need: policy-driven guardrails, intent/context/outcome audit, and lifecycle governance—so you can move from sandbox to production with confidence.
Eric: https://www.linkedin.com/in/boughtnotsold
Strata Identity: https://www.strata.io
Jon: https://www.linkedin.com/in/jon-mclachlan
Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich
YSecurity: https://www.ysecurity.io

Tuesday Oct 21, 2025
Tuesday Oct 21, 2025
Most people think hackers exploit systems. The best hackers improve them. In this episode, Ted Harrington explains how to unlock your “inner hacker”—the mindset that turns obstacles into innovation. From breaking outdated rules to building smarter, safer companies, this conversation reframes what it means to lead with curiosity.
Ted: https://www.linkedin.com/in/securityted/
Ted’s website: https://www.tedharrington.com/
Jon: https://www.linkedin.com/in/jon-mclachlan
Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich
YSecurity: https://www.ysecurity.io

Tuesday Oct 07, 2025
AI at Brinks Home: Lower costs, better customer support (with Veronica Moturi)
Tuesday Oct 07, 2025
Tuesday Oct 07, 2025

Tuesday Sep 23, 2025
Invisible Security: The Future of Authentication and Trust (with Deepak Dutt)
Tuesday Sep 23, 2025
Tuesday Sep 23, 2025
Deepak Dutt, founder of Zighra, reveals how continuous behavioral authentication is changing the game—from stopping $200M fraud schemes to securing military operations.
Deepak: https://www.linkedin.com/in/deepakdutt/
Zighra: https://zighra.com/
Jon: https://www.linkedin.com/in/jon-mclachlan
Sasha: https://www.linkedin.com/in/aliaksandr-sinkevich
YSecurity: https://www.ysecurity.io

Tuesday Sep 09, 2025
Inside Augment Code: Why security starts at line one (with Dirk Meister)
Tuesday Sep 09, 2025
Tuesday Sep 09, 2025
What if your first lines of code determined your startup’s ability to scale? Dirk Meister, founding engineer at Augment Code, walks us through the intentional security architecture decisions they made on day one—and why trust isn't something you can bolt on later.
Dirk Meister: https://www.linkedin.com/in/meisterdirk/
Augment Code: https://www.augmentcode.com/
Jon McLachlan: https://www.linkedin.com/in/jon-mclachlan/
Sasha Sinkevich: https://www.linkedin.com/in/aliaksandr-sinkevich/
YSecurity: https://www.ysecurity.io/
