A closer look at the notable stories inside
Information Security and why they matter.

S2:E6 WannaCry

One year ago in May 2017, the WannaCry ransomware event hit hospitals, schools, banks, government organizations, put lives at risk and caused billions of dollars in damages.

In this episode, host Mike Storm and the team look back on the WannaCry ransomware worm, its global impact, and the more dangerous and effective malware known as Nyetya.

View Related Material

Cisco’s 2018 Annual Cybersecurity Report.

Talos’ original WannaCry analysis.


The Cybersecurity Tech Accord

S2:E5 Quantum

Quantum computers, networks, and encryption are poised to change the world in ways we don’t even understand yet. In this episode of Root Access, Mike and the team speak to two experts in the field about how quantum technologies promise to advance our society, while also threatening even the most advanced encryption models available.

View Related Material

Professor Van Meter’s book on Quantum Networks

‘Understanding Quantum Computers’ from Keio University [Future Learn]

Professor Sherson’s app Quantum Moves

S2:E4 Crypto


Bitcoin has entered its own atmosphere. At the time the Root Access producers recorded this episode, the popular cryptocurrency’s price was $7,200. At the time this episode was uploaded, it was nearly $12,000.

The surge in price has brought out investors, fund managers, speculators, and, of course, hackers and thieves.

In this episode of Root Access, host Mike Storm and the team look at the trends in the booming cryptocurrency world, including how thieves are using clever tricks to empty the wallets of unwitting investors.

Guests include Coinbase director of security Philip Martin and Metacert CEO Paul Walsh.

View Related Material

The GDAX Digital Asset Framework from Coinbase

Karla Burnett’s talk on the psychology and methodologies of phishing.

S2:E3 Privacy


In March 2017 Congress voted to roll back FCC privacy protections for Internet users passed during the Obama administration. The change comes just as data collection is hitting pervasive levels never seen before.

In this episode of Root Access, host Mike Storm and the team talk to Trevor Hughes, president and CEO of the International Association of Privacy Professionals, about the future of privacy in an age of mass data collection.

View Related Material

Massachusetts State Representative Mike Capuano’s rant against tracking of his underwear purchases.

Stanford Assistant Professor Michal Kosinski’s presentation on ‘The End of Privacy’:


IAPP President and CEO J. Trevor Hughes’ presentation on ‘The Future of Privacy’ at RSA:


S2:E2 Mirai


In Autumn of 2016, two security researchers were tracking something big. Really big. Hundreds of thousands of Internet-connected devices were being scanned for open vulnerabilities and herded into a massive botnet. But why?

In this episode of Root Access, host Mike Storm and the team dig into the Mirai botnet, its lasting impact on the security industry, and the work of two researchers to find its target before it launched the largest DDoS event in history.

View Related Material

S2:E1 Active Measures

Active Measures

Just before New Year’s Eve 2016, staff at the Burlington Electric company in Vermont received a call. It was the Department of Homeland Security. The electrical grid was under siege by Russian hackers. Or was it?

On a new season of Root Access, host Mike Storm and the Root Access team dive into misinformation online, how fake news has become an industry, the security risks at play, and how social media bot armies play a huge role in its spread. Guests include Professor Fil Menzcer from Indiana University and Mark Pesce, honorary associate with the University of Sydney.

View Related Material

Below are related links to Season Two Episode One:

02122016_R1d_OpenDNS_RootAccess_PodcastSite_RM_Icons_ay-LINK Clint Watts’ entire testimony

02122016_R1d_OpenDNS_RootAccess_PodcastSite_RM_Icons_ay-LINK More info on Hoaxy

02122016_R1d_OpenDNS_RootAccess_PodcastSite_RM_Icons_ay-LINK Facebook’s latest security report.


Root Access is a podcast focused on privacy and security. We take an in-depth look at the topics and events that are determining the course of the internet and its effect on people’s daily lives.

Cisco principal engineer Mike Storm is your host. Root Access is brought to you by Cisco.

Josh Pyorre

Josh is a security researcher with Cisco. Previously, he worked as a threat analyst with NASA, where he was part of the team that initially built out the Security Operations Center. He has also done some time at Mandiant. His professional interests involve network, computer, and data security with a goal of maintaining and improving the security of as many systems and networks as possible.

Past speaking engagements include:
2015: Derbycon, DeepSec (Vienna, Austria)
2015: NASA, Source (Boston, Seattle)
2015: BSides (Los Angeles, San Francisco, Chicago, Austin)
2010: Defcon (Las Vegas)


Mike Storm

Mike Storm is a Cisco principal engineer and 10-year CCIE with more than 25 years in the networking and cybersecurity industry. He has an affinity for educating others on how to correctly build security solutions that successfully protect their business, data and themselves from modern threats.

© 2017 Cisco  Privacy Policy  Terms of Service

Supplier is a member of the DMA and adheres to their code and all relevant rules and regulations. They have a Privacy Policy and a process in place for managing opt outs in accordance with the CAN-SPAM Act of 2003 which includes maintaining a suppression file of all people who have opted out of being contacted. All new email mailing lists are “parsed” against these prior to any message being sent.