{"id":543,"date":"2026-04-15T08:00:00","date_gmt":"2026-04-15T12:00:00","guid":{"rendered":"https:\/\/www.techsequences.org\/podcasts\/?p=543"},"modified":"2026-04-13T19:06:47","modified_gmt":"2026-04-13T23:06:47","slug":"outpaced-by-ai-can-radical-collaboration-save-small-business-from-cyber-extinction","status":"publish","type":"post","link":"https:\/\/www.techsequences.org\/podcasts\/2026\/04\/outpaced-by-ai-can-radical-collaboration-save-small-business-from-cyber-extinction\/","title":{"rendered":"Outpaced by AI: Can Radical Collaboration Save Small Business from Cyber Extinction?"},"content":{"rendered":"\n<p>The human-speed defense of small business is being obliterated by the machine-speed offense of AI-driven cybercrime. Today, what large companies treat as a manageable risk is a terminal expense for small enterprises, with 60% of small enterprises shutting down within six months of a major attack. As AI-crafted phishing lures achieve a 54% click-through rate, traditional &#8220;awareness&#8221; training has become a shallow defense against an automated tide. We are at a strategic crossroads: do we outsource our security to Big Tech, wait for the government to mandate a minimum level of security, or return to the &#8220;radical collaboration&#8221; that built the Internet itself? Can we bake immunity directly into the Internet&#8217;s plumbing before the 400 million small businesses that form our economic backbone become mere collateral damage?<\/p>\n\n\n\n<p>Join us for a conversation with Brian Cute, the CEO of the Global Cyber Alliance. A veteran of Internet governance, he has held leadership roles at ICANN and the Public Interest Registry (the .org registry). He now leads The Global Cyber Alliance&#8217;s mission to deliver practical and effective tools to those most at risk in a fractured digital landscape.<\/p>\n\n\n\n<p><strong>Hosted by:<\/strong> Alexa Raad and Leslie Daigle.<\/p>\n\n\n\n<p><strong>Further reading:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">2025 Data Breach Investigations Report, Verizon<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/secureframe.com\/blog\/data-breach-statistics\">110+ of the Latest Data Breach Statistics to Know for 2026 &amp; Beyond<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/electroiq.com\/stats\/small-business-cyber-attack-statistics\/\">ElectroIQ Small Business Stats 2025<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/cyber-security-statistics\/\">SentinelOne 2026 CVE Forecast<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gcatoolkit.org\/smallbusiness\/\">GCA Cybersecurity Toolkit for Small Business<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gca.globalcyberalliance.org\/cyberbasics-2021#:~:text=Cyber%20Basics%20for%20Small%20Businesses%20is%20a%20free%20three%20week,suggestions%20to%20avoid%20falling%20victim.\">Cyber Basics: A free three-week training series for small businesses<\/a><\/li>\n<\/ul>\n\n\n\n<p>The views and opinions expressed in this program are our own and may not reflect the views or positions of our employers. <\/p>\n<div class=\"powerpress_player\" id=\"powerpress_player_5657\"><audio class=\"wp-audio-shortcode\" id=\"audio-543-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/media.blubrry.com\/techsequences\/content.blubrry.com\/techsequences\/20260409-BrianCute.mp3?_=1\" \/><a href=\"https:\/\/media.blubrry.com\/techsequences\/content.blubrry.com\/techsequences\/20260409-BrianCute.mp3\">https:\/\/media.blubrry.com\/techsequences\/content.blubrry.com\/techsequences\/20260409-BrianCute.mp3<\/a><\/audio><\/div><p class=\"powerpress_links powerpress_links_mp3\" style=\"margin-bottom: 1px !important;\">Podcast: <a href=\"https:\/\/media.blubrry.com\/techsequences\/content.blubrry.com\/techsequences\/20260409-BrianCute.mp3\" class=\"powerpress_link_pinw\" target=\"_blank\" title=\"Play in new window\" onclick=\"return powerpress_pinw('https:\/\/www.techsequences.org\/podcasts\/?powerpress_pinw=543-podcast');\" rel=\"nofollow\">Play in new window<\/a> | <a href=\"https:\/\/media.blubrry.com\/techsequences\/content.blubrry.com\/techsequences\/20260409-BrianCute.mp3\" class=\"powerpress_link_d\" title=\"Download\" rel=\"nofollow\" download=\"20260409-BrianCute.mp3\">Download<\/a><\/p><p class=\"powerpress_links powerpress_subscribe_links\">Subscribe: <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/techsequences\/id1509826111?mt=2&amp;ls=1\" class=\"powerpress_link_subscribe powerpress_link_subscribe_itunes\" target=\"_blank\" title=\"Subscribe on Apple Podcasts\" rel=\"nofollow\">Apple Podcasts<\/a> | <a href=\"https:\/\/open.spotify.com\/show\/6BgXkvatS6UgsTsJVi7BJE?si=N7tlTeOkTlOrg3Ysco2nbw\" class=\"powerpress_link_subscribe powerpress_link_subscribe_spotify\" target=\"_blank\" title=\"Subscribe on Spotify\" rel=\"nofollow\">Spotify<\/a> | <a href=\"https:\/\/subscribeonandroid.com\/www.techsequences.org\/podcasts\/feed\/podcast\/\" class=\"powerpress_link_subscribe powerpress_link_subscribe_android\" target=\"_blank\" title=\"Subscribe on Android\" rel=\"nofollow\">Android<\/a> | <a href=\"https:\/\/blubrry.com\/techsequences\/\" class=\"powerpress_link_subscribe powerpress_link_subscribe_blubrry\" target=\"_blank\" title=\"Subscribe on Blubrry\" rel=\"nofollow\">Blubrry<\/a> | <a href=\"https:\/\/www.techsequences.org\/podcasts\/feed\/podcast\/\" class=\"powerpress_link_subscribe powerpress_link_subscribe_rss\" target=\"_blank\" title=\"Subscribe via RSS\" rel=\"nofollow\">RSS<\/a><\/p><!--powerpress_player-->","protected":false},"excerpt":{"rendered":"<p>The human-speed defense of small business is being obliterated by the machine-speed offense of AI-driven cybercrime. Today, what large companies treat as a manageable risk is a terminal expense for small enterprises, with 60% of small enterprises shutting down within<\/p>\n","protected":false},"author":2,"featured_media":545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[49,45,46],"tags":[],"class_list":["post-543","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-49","category-ai-2","category-cybersecurity"],"jetpack_featured_media_url":"https:\/\/www.techsequences.org\/podcasts\/wp-content\/uploads\/2026\/04\/TS-PodcastHeaders.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/posts\/543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/comments?post=543"}],"version-history":[{"count":1,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/posts\/543\/revisions"}],"predecessor-version":[{"id":544,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/posts\/543\/revisions\/544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/media?parent=543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/categories?post=543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsequences.org\/podcasts\/wp-json\/wp\/v2\/tags?post=543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}