Security Unfiltered-logo

Security Unfiltered

Technology Podcasts

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

Location:

United States

Description:

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

Language:

English

Contact:

7082670108


Episodes
Ask host to enable sharing for playback control

Agentic Robots Are Here—And Your Security Strategy Is Broken with Ben Wilcox

1/27/2026
Send us a text In this episode, Joe and Ben Wilcox dive into the rapid advancements in AI and technology, sharing insights from the recent Microsoft Ignite conference. They explore the transformative impact of AI on security practices, the evolution of agentic robots, and the growing importance of data security in today's digital landscape. Tune in to hear a lively discussion between an AI skeptic and an optimist, and discover how these technological shifts are reshaping business and innovation. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:51:03

Ask host to enable sharing for playback control

Building Safer Online Habits Without Becoming Paranoid

1/19/2026
Send us a text We trade office chaos for focused remote work, then chart the journey from a 1999 idea to one of security’s most-used tools. The talk widens to cyber warfare, scams, and practical privacy steps anyone can take without going off-grid. • year-end boundaries and remote work focus • origin of WhatIsMyIPAddress and staying humble • don’t invite hackers, real-world conference fallout • elite cyber training, Ukraine drones, satellite comms • podcast guest vetting, authenticity, and value • preventing scams, empathy for victims, proof problems • privacy without becoming a hermit, actionable steps • 2FA on email, credit freezes, password strategy • data collection at retail, saying no with confidence • ads as social engineering, better defaults online “I will give anyone who wants the book can come to my website and get the book… If you don’t want to give me your email address or your name, I’ll give you the book without the email address and your name.” Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:49:13

Ask host to enable sharing for playback control

The Grind and Growth: A Podcaster's Journey With Jack Rhysider From Darknet Diaries

1/12/2026
Send us a text Ever wonder why some shows last for years while others fade before episode seven? We sit down with Jack from Darknet Diaries to unpack the systems, mindset, and storytelling choices that keep a podcast resilient without burning out the host. Instead of chasing viral spikes, Jack lays out a playbook for steady growth: batch recording, rest cycles, and that deceptively powerful one percent month-over-month target. It’s practical, humane, and it works. We dig into his editorial compass with three distinct tracks: personal obsessions, proven crowd favorites, and bold forays into new communities like crypto and gaming. Jack explains why listeners often prefer penetration test stories over higher-stakes CIA operations, and what it takes to earn trust from niche audiences by learning their culture first. The curtain pulls back on hard-to-book guests, silent PR walls, and the rare times a source vanishes after recording—plus the elusive thrill of chasing “ghost” hackers who should never speak on record. From there, the conversation turns to craft. Jack’s background as a network security engineer sharpened his ability to explain complex topics simply. He shares how layered explanations let beginners and veterans both feel seen, why command line beats screenshot soup, and how relentless revision turns knowledge into clarity. We also tackle AI and cybersecurity with nuance: not as job eraser, but capability amplifier. Think better triage, secure-by-default coding, and an arms race where defenders and attackers wield similar tools—and the edge comes from better questions and stronger priorities. Beyond the studio, Jack talks health, music, language learning, and swing dance, and how a wetware mindset—designing stories to trigger empathy and memory—guides every episode. If you care about making work that lasts, telling stories that land, and adopting AI without losing the plot, this conversation is a masterclass in sustainable creativity and modern security. Subscribe, share with a friend who needs a morale boost, and leave a review with the one tactic you’ll try next. Darknet Diaries: https://www.youtube.com/jackrhysider Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:49:08

Ask host to enable sharing for playback control

Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security

1/5/2026
Send us a text In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security controls. Tune in to learn about the future of cybersecurity and how companies can better prepare for the next wave of digital threats. 00:00 Introduction to Security Challenges 04:08 AI-Powered Social Engineering Threats 09:45 The Opaque Nature of Cybersecurity Incidents 14:08 Deep Fakes and Their Evolution 18:48 Hiring Risks in the Age of Deep Fakes 23:00 The Future of Cyber Threats and Anarchy 28:04 The Arms Race: AI Detection vs. Deepfakes 32:49 Preparing for the Future: Awareness and Training 39:26 The Evolving Threat Landscape: Beyond Traditional Security https://www.adaptivesecurity.com/ https://www.linkedin.com/in/brianclong/ Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:44:24

Ask host to enable sharing for playback control

Master The Fundamentals, Then Change The System

12/15/2025
Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • foundations before security: systems then networks • depth of concepts vs surface knowledge • thinking at scale with distributed systems • threat modeling as a constant that endures • learning the why behind legacy architectures • community building through a book and courses • coding confidence for security practitioners • practical framework for choosing certifications • direction over collecting badges • reflecting on progress and resetting goals • links to connect and learn more Use the code security50 to get 50% off the upcoming cybersecurity bootcamp at learn.thecyberinstructor.com Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:57:21

Ask host to enable sharing for playback control

Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online

12/8/2025
Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’ digital lifelines. • launching a policy career by building expert networks • founding the DEF CON Voting Village and publishing policy insights • managing imposter syndrome with trusted advisors and study • shifting from shields up to active defense in cyber • why Stuxnet’s visibility served a political goal • using law enforcement cyber tactics beyond ransomware • how fentanyl economics and pill presses scaled harm • China’s precursor role and Sinaloa’s market pivot • Coast Guard and HSI authorities for upstream disruption • making fentanyl unprofitable through targeted cyber pressure Find Jake on LinkedIn: Jake Bronn Book: Fentanyl, The Mass Poisoning Of America And The Cartel Behind It Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:01:13:48

Ask host to enable sharing for playback control

Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges

12/1/2025
Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world. 00:00:19 Introduction to Vishnu's Journey 00:00:30 Entering the US and Cisco 00:02:18 Cloud Security and AI 00:02:48 Data Governance and Challenges 00:08:47 The Expansiveness of Cloud 00:11:00 AI's Appetite for Data 00:12:11 Data Security in the JNI Era 00:14:29 The Importance of Context 00:16:13 Data Used by Enterprises 00:22:24 Conclusion and Future Trends https://www.bonfy.ai/ Bonfy.ai Bonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:53:55

Ask host to enable sharing for playback control

From Sewers To Subsea: Rethinking Data Centers And Defense

11/24/2025
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, and non-linear careers • social engineering as ordinary behavior with intent • red team vs blue team dynamics and trust • the sewer break-in that birthed an idea • how subsea data centers plug into power and fiber • threat models at sea and nation-state realities • latency wins for gaming, streaming, fintech, telehealth • AI hype, thin moats, and the need for stack control Find Maxi: most active on LinkedIn; launching an AI security blog and weekly newsletter at maxirynolds.com Inspiring Tech Leaders - The Technology Podcast Interviews with Tech Leaders and insights on the latest emerging technology trends. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:53:30

Ask host to enable sharing for playback control

Inside The Global Push For Offensive Cyber And Smarter Defense

11/17/2025
Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Why slow law and fast threats collide • Updating the Computer Misuse Act and research protections • Offensive cyber, deterrence, and ethical guardrails • Zero days, decision latency, and operational windows • SMEs and supply chains as systemic risk • Secure by design and secure by default at scale • State cyber reserves and public–private secondments • Talent gaps, pay gaps, and global accreditation • EU and UK moves to standardize skills and tighten rules • Government roles in funding, convening, and capability building Find Verona on LinkedIn: Verona Johnstone Hulse. Read NCC Group’s Global Cyber Policy Radar on the NCC Group website or via Verona’s LinkedIn posts Inspiring Tech Leaders - The Technology Podcast Interviews with Tech Leaders and insights on the latest emerging technology trends. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:46:05

Ask host to enable sharing for playback control

The FUTURE of Device Authentication is Here NOW

11/10/2025
Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global threats to critical infrastructure and state actor pressure • startup culture, expectations and keeping teams healthy • Jason’s path through engineering to entrepreneurship • identity’s failure modes and why credentials are stolen • asymmetric, hardware-bound authentication and device posture • extending identity to agents, drones and satellites • cyber-physical risk and why finance invests heavily • identity as the universal control plane in cloud • practical steps to prevent session hijack and MFA fatigue Connect with Jason: “Hit me up on LinkedIn… our website, beyondidentity.com… even X” Inspiring Tech Leaders - The Technology Podcast Interviews with Tech Leaders and insights on the latest emerging technology trends. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:45:43

Ask host to enable sharing for playback control

The Future Hides In Plain Sight: Will We See It In Time?

11/3/2025
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security decision‑making • shifting from passwords to stronger credentials • efficiency versus resilience trade‑offs in cloud • lessons from government redundancy models • attack surface, attacker and defender effectiveness • deepfakes, social engineering, and process tripwires • practical controls like rotating passcodes and dual control • resources and where to find Heather’s work Pick up Heather’s books and reach out if you want Inspiring Tech Leaders - The Technology Podcast Interviews with Tech Leaders and insights on the latest emerging technology trends. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:56:53

Ask host to enable sharing for playback control

Inside Offensive AI: From MCP Servers To Real Security Risks

10/27/2025
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. Eric shares takeaways from Offensive AI Con: how models help triage code and surface likely bug classes, why decomposed workflows beat “find all vulns” prompts, and what happens when toy benchmarks meet stubborn, real binaries. We explore reinforcement learning environments as a scalable way to train security behaviors without leaking sensitive data, and we grapple with the uncomfortable reality that jailbreaks aren’t going away—so output validation, sandboxing, and principled boundaries must do the heavy lifting. We also dig into Garak, the open-source system security scanner that targets LLM-integrated apps where it hurts: prompted cross-site scripting, template injection in Jinja, and OS command execution. By mapping findings to CWE, Garak turns vague model “misbehavior” into concrete fixes tied to known controls. Along the way, we compare GPT, Claude, and Grok, talk through verification habits to counter confident nonsense, and zoom out on careers: cultivate niche depth, stay broadly literate, and keep your skepticism calibrated. If you’ve ever wondered how to harness AI without handing it the keys to prod, this one’s for you. Enjoyed the episode? Follow, share with a teammate, and leave a quick review so more builders and defenders can find the show. Inspiring Tech Leaders - The Technology Podcast Interviews with Tech Leaders and insights on the latest emerging technology trends. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:01:06:01

Ask host to enable sharing for playback control

What If AI Took Over Your Data Security Tomorrow?

10/20/2025
Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a seasoned professional or new to the field, this conversation offers valuable insights into the complexities and opportunities within data security. Tune in to learn how to navigate the ocean of data and protect your organization's most valuable assets. 00:00 Introduction to Gidi Cohen and His Background 01:49 The Role of 8200 Unit in Cybersecurity 04:25 Transitioning from Military to Industry 11:32 Identifying Problems in Data Security 16:00 The Challenges of Data Management in Organizations 23:58 The Challenge of Data Classification 26:59 Understanding Context in Data Security 29:44 Adaptive Learning in AI Solutions 32:22 Proactive Risk Mitigation Strategies 34:57 Integrating Data Security Across Platforms 37:33 The Future of Data Security Solutions Bonfy ACS is a next-gen DLP platform built for the AI era, combining contextual intelligence and adaptive remediation to secure sensitive data and enable AI innovation at scale. With high accuracy and out-of-the-box policies, it delivers fast time to value while reducing false alerts and investigation overhead. Trusted by regulated organizations, Bonfy ensures compliance and integrates seamlessly with Microsoft 365, Salesforce, Slack, and Google Workspace. Speaker: Gidi Cohen, CEO and Co-Founder of Bonfy.AI https://www.bonfy.ai/ The Folium Diary Wants You! (to listen and have fun ;-) 101 Nights of Storytelling! (Scheherazade on a budget). A show that will change the whirl. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

Duration:00:50:52

Ask host to enable sharing for playback control

Top SAP Security Threat Hunting Strategies Used by Elite Researchers

10/14/2025
Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Commodore 64 and BBS to IT and security • contrast between the Wild West era and today’s tool-rich learning • help desk as a foundation for people skills and pressure • practical advice for students on coding, protocols, Wireshark • hiring by attitude, approach and aptitude over tool checklists • navigating WAF pushback and risk acceptance with dev teams • Onapsis research labs and SAP’s threat landscape • deep-dive on the SAP 31324 Java gadget chain RCE • attacker interest, attribution signals, and factory impact • offensive research versus traditional pen testing • building culture that rewards questions and learning Find us: onapsis.com → Research Labs. Search “Onapsis 2025 31324” for our zero-day article. SAP thanked us in their patch notes. Connect with Paul on LinkedIn to talk SAP security, offensive work, or careers. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:52:15

Ask host to enable sharing for playback control

From Apple’s Inside to a New Kind of Phone: Privacy, Free Speech, and Building a Third Platform

10/6/2025
Send us a text We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable. • zero‑to‑one background from Nomi acquisition to Apple services • motivation for a third platform beyond Apple and Google • Raxxis test revealing 3,400 sessions and 210,000 packets in one hour • third‑party data brokers, pattern‑of‑life risks, Fourth Amendment gaps • layered threat model from passive tracking to seizure and signals • emergency reset, false PIN wipe, and hardware battery cut‑off • first‑party vs third‑party privacy and ecosystem incentives • “Ask App Not to Track” as preference vs permission • Time Away to reduce engagement and regain attention • firewall, USB data blocking, 2G limits, Bluetooth controls • camouflaged VPN and operational noise in repressive networks • app compatibility layer and broader app sourcing without Google • clear business model: hardware and subscriptions, no data sale PodMatch PodMatch Automatically Matches Ideal Podcast Guests and Hosts For Interviews Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:49:17

Ask host to enable sharing for playback control

Your AI is not as secure as you think it is, and here's why

9/29/2025
Send us a text David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approaches fail when dealing with AI components that dynamically change their trustworthiness based on input data. • LLMs present unique security challenges beyond prompt injection or generating harmful content • Traditional security models focusing on component-based permissions don't work with AI systems • "Source-sink chains" are key vulnerability points where attackers can manipulate AI behavior • Real-world examples include data exfiltration through markdown image rendering in AI interfaces • Security "guardrails" are insufficient first-order controls for protecting AI systems • The education gap between security professionals and actual AI threats is substantial • Organizations must shift from component-based security to data flow security when implementing AI • Development teams need to ensure high-trust AI systems only operate with trusted data Watch for NCC Group's upcoming release of David's Black Hat presentation on new security fundamentals for AI and ML systems. Connect with David on LinkedIn (David Brockler III) or visit the NCC Group research blog at research.nccgroup.com. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:50:51

Ask host to enable sharing for playback control

Cloud, AI, and the Future of Identity Access Management

9/22/2025
Send us a text Art Poghosyan shares his journey from IT security consultant to CEO of Britive, a cloud-native identity and access management company. His experience during economic downturns shaped his understanding of how cybersecurity services remain resilient through various market cycles. • Started in IT security right after completing a master's in technology risk management • Worked with early IAM solutions including LDAP directories, SSO, and authentication systems • Founded Advanced Technology Solutions focusing on IAM implementation services • Identified growing challenges with traditional IAM solutions in cloud environments • Created Britive to address cloud-native identity management challenges • Witnessed explosion of machine identities in cloud environments creating security risks • Now focused on securing new identity types including AI and agentic identities • Cybersecurity consulting proves relatively recession-proof as security needs persist in both growth and contraction • Capital One AWS breach highlighted risks of excessive privileges in cloud environments • Current focus includes securing agent-to-agent interactions in AI systems Connect with Art on LinkedIn or email him at art@britive.com to learn more about Britive's solutions for cloud and AI identity challenges. 😇 Affiliates and Paid Promotions 😇 ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:45:18

Ask host to enable sharing for playback control

Hack Your Way to Achievement: One Small Step at a Time

9/15/2025
Send us a text Ted Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone overcome challenges and find overlooked opportunities. • Breaking big goals into smaller, manageable pieces makes difficult tasks achievable • Inspiration only gets you started; habits and consistency are what help you finish • The four traits of the hacker mindset: curiosity, non-conformity, commitment, and creativity • Focus on genuinely helping others rather than self-promotion in professional interactions • Applying the hacker mindset can reveal opportunities others miss in any field • AI is changing both attack and defense strategies in cybersecurity, but fundamental principles remain the same Check out Ted's new book "Inner Hacker" to learn how to apply the hacker mindset to achieve your own goals and find hidden opportunities in your life. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:42:50

Ask host to enable sharing for playback control

The Future of AI: Security, Ethics, and Human Augmentation

9/8/2025
Send us a text Artificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunities and profound challenges that we're only beginning to understand. • AI development is accelerating faster than any previous technology, with research papers becoming outdated within weeks or months • Current AI systems function primarily as prediction engines rather than truly conscious entities, despite sometimes exhibiting behaviors that appear sentient • Companies often implement AI solutions without clearly understanding the problems they're trying to solve or the technology's actual capabilities • AI regulation is developing globally, with the EU currently leading efforts to establish comprehensive frameworks and security standards • Most organizations will benefit more from using AI to augment human capabilities rather than attempting to replace workers entirely • The cybersecurity job market has become increasingly competitive, with automation making application processes more challenging for job seekers • When looking for jobs on LinkedIn, changing the URL parameter from 84,000 to 3,600 helps find postings from the last hour instead of the last 24 hours Connect with Chris Cochran on LinkedIn to learn more about his work in AI and cybersecurity or to request assistance with making connections in the field. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:39:31

Ask host to enable sharing for playback control

Breaking the Sky: How Vulnerable Are Our Satellites?

9/1/2025
Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows of only 15 minutes during orbit • Most satellites run on outdated technology with numerous vulnerabilities that can allow complete takeover • A real-world attack in 2022 showed how Russia could penetrate ground stations and control entire satellite constellations • Post-quantum encryption will be essential within 5-10 years according to global experts • CubeSats (small satellites) can be purchased and tested by anyone, creating both research opportunities and security risks • Bug bounty programs provide unique opportunities for security researchers to specialize and potentially earn substantial rewards • Zero trust principles must be applied to satellite security before launch since patching in orbit is extremely difficult • The infrastructure dependent on satellites includes GPS, cellular communications, and financial transactions You can find Grant on LinkedIn by searching "Grant McCracken Dark Horse" or contact him directly at grant@darkhorsesh.com. His company Dark Horse Security helps organizations at all budget levels improve their security posture, including pro bono work for those who cannot afford security services. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast

Duration:00:55:37