Discover
Security Unfiltered
Security Unfiltered
Author: Joe South
Subscribed: 48Played: 497Subscribe
Share
© 2026 Security Unfiltered
Description
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
272 Episodes
Reverse
Send a text Most of us are living in a digital battlefield we barely understand—until it's too late. Alli Mellen reveals how nations harness cyber tools shaped by centuries of history, and how today's chaos isn't random—it's deeply rooted in geopolitical motives. If you think cyberwarfare is just about hackers and malware, think again. Alli's insider perspective exposes the dangerous future we’re rushing toward—where AI and information manipulation could rewrite reality itself. In this electr...
Send a text The cybersecurity battlefield is evolving at a lightning pace—and in 2025, we saw threats go from sophisticated to unstoppable. Identity has become the new frontline, with hackers weaponizing OAuth tokens, SaaS integrations, and impersonations to breach even the most secure environments. But here’s the brutal truth: if you’re not prepared for these attack vectors, you’re already one step behind. In this electrifying episode, Sergey Novikov, CyberProof’s director of cyber security ...
Send a text Most cybersecurity stories talk about the hacks, but this episode peels back the curtain on the raw, unfiltered journey of a hacker turned industry pioneer. Jason Haddix shares how his early days of hex editing and fake IDs evolved into leading offensive security at Fortune 100 giants — all driven by relentless curiosity and defiance. His tales of surviving the shadowy underground, navigating multi-year career pivots, and turning obsession into innovation will blow your mind. This...
Send a text Most cybersecurity talks focus on technical solutions, but this episode reveals a game-changing perspective: building trust is at the core of cybersecurity success. Danielle Sheer, Chief Trust Officer at Commvault, shares how her legal background and emotional connection strategies transform organizations’ approach to security—making cybersecurity relatable, manageable, and resilient. You'll discover: The surprising skills lawyers develop that elevate cybersecurity leadership—li...
Send a text In this episode, Joe and Ben Wilcox dive into the rapid advancements in AI and technology, sharing insights from the recent Microsoft Ignite conference. They explore the transformative impact of AI on security practices, the evolution of agentic robots, and the growing importance of data security in today's digital landscape. Tune in to hear a lively discussion between an AI skeptic and an optimist, and discover how these technological shifts are reshaping business and innovation....
Send a text We trade office chaos for focused remote work, then chart the journey from a 1999 idea to one of security’s most-used tools. The talk widens to cyber warfare, scams, and practical privacy steps anyone can take without going off-grid. • year-end boundaries and remote work focus • origin of WhatIsMyIPAddress and staying humble • don’t invite hackers, real-world conference fallout • elite cyber training, Ukraine drones, satellite comms • podcast guest vetting, authenticity, and valu...
Send a text Ever wonder why some shows last for years while others fade before episode seven? We sit down with Jack from Darknet Diaries to unpack the systems, mindset, and storytelling choices that keep a podcast resilient without burning out the host. Instead of chasing viral spikes, Jack lays out a playbook for steady growth: batch recording, rest cycles, and that deceptively powerful one percent month-over-month target. It’s practical, humane, and it works. We dig into his editorial comp...
Send a text In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security...
Send a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • foundations before security: systems then networks • depth of concepts vs surface knowledge • thinking at scale with distributed systems • threat modeli...
Send a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’ digital lifelines. • launching a policy career by building expert networks • founding the DEF CON Voting Village and publishing policy insights • ma...
Send a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidl...
Send a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, and n...
Send a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Why slow law and fast threats collide • Updating the Computer Misuse Act and research protections • Offensive cyber, deterrence, and ethical guardrails...
Send a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global threats to critical infrastructure and state actor pressure • startup culture, expectations and keeping teams healthy • Jason’s path through enginee...
Send a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security decisi...
Send a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. Eri...
Send a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a seasoned professional or new to the field, this conversation offers valuable insights into the complexities and opportunities within data security. Tun...
Send a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Commodore 64 and BBS to IT and security • contrast between the Wild West era and today’s tool-rich learning • help desk as a foundation for people skil...
Send a text We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable. • zero‑to‑one background from Nomi acquisition to Apple services • motivation for a third platform beyond Apple and Google • Raxxis test revealing 3,400 sessi...
Send a text David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approaches fail when dealing with AI components that dynamically change their trustworthiness based on input data. • LLMs present unique security challenges beyond prompt injection or generating harmful content • Traditional security models focusi...




