DiscoverLegitimate Cybersecurity Podcasts
Legitimate Cybersecurity Podcasts
Claim Ownership

Legitimate Cybersecurity Podcasts

Author: LegitimateCybersecurity

Subscribed: 0Played: 0
Share

Description

Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
16 Episodes
Reverse
Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s engagement shift—this episode asks the hard question: are you in control, or are you being steered? We also hit the nuance: when AI spots tumors earlier and flags outbreaks faster, do the ends justify the data means? Echo chambers, algorithm “poisoning,” privacy laws (or lack thereof in the U.S.), and the real-world line between convenience and manipulation—plus the wild story of a nurse who could smell disease before doctors could test for it. 🎧 Subscribe for sharp, funny, no-fluff cyber talk every week. 💬 Drop your take: are you comfortable trading agency for convenience? — 👥 Hosts: T. Frank Downs & Dustin Brewer 🎙️ Podcast + clips: @LegitimateCybersecurity 🧠 Subreddit: r/LegitimateCyber 🔔 Like, subscribe, and share to beat the algorithm at its own game. Chapter Breaks 00:00 – Cold Open: “If you’re not paying, you’re the product.” 01:20 – TikTok: personalization vs. geopolitics 02:37 – OPM breach & SF-86: the most intimate data spill 04:08 – Data brokers & geolocation: finding anyone (even Congress) 05:22 – The U.S. privacy gap (hello CCPA, goodbye federal law) 06:11 – Shadow credit files: LexisNexis, GM telemetry & your insurance 07:45 – Maps that nudge: are routes sold to brands? 08:23 – Amazon’s “sponsored” defaults & subtle purchase steering 09:39 – “Emergent behaviors” & divisive feed design 10:53 – Can we trust any filter—and do we have options? 11:30 – AI is code (and code is messy): hallucinations & ad-stuffed search 12:27 – Living private vs. living miserable: the balance problem 15:16 – Biased training data: we met the trainer and it’s us 17:47 – Medicine wins: diagnostics vs. the data tradeoff 19:30 – Joy Milne & “the smell of disease”: human pattern-finding #cybersecurity #algorithms #privacy #ai #databrokers #tiktok #opm #EchoChambers #RecommenderSystems #DigitalEthics #Nudging #LegitimateCybersecurity 22:44 – AI for signals, humans for meaning 23:34 – Robots, laundry… and the rental future 24:57 – Do people want out of echo chambers? 26:57 – Comfort vs. being “right”: why rage sells 27:24 – Algorithm poisoning ethics: self-defense or sabotage? 28:11 – The kindness trap: loneliness, AI compliments & harms 30:16 – What practitioners should do: policy, guardrails, education 32:25 – The inevitable? Choosing agency in a steered world 33:16 – Outro: “If this was recommended to you…”
What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—and eventually advising top companies through breaches and building cyber programs. We cover: How non-traditional paths (like the Navy) can launch cyber careers The evolution of SOC life and tools (FireEye, ArcSight, Palo Alto, CrowdStrike, etc.) The AI security paradox: why AI will cause more breaches, not fewer Why leadership culture determines breach resilience The controversial new “Letters of Marque” bill that could legalize U.S. cyber privateers This episode is packed with career lessons, insider war stories, and the kind of weird/funny hypotheticals that only Legitimate Cybersecurity delivers. ⏱️ Chapter Breaks 00:00 – Intro & Chris’ non-traditional entry into cyber 01:20 – Life on submarines & discovering IT underwater 04:20 – From BackTrack to BP: finding cybersecurity as a career 07:00 – SOC life at BP: Panama shifts, POCs, and new tools 10:40 – FireEye, EDR, and the evolution of detection tech 13:50 – Why AI may actually increase breaches 16:30 – Career changers & why it’s hard to “get into cyber” 20:00 – The problem with cybersecurity education & perception 27:30 – The “Letter of Marque” bill: cyber privateers?! 38:40 – Post-breach consulting: calming chaos & fixing culture 44:20 – Bias, assumptions, and the hidden root of breaches 50:00 – If SOCs ran on ChatGPT: complaints & HR problems 52:40 – Funniest phishing excuses & cyber training fails 59:40 – Leadership, culture, and why CEOs define cyber success 1:03:30 – Wrap up & Chris’ future return #Cybersecurity #Hacking #AI #SOC #CyberCareers #LegitimateCybersecurity #NavyToCyber #Infosec
Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth: scoping, persistence hunts, EDR triage, due diligence in M&A The RDP ≈ drunk driving analogy you’ll never forget FBI - Private sector: what translates (and what doesn’t) Career advice for students & pros in the age of AI: become “rangeful,” seize moments 👥 Guest: Vincent D’Agostino — Head of DFIR @ BlueVoyant; former FBI agent & attorney 🎙 Hosts: Frank Downs & Dustin Brewer 📌 Subscribe for deep, funny, legit cyber every week. Chapter List 0:00 Cold Open — “Dark Web x2” 0:22 Intro & Who is Vincent D’Agostino 1:05 8086, 5MB HDD & falling in love with computers 5:30 From law to FBI: timing, tech, and reality checks 10:45 Cyber squads, TOR, Bitcoin & dark web context 16:30 DFIR in practice: scoping, EDR, persistence hunts 24:30 The RDP ≈ drunk driving analogy every CISO needs 29:30 Competence over politics (how to show up in calls) 34:30 Career “Range”: why hobbies compound into expertise 45:30 M&A due diligence: IR skills without the sirens 51:00 Humor as a tool: rapport in dark situations 57:00 3 Takeaways + Subscribe/Next Episode #DarkWeb #DFIR #DigitalForensics #IncidentResponse #FBI #BlueVoyant #Cybersecurity #CyberPodcast #ThreatHunting #EDR #Velociraptor #SentinelOne #Ransomware #CISO #Bitcoin #TOR #BlueTeam #CareerAdvice #AI #LegitimateCybersecurity #MandA #DueDiligence
ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and the future of cybersecurity. 👉 Is ChatGPT-5 truly artificial intelligence, or just machine learning with a better paint job? 👉 Can AI pass cybersecurity exams like the CISSP? 👉 Will AI babysit your kids one day — and should that terrify you? Stay tuned for the myths, the laughs, and the real risks. Watch to the end for a wild take on Star Trek, civil wars, and whether AI could really replace humans. #AI #CyberSecurity #ChatGPT5 #Hacking #TechNews Chapter List: 0:00 – Cold Open (funny/hooky clip) 0:10 – Welcome + Episode Setup 1:00 – What’s Actually New in ChatGPT-5? 3:00 – Pretty Code That Doesn’t Work 5:00 – AI as the Annoying Coworker 7:00 – Is This Really AI or Just ML? 10:00 – Hackers Don’t Care If It’s Wrong 13:00 – Cognitive Offloading + Laziness Debate 15:30 – Weird Time: Frank’s Coding Fail Story 18:30 – The Rise of Prompt Engineers 21:00 – AI Gone Wrong (Teen Suicide Example) 23:30 – Postmodern Truth & Poisoned Data Sources 27:00 – Can AI Pass the CISSP? Cheating & Proctors 33:00 – The Real Definition of AI (John McCarthy 1956) 36:00 – AI Slop in Writing and Coding 38:30 – Certification Exams & The Drunk Security Practitioner 40:30 – Wrap Up: ChatGPT-5 = Faster, Not Smarter #ChatGPT5 #CyberSecurity #ArtificialIntelligence #TechNews #Hacking #MachineLearning #AIHype
What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cyber Kill Chain — Lockheed Martin’s 7-stage framework for understanding and stopping attacks — and compare it to the MITRE ATT&CK framework, hacker methodology, and even… honeypots, magicians, and Christopher Nolan films. We cover: The 7 stages: Recon, Weaponization, Delivery, Exploitation, Installation, C2, and Actions on Objectives Why insurance companies make cyber defense harder Why honeypots are the “magician’s trick” of cybersecurity How to explain attacks to executives so they actually care Tangents about Comic-Con, The Simpsons, Star Trek, and South Park (because of course we did) Whether you’re a seasoned pro or just cyber-curious, this episode makes frameworks fun. And dangerous. And maybe slightly nerdy. 💬 Drop your favorite Kill Chain phase in the comments! #CyberKillChain #CyberSecurity #EthicalHacking #MITREATTACK #PenTesting #InfoSec #Honeypots #CyberInsurance #CyberDefense #NIST #LockheedMartin #LegitimateCybersecurityPodcast Chapter List 00:00 – Welcome & accidental name change to “The Cyber Kill Chain Podcast” 00:37 – Comic-Con chaos & nerd solidarity 01:40 – What is the Cyber Kill Chain? (And why Lockheed Martin made it) 03:18 – Cyber Kill Chain vs. MITRE ATT&CK: Different perspectives 05:22 – Insurance nightmares & cyber policy loopholes 08:03 – The 7 stages explained (Recon → Actions on Objectives) 14:42 – Framework overload & mapping standards 18:59 – Real-world pen test insights & APT patience 21:19 – Teaching grad students & professor naming quirks 23:03 – AI politeness, South Park, and AI “relationships” 25:01 – Cybersecurity fatigue & losing the funding edge 28:22 – Where defenders can actually break the Kill Chain 29:41 – Honeypots: magician’s trick or wizard’s weapon? 34:42 – Christopher Nolan, The Prestige, and Wireshark wizardry 38:13 – Why conveying frameworks simply wins the boardroom 40:26 – Wrapping up: Vote for us & leave your questions
Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and Dustin break down Q-Day, the moment when quantum computers may render current cryptography useless. We explore how close we really are, the science (and hype) behind quantum technology, and what CISOs should be doing NOW to prepare. Along the way, expect tangents about Star Trek, Ant-Man, AI, and a few moments that’ll make you laugh out loud. 🎙️ Got a topic or guest suggestion? Email us at: admin@legitimatecybersecurity.com 👍 Like, comment, and subscribe for weekly cybersecurity deep-dives that mix humor with hard truths. Chapters: 00:00 – The ASMR Frank & Star Wars Quantum Vibes 02:12 – What is Q-Day & Why Does It Matter? 05:54 – How Cold is Quantum? (Hint: Near Space Cold!) 09:40 – Breaking Encryption: The Qubit Threat 14:45 – How CISOs Should Handle Quantum Hype 19:16 – Hidden Financial Meltdowns & The Transfer of Wealth 23:32 – Quantum Internet & Faster-Than-Light Data 28:26 – Hackers, Ant-Man, and Sci-Fi Meets Science 33:26 – Turning Q-Day Concerns into Real Security Wins 35:49 – Final Thoughts & How to Prepare Today #quantumcomputing #QDay #cybersecuritypodcast #encryption #postquantumcryptography #ai #nisteoameni #ciso #legitimatecybersecurity #techfuture #startrek #antman
Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the creepy rise of biohacking and RFID implants, and find out what happens when Roombas spy on you in the bathroom. We also break down why IoT devices are so vulnerable, the challenges with industry standards like Zigbee and Matter, and whether privacy laws like HIPAA and GDPR are enough to protect us in a hyper-connected future. This episode blends expert insight, sarcasm, and actual advice — with a few nostalgic tech throwbacks thrown in. 👉 Tell us in the comments: Would YOU put an RFID chip in your hand? Or is that a step too far? 🧠 Topics Covered: Biohacking at DEF CON IoT in Human Evolution Pacemaker recalls & medical device hacks Why Ring doorbells talked to children The Fish Tank Casino Hack Why Alexa might be gaslighting you ISO standards, Z-Wave, Zigbee, Matter Smart home fails (IKEA blinds, anyone?) Why Apple might be the “luxury” privacy model CRISPR, AI, and Neuralink 🔗 Don’t forget to like, comment, and subscribe. It helps us battle the algorithm overlords and keeps our IoT-connected fridge from judging us. 🗳️ We’ve been nominated for the Podcast Awards! Vote for us at podcastawards.net 📬 Press inquiries, sponsorships, or topic requests? Email us at: admin@legitimatecybersecurity.com Chapter List: 00:00 – Intro: Is IoT Out of Control? 00:27 – How IoT Went from SCADA to Dog Collars 01:50 – IoT & Cognitive Offloading: Are We Getting Lazier? 04:31 – Biohacking: RFID Chips & Pacemaker Hacks 09:02 – Self-CRISPR?! The Shocking Reality 12:15 – Mark of the Beast vs. Palm Scanners: Privacy Panic 15:03 – Your Coffee Maker Could Burn Down Your House 16:26 – Hacking Beer Makers & Server Farms 22:26 – Casino Hacked by a Fish Tank? 23:25 – Ring Cameras Talking to Kids: IoT Nightmares 25:25 – Roombas Spying on You in the Bathroom 27:52 – Cheap IoT: A Privacy Disaster Waiting to Happen? 30:25 – Apple vs. Android: Who’s Winning the Privacy War? 32:03 – Outro & Podcast Awards Announcement #IoT #Biohacking #Cybersecurity #RFIDImplants #CRISPR #SmartHomeSecurity #ConnectedDevices #InternetOfThings #PacemakerHack #FishTankHack #RingCameraHack #PrivacyMatters #AIandCyber #TechEthics #CyberAwareness #Neuralink #HackedDevices #LegitimateCybersecurity #CyberThreats #SmartDeviceFails
Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it. We explore: Strategic cyber risk (not just IT vulnerabilities) Mapping 50,000+ exposed devices across U.S. counties The "operational art" of cyber warfare Why grants are being wasted The AI & quantum arms race vs. China 💣 This episode is packed with insights for CISOs, policy makers, military analysts, and tech leaders alike. 🎙️ Listen to the audio version on Spotify, Apple Podcasts & more. 📩 For guest inquiries or partnerships, reach us at: admin@legitimatecybersecurity.com Vote for our podcast at: podcastawards.com #Cybersecurity #CyberWar #CharlesHarry #LegitimateCybersecurity #CyberStrategy #NISTCSF #QuantumSecurity #AIInCybersecurity #PublicSectorCyber #NvidiaVsChina #RiskManagement #CyberGovernance 00:00 – Cold Open + Intro 00:22 – Meet Dr. Charles Harry 01:52 – What Is Strategic Cybersecurity? 05:02 – Risk at the Sector Level 08:22 – Cyber Operational Art: The Missing Middle 13:47 – Mapping 50,000+ Public Sector Devices 21:00 – Why Federal Cybersecurity Grants Fail 28:00 – Red Team vs. Blue Team: The Divide That Shouldn't Exist 34:02 – Risk Frameworks: Useful or Useless? 43:02 – Quantum & AI: Reshaping the Threat Landscape 48:50 – Nvidia vs. China: The True Arms Race 53:10 – Final Thoughts + How to Build a Strategic Cyber Defense
🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoning and post-truth dangers 🛡️ AI in cybersecurity: helper or hazard? 🎭 Aquaman scams grandma?! 🗳️ The future of elections in the AI age This is the episode that asks: What is truth? And can we still trust anything we see or hear? 👉 VOTE for us in the Technology category at PodcastAwards.com 👉 Like, Subscribe, and hit that 🔔 — it helps more than you know! #Cybersecurity #AIThreats #Deepfakes #AIinCyber #MarcoRubio #Cybercrime #DataPoisoning #LegitimateCybersecurity #PostTruth #ElectionSecurity #PodcastAwards #AIDeepfakes #ChatGPT #GrokAI #QuantumComputing Chapter Breaks: 00:00 – Welcome to the AI Chaos 01:00 – Marco Rubio’s Deepfake Scandal 03:30 – Signal App, Trust, and Exploitation 06:00 – Grandma Got Catfished by Aquaman (Real Story) 08:30 – AI: Making Hacking Easier or Dumber? 11:00 – Prompt Injection, Scambaiting, and Evil Clippy 13:30 – Deepfakes vs. Quantum Computing 16:00 – The Dystopia of AI Dating and “Spin the DJ” 19:00 – Truth, Misinformation, and Model Poisoning 23:00 – Blockchain for Truth? (Business Idea Alert) 25:30 – Star Wars, White Lotus, and the Collapse of Truth 28:00 – Elections, Echo Chambers, and Deniability 30:00 – Vetting Info in the AI Age 33:00 – Should ChatGPT Run a Town? 34:00 – Final Thoughts + Next Episode Preview (The Economics of Cyber)
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, and GPEN really mean ✅ Why most companies have no idea what’s on their network ✅ Real pen test experiences gone sideways ✅ Why you might still get arrested after a bug bounty ✅ And how to break into the field—even without a degree 🎙️ WE NEED YOUR HELP! 🎙️ We’re in the running for Best Technology Podcast at PodcastAwards.com — and we’d love your vote! 🗳️ Go to https://www.podcastawards.com, register, and vote for Legitimate Cybersecurity in the Technology category. Your vote helps real, nerdy cybersecurity voices rise to the top! 📌 Like, Subscribe & Share. 🔔 Click the bell to get notified about new episodes (and Frank’s midlife crises). 📎 Check the show notes for career resources, links, and our Hack the Box profile recs! #PenTesting #EthicalHacking #CybersecurityCareers #OSCP #CEH #GPEN #HackTheBox #RedTeam #CyberSecurityPodcast #InfoSec #HackerLife #BugBounty #CybersecurityTraining #CyberMythsBusted #ITSecurity #SecurityTesting #KaliLinux #CyberCareer #podcastawards Chapter Breaks 00:00 - Intro: What Is Penetration Testing? 01:31 - Myths vs. Reality of Hacking 02:40 - What Kind of People Make Good Pen Testers? 05:33 - You Don’t Need a Degree To Be a Hacker 07:19 - Why AI-Generated Code Is Easy to Hack 09:16 - Cybersecurity Certifications (OSCP, CEH, GPEN) 12:16 - Is CEH Still Worth It? 14:42 - What EC in EC-Council *Actually* Stands For 16:20 - Pen Test Expectations vs. Reality 19:35 - Types of Pen Tests: Internal, External, Web App, Social Engineering 22:12 - Cost, Scope & Asset Prioritization 24:00 - What If You Don’t Know Your Own Assets? 26:58 - Pen Test Reports: Why No One Reads Them 28:55 - Remediation Is Scarier Than the Hack 30:49 - Hacker Teams: Foothold → Escalation → Ransom 32:31 - The Most Hilarious Old Systems We’ve Found 34:28 - You Must *Love* Computers To Hack Well 37:03 - Want to Be a Hacker? Here’s Your Roadmap 39:51 - Military & DOD Paths To Cyber Careers 40:44 - Vote for Us, Subscribe, and Frank’s Midlife Crisis
Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting and blue team burnout, we demystify the buzzwords, talk real-world applications, and get a little weird with some philosophical takes. And yes, Clippy makes a comeback. 🧠 Topics Covered: What AI really is (with NIST definitions) Can AI replace cybersecurity professionals? AI in offensive vs. defensive security LLM hallucinations and real-world risks Deepfakes, phishing, and governance tools The rise of AI girlfriends 😬 🧪 Outrageous Statements Segment: We say wild things. Sometimes they’re true. Sometimes they’re spicy. Always entertaining. 📍 Special shoutouts to: Dr. Charles Harry (coming soon!) Clippy (RIP king) 👂 Listen on Spotify, Apple, or wherever you get your podcasts. 👉 Like, Subscribe, and Share if you want to see Eeyore smile again. #cybersecurity #artificialintelligence #pentesting #podcast #Deepfakes #chatgpt #llm #infosec #aiincybersecurity #generativeai #clippyisback 00:00 – Intro: Art, AI, and Losing Viewers 00:33 – The Hollywood AI Myth: Smart Computer = Death 02:25 – Breaking Down AI Fear and Misunderstanding 03:47 – What AI Actually Is (and Isn’t) 05:19 – Remembering Clippy: The First “AI Assistant” 06:20 – Demystifying AI Through NIST Definitions 08:45 – AI vs. Machine Learning: What’s the Difference? 11:18 – What is a Large Language Model (LLM)? 12:31 – Generative AI & Artificial General Intelligence (AGI) 13:56 – Can AGI Replace Humans? A Futurist’s Perspective 16:00 – AI's Limits: Empathy, Reasoning, and Hallucinations 18:09 – Should AI Do the Menial Work While Humans Create? 19:03 – AI as Friend, Lover, and Therapist: A Cultural Shift 21:00 – The Danger of Replacing Human Connection 22:36 – AI Marriages and Japan's Pillow Brides 24:00 – AI Partners = Modern Incel Cat Ladies? 25:00 – Satire, Safety, and Securing Your AI Spouse 26:31 – Why AI Still Can’t Replace Real Human Emotion 27:19 – Hollywood’s Obsession With AI Relationships 29:03 – Don’t Replace Human Connection With Anything 29:31 – AI in Offensive Cybersecurity & Pen Testing 31:33 – AI-Powered Pentests: Regulation vs. Automation 33:13 – Exploit Development, Intuition & Quantum Chaos 34:45 – Use AI to Handle the Mundane, Focus on the Critical 36:03 – Deepfakes, CEO Scams & Social Engineering 37:23 – AI + Polymorphic Code = Scary Smart Attacks 38:55 – AI for Blue Teams: Helping Analysts, Not Replacing Them 41:21 – AI in Governance: From Policy Writing to NIST Alignment 43:11 – Academic Uses: Research, Summaries, & Cleanups 45:40 – What’s Coming: Academic Deep Dive Next Week 47:06 – Staying Relevant: Experiment, Learn, and Evolve 48:57 – AI as a Communication Tool in Cybersecurity 50:21 – NEW SEGMENT – Outrageous Statements Begins! 51:01 – AI Writes Better Phishing Emails? 51:23 – Will AI Replace SOC Analysts? 52:51 – Can You Use AI to Build a Risk Register? 54:31 – Mickey, MidJourney, and Deepfake Ethics 55:31 – AI Hallucinations Will Cause Real Incidents
In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype: what’s real, what’s marketing How tribalism creeps into tech debates—and how to resist it Data ethics, hallucinations, and the environmental cost of LLMs Graham Hancock, Atlantis, and parenting in the AI age (yes, really) Whether you're in the trenches of a SOC or guiding AI strategy at the board level, this is a conversation that will both ground you and challenge you. 📌 Follow Micah on LinkedIn: https://www.linkedin.com/in/micahheaton/ #cybersecuritypodcast, #quietdefenders, #micahheaton, #microsoftchangemaker, #aiethics, #cybersecurityleadership, #llmhype, #dataprivacy, #cyberculture, #cyberresilience, #securitycommunity, #legitimatecybersecurity, #infosec, #cybertruth
What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, tracking cybercriminals through the rise of Tor and Bitcoin, and launching the FBI’s first data wiretap. Today, he serves as Global Head of Professional Services at BlueVoyant, advising Fortune 500 companies on how to stay ahead of evolving threats. We cover: Undercover ops inside early internet predator forums The true story behind the takedown of Ross Ulbricht (Dread Pirate Roberts) How law enforcement flipped LulzSec leader Sabu Why infostealers are the most dangerous cyber tools today What 16 billion leaked credentials really mean for national security The growing gap between technical attackers and reactive defenders What CISOs still don’t understand about modern adversaries How breach fatigue and regulatory fear are undermining incident response Watch to the end for his advice to boardrooms and cybersecurity leaders on how to regain control. 👉 Subscribe for more stories from the front lines of cybersecurity. 🎧 Also available on Apple Podcasts, Spotify, and all major platforms. #Cybersecurity #DarkWeb #SilkRoad #FBI #AustinBerglas #DataBreach #CyberCrime #LegitimateCybersecurity #InfoStealers #RossUlbricht #BlueVoyant cybersecurity, silk road fbi, ross ulbricht, dark web, austin berglas, fbi cyber crime, lulzsec, breach fatigue, infostealers, 16 billion breach, cyber podcast, cybersecurity leadership, bluevoyant, legitimate cybersecurity
🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NIST CSF and ISO 27001 matter How corporate culture can make or break your cybersecurity And… how Frank may have cursed a table (seriously). 💥 Plus, find out why lying about NIST 800-171 might now get you sued by the DOJ. 🧠 Insightful. 🎯 Practical. 😂 Occasionally ridiculous. 👇 Watch, like, and subscribe — before someone clicks the wrong link. 📺 Subscribe for weekly cybersecurity content that doesn’t put you to sleep.
In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-world examples of companies affected by cyber incidents and emphasize the need for proactive measures and continuous education in the field of cybersecurity. Takeaways Cybersecurity is a continuous concern that businesses must address. Recent ransomware attacks have led to significant business failures. Organizations must adopt a proactive approach to cybersecurity. Leadership plays a crucial role in establishing cybersecurity policies. Frameworks like NIST CSF provide essential guidance for cybersecurity practices. Building a culture of cybersecurity is vital for organizational resilience. Employees are often the weakest link in cybersecurity defenses. Training and awareness are key to improving cybersecurity practices. Cybersecurity must be integrated into the overall business strategy. The landscape of cybersecurity is constantly evolving, requiring ongoing adaptation.
After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They explore: The cultural and business reasons patching never gets prioritized How vulnerability management became the garbage collection of cyber Why budget, not breaches, still drives security decision-making The role of AI as both insider and outsider threat And yes—why your dishwasher needs Wi-Fi now Part technical, part philosophical, and all-too-real, this episode lays the groundwork for future conversations on what actually works in cybersecurity—and why so much of it still doesn’t. 🎧 Whether you’re a veteran CISO, a SOC analyst, or just wondering what CVSS stands for (don’t worry, we forgot too), this one’s for you.
Comments 
loading