ПодборкаSecurity Unfiltered
Security Unfiltered
Claim Ownership

Security Unfiltered

Автор: Joe South

Подписка оформлена: 43Воспроизведенные: 457
поделиться

Описание

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
249 Episodes
Reverse
Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows of only 15 minutes during orbit • Most satellites run on outdated technology with numerous vulnerabilities that can allow complete takeover • A re...
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills needed for the future, and the balance between technological advancement and human potential. Tune in to understand the dynamics of this AI-driven era...
Send us a text Carlos Corrador shares his journey from aspiring lawyer to founding Condor Agency, a specialized marketing firm for B2B tech services companies. We explore how deep specialization, personal branding, and adapting to AI are critical for survival in today's rapidly changing business landscape. • Started as a sports journalist in Venezuela before discovering digital marketing through website building • Moved to Chicago for a master's in digital marketing before founding Condor Ag...
Send us a text Sergey Novikov shares his fascinating journey from early days at Kaspersky Lab through his evolution as a malware analyst and cybersecurity expert, offering unique insights into the changing threat landscape and ethical considerations of security research. • Started at Kaspersky in 2002 when it was a small startup with fewer than 100 employees • Applied mathematics background led to research correlating human epidemic models with computer virus propagation • Worked as a "woodp...
Send us a text SaaS platforms represent a significant security blind spot for many organizations, with misconceptions about the shared responsibility model leaving sensitive data vulnerable to exposure. Aaron Costello, Chief of SaaS Security Research at AppOmni, shares insights from his research uncovering five zero-day vulnerabilities in Salesforce Industry Clouds and explains why SaaS security requires specialized expertise. • Security teams often mistakenly believe SaaS vendors are fully ...
Send us a text Cybersecurity expert Bob Kochan from Beyond Identity discusses the evolution of security from network defense to identity-first approaches. He shares insights on how AI is transforming security operations while creating new threat vectors, emphasizing the need for phishing-resistant authentication solutions in today's threat landscape. • Traditional security focused on network layers, but SaaS adoption exposed vulnerable identity systems • Zero Trust architecture must start wi...
Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharing and community contributions • Quantum computing's progression from theoretical to practical applications in security • The challenges posed by u...
Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone to a Colorado orphanage • Joined Air Force Pararescue (PJs), enduring brutal training that forged his determination and resilience • Transitioned...
Send us a text Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast
Send us a text Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete. • Anurag's extensive background in technology from Apple to Sprint and participation in the National Broadband Task Force • How mobile messaging has infiltrated enterprises without proper security consideration • Consumer messaging ...
Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert through a chance college course • The importance of diverse experience across different security domains for career longevity • How healthcare organiz...
Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an organization's reputation and online presence • Over 93% of security professionals can't identify their company's domain registrar or DNS provider •...
Patching the Unpatchable

Patching the Unpatchable

2025-05-1901:01:48

Send us a text Root.ioDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast
Send us a text In this episode, Joe sits down with John Carse, Field CISO at SquareX, to dive into the often-overlooked world of browser security and the evolving landscape of cybersecurity. Recorded despite a 12-hour time difference (Singapore to the US!), John shares: The Browser Security Gap: Why 85% of user time in browsers is a growing risk for SaaS and cloud environments . SquareX’s Solution: How SquareX acts as an EDR for browsers, detecting and responding to threats like polymo...
Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss data to revolutionize cyber risk quantification, helping CISOs justify budgets with real financial metrics. Career Insights: Matthew shares his jou...
Send us a text In this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptability shaped his path to leadership in incident response and ransomware negotiation. Packed with insights on cybersecurity careers, leadership menta...
Send us a text Joe and Peter Ramadan dive deep into the art of communicating with executives—no fluff, just real talk. Discover how to ditch the jargon, nail concise briefings, and win trust at the top, whether you’re a security pro, tech lead, or aspiring CISO. Peter unveils his new e-learning series on executive briefings, sharing hard-earned lessons from getting his ‘bun toasted’ by a CISO to mastering the efficiency mindset CEOs crave. Packed with stories—like Joe’s two-minute security sl...
Send us a text Struggling to secure AI in 2025? Join Joe and Invary CEO Jason Rogers as they unpack NSA-licensed tech, zero trust frameworks, and the future of cybersecurity. From satellite security to battling advanced threats, discover how Invary’s cutting-edge solutions are reshaping the industry. Plus, hear Jason’s startup journey and Joe’s wild ride balancing a newborn with a PhD. Subscribe now for the latest cyber trends—don’t miss this! Chapters 00:00 Navigating Parenthood and Profe...
Send us a text In this episode, we dive into the critical world of security data strategy with experts Aqsa Taylor and Justin Borland, authors of the upcoming book Applied Security Data Strategy: A Leader’s Guide. Justin, a veteran of the Equifax breach, shares firsthand lessons from one of the biggest security incidents in history, while Aqsa explores her journey from electrical engineering to cloud security and the role of governance in data management. Together, they unpack the chall...
Send us a text Summary In this conversation, Joe and Aaron discuss Aaron's journey into cybersecurity, highlighting the importance of curiosity, perseverance, and continuous learning in the field. Aaron shares his early experiences with hacking, his transition into professional security roles, and the unique challenges of pen testing SaaS applications. The discussion emphasizes the need for passion and dedication in overcoming obstacles and achieving success in cybersecurity. In this c...
loading
Комментарии