Cyber Security can be a difficult field to not only understand but to also navigate. Derrick and Joe are here to help with over 20 years of combined experience. With this podcast we hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
Send us a textIhab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever.• Domain security is often overlooked despite being critical to an organization's reputation and online presence• Over 93% of security professionals can't identify their company's domain registrar or DNS provider• Modern cyber criminals are sophisticated organizations who target "soft targets" rather than heavily defended perimeters• AI-powered tools like FraudGPT and WormGPT enable custom malware creation for as little as $200 on the dark web• Voice cloning and deepfake technologies are being used in increasingly convincing social engineering attacks• Zero Trust architecture and layered security approaches are essential for comprehensive protection• Blended attacks targeting multiple systems simultaneously represent the future of cyber warfare• Reputation management encompasses domain protection, brand abuse prevention, and counterfeit detection• Personal data protection requires vigilance about what you share online and implementing proper security at home• Companies must have actionable response plans, not just detection capabilitiesConnect with Ihab Shraim on LinkedIn or email him at ihab.shraim@cscglobal.com to learn more about domain security and protecting your online presence.Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textDigital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifyRoot.ioDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a text In this episode, Joe sits down with John Carse, Field CISO at SquareX, to dive into the often-overlooked world of browser security and the evolving landscape of cybersecurity. Recorded despite a 12-hour time difference (Singapore to the US!), John shares:The Browser Security Gap: Why 85% of user time in browsers is a growing risk for SaaS and cloud environments .SquareX's Solution: How SquareX acts as an EDR for browsers, detecting and responding to threats like polymorphic extensions .Career Journey: From early IT days to field CISO, John reveals how foundational IT skills (help desk, field services) make better cyber professionals .Real-World Insights: Lessons from working with the US Navy and the importance of understanding IT systems for effective cybersecurity . Check Your Browser Security: Visit SquareX Browser Security to assess your controls. Learn More About SquareX: Explore their solution at sqrx.com. Connect with John: Find him on X @JohnCarseChapters00:00 Introduction and Time Zone Challenges02:54 John Carse's Journey into IT06:05 Transitioning to Cybersecurity08:46 The Importance of Customer Service in IT11:36 Formative Experiences in Help Desk and Field Services14:35 Understanding IT Systems for Cybersecurity23:51 The Interplay Between IT Skills and Cybersecurity24:41 The Role of Security Engineers in IT28:43 Understanding the Complexity of Cybersecurity29:33 Exploring the Field CISO Role32:55 The Browser as a Security Frontier42:07 Challenges in SaaS Security46:20 The Importance of Browser Security AwarenessSubscribe for more cybersecurity insights and career tips! Share your thoughts in the comments—how are you securing your browser? Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textJoin Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore:CyberSaint's Game-Changing Approach: How CyberSaint uses historical loss data to revolutionize cyber risk quantification, helping CISOs justify budgets with real financial metrics.Career Insights: Matthew shares his journey, from running startups to advising new ventures, and how he balances multiple roles (CPO, podcast host, advisor, and family man).Leadership & Communication: Why CISOs need to speak the language of business to earn a seat at the boardroom table.Practical Tips: Advice on avoiding burnout, building a mentorship network, and leveraging your personal brand in cybersecurity. Free Cyber Risk Analysis: Visit CyberSaint.io to benchmark your organization's cyber risk against industry peers. Connect with Matthew: Find him on LinkedIn Matthew Alderman or X @Maldermania Listen to Matthew's Podcast: Check out Business Security Weekly at securityweekly.com/BSW.Chapters00:00 Reconnecting and Reflecting on Podcasting Journey02:19 Balancing Multiple Roles and Responsibilities05:44 The Importance of Personal Well-being07:53 Career Goals and Retirement Aspirations10:31 Integrating Consulting and Podcasting11:55 The Value of Mentorship in Professional Growth15:02 Building Trust and Reputation in Networking16:39 Leveraging Podcasting for Career Opportunities18:20 Innovations in Cyber Risk Management23:07 Integrating Risk and Control Data25:30 The Importance of Risk Quantification28:33 Communicating Cyber Risk to the Board30:41 CISO's Role in Business Strategy33:03 Free Cyber Risk Analysis Offering36:20 Customizing Risk Models39:58 Real-Time Risk Monitoring42:24 Targeting Public Companies for Cyber Risk Solutions45:14 Closing Thoughts and Future DirectionsSubscribe for more cybersecurity insights, leadership tips, and industry trends! Drop your thoughts in the comments below—how do you approach cyber risk in your organization?Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textIn this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptability shaped his path to leadership in incident response and ransomware negotiation. Packed with insights on cybersecurity careers, leadership mentality, and the future of satellite warfare, this conversation is a must-listen for aspiring security professionals and military transitioners. Connect with Ricoh at firstresponder.us or on Instagram @rico_danielson_. Subscribe for more inspiring stories!00:00 - Introduction to Ricoh Danielson02:17 - Military Background and Special Forces Transition06:40 - Career Pivot to IT and Cybersecurity16:58 - Leadership Lessons in Cyber35:40 - Digital Forensics and Ransomware Insights47:56 - How to Connect with RicohSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textJoe and Peter Ramadan dive deep into the art of communicating with executives—no fluff, just real talk. Discover how to ditch the jargon, nail concise briefings, and win trust at the top, whether you're a security pro, tech lead, or aspiring CISO. Peter unveils his new e-learning series on executive briefings, sharing hard-earned lessons from getting his ‘bun toasted' by a CISO to mastering the efficiency mindset CEOs crave. Packed with stories—like Joe's two-minute security slam dunk and Peter's factory efficiency analogy—this episode is your cheat code to leadership success. Subscribe for more raw, unfiltered insights!Chapters00:00 Authenticity in Podcasting01:55 Launching an E-Learning Series05:01 Bridging the Gap: Technical to Leadership10:06 Communicating with Executives13:45 Efficiency in Leadership19:05 The Value of Time in Business22:57 Navigating Security Tools and Budget Constraints27:03 Embracing Leadership and Asking for HelpE-Learning Series Links: https://youtu.be/E8sZEMWHRHMhttps://www.youtube.com/watch?v=fYmCzpcg9gwSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textStruggling to secure AI in 2025? Join Joe and Invary CEO Jason Rogers as they unpack NSA-licensed tech, zero trust frameworks, and the future of cybersecurity. From satellite security to battling advanced threats, discover how Invary's cutting-edge solutions are reshaping the industry. Plus, hear Jason's startup journey and Joe's wild ride balancing a newborn with a PhD. Subscribe now for the latest cyber trends—don't miss this!Chapters00:00 Navigating Parenthood and Professional Life02:53 The Startup Mentality: Decision-Making and Adaptability06:13 Blending Technical Skills with Sales08:58 Background and Journey into Cybersecurity12:10 Establishing a Security Culture in Organizations14:51 Collaborating with Government Entities17:47 Understanding NSA Licensed Technology23:06 Understanding Application and Server Security25:01 Exploring Zero Trust Frameworks28:57 Bridging Government and Private Sector Security31:27 The Role of Security Professionals33:55 Innovations in Cybersecurity Technology38:05 Invariance in Security SystemsSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a text In this episode, we dive into the critical world of security data strategy with experts Aqsa Taylor and Justin Borland, authors of the upcoming book Applied Security Data Strategy: A Leader's Guide. Justin, a veteran of the Equifax breach, shares firsthand lessons from one of the biggest security incidents in history, while Aqsa explores her journey from electrical engineering to cloud security and the role of governance in data management. Together, they unpack the challenges of handling massive security data, the power of real-time analytics, and how Abstract Security's platform transforms data strategy with deduplication, normalization, and tiered storage. Perfect for CIOs, CSOs, and security pros looking to future-proof their organizations. Subscribe for more cybersecurity insights!Key Points Covered:Introduction to Aqsa Taylor and Justin Borland, emphasizing their expertise and new book.Justin's Equifax experience as a compelling narrative hook.Aqsa's background and insights on governance and cloud security.Abstract Security's innovative approach to data strategy (deduplication, real-time analytics, etc.).Target audience callout (CIOs, CSOs, security professionals) and a subscription prompt.Why this description? It's concise, highlights the episode's value, and uses action-oriented language to engage viewers. It balances technical appeal with accessibility for a broad cybersecurity audience. Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a text SummaryIn this conversation, Joe and Aaron discuss Aaron's journey into cybersecurity, highlighting the importance of curiosity, perseverance, and continuous learning in the field. Aaron shares his early experiences with hacking, his transition into professional security roles, and the unique challenges of pen testing SaaS applications. The discussion emphasizes the need for passion and dedication in overcoming obstacles and achieving success in cybersecurity. In this conversation, Joe and Aaron discuss the importance of sharing knowledge in the field of SaaS security, highlighting how personal initiatives like blogging can lead to unexpected career opportunities. They delve into the challenges organizations face regarding SaaS application risks, the significance of inventory management, and the shared responsibility model in security. The discussion also emphasizes the need for awareness of misconfigurations and reassures listeners that coding skills are not a prerequisite for entering the SaaS security space.Chapters00:00 Introduction and Personal Background08:27 Journey into Cybersecurity17:00 Perseverance in Learning and Growth20:49 Pen Testing SaaS Applications26:51 The Power of Sharing Knowledge29:06 Discovering New Opportunities in SaaS Security32:45 Understanding SaaS Application Risks35:32 The Importance of SaaS Inventory Management38:43 Shared Responsibility in SaaS Security41:51 Misconfigurations and Security Awareness45:01 Navigating SaaS Security Without Coding Skills Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
Send us a textWe dive into the complex world of cybersecurity through the eyes of Jeremy from Intel 471, exploring his journey from journalism to cyber threat intelligence. The discussion encompasses the evolution of cybercrime, the significance of ransomware, and future trends impacting cybersecurity.• Transition from journalism to cyber intelligence • Engaging with threat actors in cyber forums • Overview of Intel 471 and its mission • Ransomware trends and their implications • The intersection of nation-state actors and cybercrime • Impact of law enforcement collaboration on cyber investigations • Predictions for cybersecurity trends in 2025 • Importance of securing exposed attack surfaces • Call to action for increased cyber resilienceSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textThis episode explores the challenges of making a meaningful impact in podcasting and cybersecurity amidst a sea of influencers and superficial content. The discussion highlights the importance of authenticity, technical expertise, and effective leadership in building a sustainable path forward in both fields.• Importance of genuine value in podcasting • Dangers of influencer-driven superficiality • Navigating personal and professional growth • Project management as a key leadership skill • Managing burnout and team dynamics • Balancing proactive and reactive responses to crises Peter Ramadan shares insights on his growth in cybersecurity and offers advice on where to find additional resources and learning opportunities.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textThis episode explores the intricate balance between career aspirations and parenthood, highlighting how remote work has transformed traditional workplace dynamics. The conversation touches on evolving priorities, the impact of AI on cybersecurity, and the challenges of pursuing advanced education while managing family responsibilities. • The shifting nature of work-life balance for parents • The importance of remote work flexibility • Experiences in the cybersecurity field and investigations • The role of AI in cybersecurity and privacy concerns • The challenges of returning to education with family commitmentsSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textCybersecurity enthusiasts and curious minds alike are in for a treat with our conversation featuring the esteemed David Holtzman, a cybersecurity virtuoso whose journey will both inspire and educate. Discover why the real mastery in cybersecurity transcends formal certifications, as David shares his formative experiences from high school to the present. His story emphasizes the critical role of curiosity and problem-solving skills, offering valuable insights for those venturing into this ever-evolving field. You'll gain a fresh perspective on what it truly takes to be an expert in cybersecurity as David and I explore the foundational knowledge and mindset essential for success.Shift gears with us as we explore a captivating transition from the allure of traditional luxury sports cars to the groundbreaking innovation of Tesla vehicles. Our discourse navigates the shift in skills from mechanical to digital and unravels the challenges of maintaining vintage cars versus embracing new-age technology. Dive into the quirks of modern tech frustrations, such as dealing with printers, against a backdrop of fascinating anecdotes from my NSA experience. This segment paints a vivid picture of how technology has transformed both personal passions and professional landscapes over the decades.Rounding out our conversation, we tackle the future of AI-driven cybersecurity and the pressing concerns around AI security and privacy. As we weave through the complex tapestry of intelligence work from the past to the potential of decentralized systems, we consider the implications of centralization and the innovations of web3. Witness the exciting possibilities of blockchain in enhancing network security, and reflect on the importance of interdisciplinary skills that prepare professionals for the unknowns of the tech world. This episode promises to enlighten, challenge, and inspire those seeking to understand the nuanced world of cybersecurity and technology's future.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textThis episode delves into personal reflections on the year 2024, embracing both challenges and achievements while emphasizing the importance of setting and celebrating goals. Listeners are encouraged to envision their future selves and prepare for an impactful 2025 filled with hands-on learning and expert insights. • Importance of self-reflection during year-end • Goal setting as a tool for personal growth • Celebrating small victories • Envisioning your future self and goals • Essential skills for aspiring professionals • Commitment to hands-on mentorship in future episodes • Introduction of expert guests in the upcoming year • Perseverance and the realization of long-held dreams • Encouragement to take a break and acknowledge achievementsSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textWhat if balancing the demands of a thriving IT business with personal well-being was as simple as training for a triathlon? Join us for an enlightening conversation with Nathan Whittacre, co-founder of Stimulus Technologies, as he shares his transformative journey from a childhood obsession with video games on an Atari 800XL to launching a successful IT and cybersecurity firm. Nathan's story is a testament to the power of self-taught skills and the evolving landscape of technology; his insights offer a roadmap for aspiring tech entrepreneurs navigating their own paths.Nathan opens up about the personal challenges of entrepreneurship, drawing parallels between the strategic planning required for endurance sports and business growth. He candidly recounts the early days of Stimulus Technologies, where neglecting self-care was a common pitfall, and shares practical strategies for maintaining mental well-being, like turning off work notifications and engaging in endurance sports. From the hilarious misstep of an illegal candy store to the gritty realities of juggling business decisions and personal health, Nathan's anecdotes provide both inspiration and cautionary tales for anyone building a business.Listeners will gain valuable insights from Nathan's experiences, particularly in the balancing act of setting career goals alongside personal ambitions. He discusses the intricacies of training for an Ironman and how the calculated risks and strategic decisions made in sports mirror those in business. For those eager to connect with Nathan, he offers a unique opportunity: reach out to him on LinkedIn for a chance to receive a physical copy of his book, "The CEO's Digital Survival Guide." Whether you're an aspiring entrepreneur or a seasoned professional, this episode promises a wealth of knowledge on navigating both the digital and entrepreneurial landscapes.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textEver wondered how a military intelligence background could transform a career in cybersecurity? Meet Daniel Schechter, our guest who began his journey in the Israeli Defense Forces' elite Unit 8200, and now navigates the fast-paced world of IT security. Daniel's story is one of transition and growth, illustrating how skills honed in intelligence work can be leveraged to tackle the challenges of modern cybersecurity. Through his personal anecdotes, Daniel offers a glimpse into the real-time, analytical capabilities that cyber technology brings to intelligence and how this shapes operations today.For those curious about a cybersecurity career, this episode is a treasure trove of insights. We promise to take you through the steep learning curves and the passion required to thrive in this ever-evolving field. With stories that range from military parallels to reflections shared with my wife, who also works in computer security, we paint a vivid picture of the vast responsibilities and exhilarating potential within the cybersecurity landscape. It's a field where continuous learning isn't just an asset; it's a necessity.As the digital world shifts towards cloud-based solutions, we tackle the intricate challenges this brings to IT security. From understanding cloud security roles to enhancing product security with AI, our conversation uncovers the critical need for diverse expertise to manage these advances. We explore building collaborative relationships between developers and security teams, emphasizing the essential role of communication and mutual respect in addressing vulnerabilities. Whether you're a seasoned professional or a newcomer, this episode offers a comprehensive view of the cybersecurity realm's dynamic nature.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textEver wondered how to juggle building a personal brand, consulting, and family life all while staying sane? Join us as Colby DeRodeff, an expert in this very balancing act, shares his secrets for mastering time management and finding stability in uncertain times. We promise you'll come away with practical insights into handling economic challenges and utilizing AI's potential in cost reduction, tempered with a healthy dose of skepticism about its true impact.Colby opens up about the pitfalls of regional content targeting and the quest for unbiased information in our digital age. Hear how a misadventure with algorithmic targeting in Tennessee left him questioning how location shapes our media consumption. Plus, we dive into a critical evaluation of AI language models and the misinformation risks they pose, urging listeners to maintain a skeptical eye amid the relentless digital noise.In the world of startups and family life, Colby offers a candid account of navigating the ever-evolving responsibilities and challenges. From robust security measures and the temptation to cut corners in startups, to the personal dynamics of raising a family, his journey is filled with lessons on risk management and career goals. We also explore the high-stakes world of cloud security, discussing innovative data management strategies and the importance of prioritizing customer experiences over mere cost-cutting.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textAnne Baker's journey from mechanical engineering to cybersecurity marketing is nothing short of inspiring. With a love for math inherited from her father, Anne began her career at Boeing before leveraging her engineering skills in various roles, eventually landing in the tech-forward world of cybersecurity marketing. We share our own unconventional paths, including a leap from criminal justice to cloud security engineering, while highlighting the diverse backgrounds that enrich this field. The demand for cybersecurity talent is growing rapidly, evidenced by unique career shifts like an opera singer becoming an application security engineer.The discussion turns to the significant role soft skills play in cybersecurity, often overshadowed by the emphasis on technical prowess. Drawing from personal experiences, we underline the necessity of communication and conflict resolution skills, learned in high-pressure roles, to succeed in cybersecurity. It's crucial for candidates to balance technical expertise with the ability to foster teamwork and drive security initiatives through effective communication. Hiring for attitude and aptitude, not just technical skills, can lead to growth and stability in this fast-evolving industry.Interdepartmental dynamics in cybersecurity bring their own set of challenges, from maintaining security protocols under developer pressure to the tension between IT and security teams. We explore how effective communication and emotional control are vital in fostering productive relationships across teams. Additionally, the conversation highlights the innovation of Adaptiva's OneSite platform in automating vulnerability management, helping simplify the patching process. To top it all off, we discuss a remarkable opportunity for aspiring cybersecurity professionals: scholarships for the Microsoft Fundamentals course in security, offered through a collaboration with Women in the Cloud. This inclusive initiative is a great starting point for anyone looking to enhance their cybersecurity knowledge and skills.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textBrad's journey from sci-fi enthusiast to cybersecurity expert is an unconventional path filled with unexpected twists and valuable insights. Hear firsthand how his initial pursuit of engineering took a dramatic turn following 9/11, leading him to the military and into the Signal Corps, where his foundation in cybersecurity was forged. Discover how his experiences at SecureWorks highlight his dedication to diversifying the cybersecurity workforce by recruiting and training talent from varied backgrounds, making this field accessible to all with a passion for tech and a willingness to learn.Step into the high-stakes environment of cybersecurity as Brad shares gripping tales from mission deployments where every second counts. Feel the adrenaline of operating in high-pressure situations and the critical role certifications play in carving out a successful career in this field. Brad sheds light on the diverse backgrounds of cybersecurity professionals, illustrating how police officers and others transitioned into this field, proving that aptitude and determination often outweigh traditional education in achieving success.In the face of rapid AI integration, organizations encounter new hurdles with shadow IT and unsanctioned applications. Explore the intricate landscape of AI security threats and the pressing need for secure implementation, as Brad outlines the challenges posed by AI's rise. With over 92% of organizations facing data breaches from unauthorized apps, the urgency for robust security measures is palpable. Concluding with ways to connect with Brad and Morphysack, this episode promises a treasure trove of insights and a peek into future conversations on emerging AI threats.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textJourney into the world of cybersecurity with Idan Plotnik, a true pioneer in the field, as he revisits the path that led him to become a leading figure in tech innovation. Starting with a childhood fascination for computers, Idan advanced to play a pivotal role in the Israeli cyber security unit, eventually founding Erato, which caught the eye of Microsoft. He shares insights from his tenure as General Manager for Software Engineering at #Microsoft and how his encounters with Satya Nadella ignited his passion to launch his first company in 2019. This episode unravels the stark differences between nimble startups and the often sluggish corporate giants, offering a compelling narrative for aspiring entrepreneurs and industry veterans alike. Explore the sophisticated challenges of ensuring software and cloud security in today's fast-paced tech environments. With cloud platforms like AWS, Azure, and GCP enabling swift deployments, safeguarding software architecture before cloud deployment becomes crucial. Dive into the intricacies of Apiiro's ASPM platform, which revolutionizes the detection and management of code changes for enhanced security measures. The conversation expands into the realm of AI, highlighting emerging threats and innovative risk-management strategies employed by companies like Apiiro. This episode promises essential insights into balancing development speed with security needs, preparing listeners for the future trajectory of AI in software security.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textIn this engaging conversation, Robert Vescio shares his unique journey from horticulture to cybersecurity, emphasizing the importance of economics in understanding cyber risk. The discussion highlights the value of learning from mistakes, the need for transparency in cyber risk management, and the cultural challenges within the cybersecurity field. Vescio advocates for a compassionate approach to cybersecurity, encouraging professionals to embrace failure as a learning opportunity. He also introduces X Analytics, a platform designed to simplify cyber risk management and provide organizations with a clear understanding of their cyber risk condition.Chapters00:00 Navigating the Conference Landscape02:53 From Horticulture to Cybersecurity: A Unique Journey06:09 The Importance of Economics in Cybersecurity09:00 Learning Through Mistakes: A Personal Journey12:05 The Culture of Mistakes in Cybersecurity14:54 The Need for Transparency in Cyber Risk18:06 The Role of Boldness in Career Growth21:14 Embracing Failure: Lessons from NASA24:00 Understanding Cyber Risk Management26:58 The Impact of Cyber Incidents on Businesses30:01 The Importance of Compassion in Cybersecurity33:13 X Analytics: Simplifying Cyber Risk Management#podcast #techsecurity #informationsecurity #cybersecurity #aiSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textA cybersecurity journey like no other awaits as we welcome a guest with a formidable background, shaped by their experiences in the Israeli military's elite 8200th unit. This exceptional career path led them from the rigors of military service to the academic halls of the Technion—Israel's very own MIT. We uncover how their military training instilled a unique blend of independence and early responsibility, setting the stage for their significant contributions to the tech world. The conversation flows seamlessly from past to present, as personal anecdotes bring a tangible sense of nostalgia, highlighting the timeless aspects of technology amidst its relentless evolution.Our discussion takes a thrilling entrepreneurial turn as our guest shares their pioneering efforts in the realm of secure communication. From mobile graphics to R&D management, they recount their journey toward founding a company dedicated to privacy-focused smartphone solutions. The narrative of "Unplugged" unfolds—a venture born out of the pressing demand for secure, private devices. With the rise in privacy awareness and improved supply chain accessibility, our guest reveals how these factors have democratized innovation, allowing even small companies to make a mark in the hardware space.The intricacies of mobile security and data privacy are laid bare as we compare Android and iPhone architectures. Our guest captivates us with their firsthand experience in a cybersecurity course, where Apple's preemptive patching contrasted sharply with a swift Android exploit. This conversation extends to the broader issues of data privacy, exploring how major tech companies manage user data and the monetization behind it. As we ponder the future of privacy and security in the digital age, our guest's insights illuminate the path forward, underscoring the multifaceted challenges and opportunities that lie ahead.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textReady to unlock the secrets of cryptography and cybersecurity from a seasoned expert? Join us as we welcome back Jeff Man for the riveting second part of his story, where he navigates a hectic schedule filled with speaking engagements at premier conferences like B-sides Edmonton and GurrCon. Jeff opens up about his efforts to achieve work-life balance and self-care, sharing plans for a rejuvenating two-week road trip and the enriching experience of spending quality time with his spouse. The episode is a treasure trove of insights into personal growth and the delicate dance of integrating professional and personal lives, especially in the wake of retirement and the COVID-19 lockdown.Travel back to 1987 and explore the pivotal role Jeff played at the NSA in enhancing military communications security. We delve into his assignment on the manual crypto systems branch, where he utilized classic cryptographic techniques, including the cipher wheel, to improve the US Special Forces' communication methods. With detailed anecdotes, Jeff recounts how he tackled the challenge of creating a practical and secure solution that could be easily memorized by field operatives, shedding light on the evolution of cryptographic practices and their profound impact on military operations.Our journey through the world of espionage and cybersecurity continues as Jeff shares captivating stories of government espionage, data collection, and the technological advancements that often remain hidden from the public eye. From Cold War tactics to modern data interception techniques, Jeff provides a comprehensive overview of the cyclical nature of intelligence work. Rounding out the episode, Jeff reflects on his transition from the NSA to the private sector, candidly discussing the ethical challenges and evolving landscape of cybersecurity. Don't miss this fascinating exploration of history, personal growth, and the ever-changing world of cybersecurity.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textFeeling burnt out in the tech industry? Discover how to reclaim your work-life balance and enhance your professional journey with our latest episode featuring Tyler Robinson, a veteran in cybersecurity. Listen in as Tyler recounts his unconventional start in the 90s with phone phreaking, which eventually led him to manage his high school network and develop a dual interest in both offensive and defensive security. His story exemplifies the immense value of bringing diverse skill sets into the tech world, including business acumen, psychological insights, and project management expertise.Ever wondered how to communicate complex technical details to non-technical audiences effectively? We highlight the importance of technical writing and soft skills in cybersecurity. By mastering these, you'll stand out in an industry that values the ability to translate technical jargon into strategic insights for executives. We also dive into the necessity of understanding business fundamentals like ROI and taxes, helping you bridge the gap between compliance and real business risks. Tyler shares valuable advice on creative thinking, the adversary mindset, and the importance of finding personal fulfillment in work to stave off burnout.The tech sector is facing a shortage of experienced professionals, and Tyler provides a compelling case for robust mentorship and relationship-based hiring. Hear about the absurdity of traditional HR requirements, like a Kubernetes creator being turned down for not having enough experience with Kubernetes. Learn why bypassing these outdated processes in favor of direct connections within the community can lead to better hires and stronger teams. With a focus on unsung heroes in cybersecurity and the critical yet unrecognized roles that drive meaningful impact, this episode is a must-listen for anyone looking to make a genuine difference in the field.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textEver wondered how a psychology degree can lead to a cybersecurity career? Join us as Richard Cassidy reveals his remarkable journey from a teenage computer enthusiast to a leading expert in IT and cybersecurity. Richard shares intimate stories from his early days, including how he transitioned from psychology to an apprenticeship at a major American bank in London, where he started with simple tasks like replacing toner cartridges before quickly advancing into more complex roles in networking and firewall management. His career evolution over 26 years, culminating in a significant presence in the vendor space, underscores the importance of hands-on experience and continuous learning in this dynamic field.In this episode, we'll uncover the vital aspects of data security and disaster recovery that every organization should prioritize. Richard delves into the limitations of traditional security methods and emphasizes the necessity for modern solutions like zero trust, immutability, and data observability, particularly those offered by Rubrik. Through compelling anecdotes, he highlights the dire consequences of relying on outdated systems, such as an obsolete tape backup setup, and advocates for cloud-based disaster recovery plans that ensure business continuity and quick recovery from ransomware attacks. This discussion serves as a crucial reminder that comprehensive data security strategies are non-negotiable in today's threat landscape.Lastly, we tackle the unique cybersecurity challenges faced by healthcare organizations, especially under financial constraints. Richard discusses the complexities of integrating multiple technologies and the critical need for robust recovery processes, including manual fallback plans that are rigorously tested. Drawing insights from the Rubrik Zero Labs report, he highlights the often-overlooked pitfalls and encourages connecting with like-minded professionals to share knowledge and best practices. Tune in to gain valuable perspectives on navigating cybersecurity in the healthcare sector and beyond, ensuring resilience against ever-evolving threats while focusing on customer needs.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textWhat if you could pivot from a career in intelligence analysis to becoming a cybersecurity expert, all by leveraging self-taught skills and open-source intelligence? Join us as Scott Small reveals his inspiring journey, transitioning from dealing with physical security threats to mastering cybersecurity. He shares the invaluable role of supportive hiring managers and highlights how programming in Python opened doors in the private sector, showcasing the diverse paths available in this dynamic field.Creating your own opportunities is crucial in technical fields, and Scott emphasizes the power of initiative. From starting a blog to contributing to community repositories, he offers practical advice for building a robust portfolio. We also discuss the importance of networking, the impact of geopolitical events on cyber threats, and how storytelling bridges gaps within the security sector. Scott's insights provide a roadmap for aspiring professionals eager to break into cybersecurity.Artificial intelligence is revolutionizing cyber threat intelligence, but it comes with its own set of challenges. Scott and I delve into the complexities of AI-generated data, the necessity of rigorous validation, and the importance of frameworks like MITRE ATT&CK. We explore enhancing detection capabilities and the role of consistent practice in writing and data visualization for professional growth. Whether you're a seasoned expert or just starting out, this episode is packed with actionable insights to help you navigate the evolving landscape of cybersecurity.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textWhat if the smallest oversight in software could have catastrophic consequences? Join us as we uncover the remarkable journey of Jake, a visionary engineer who has made significant strides in the tech industry. From his days at the University of Michigan to influential positions at Boeing, Amazon, and Google, Jake's story is a testament to the power of curiosity and relentless problem-solving. Discover how he pioneered Quay, the first private Docker registry, and positioned himself at the cutting edge of security and containerization.Ever wondered about the stringent processes behind aviation software? Jake takes us through his meticulous work at Boeing, where creating safety-critical software is both a science and an art. He shares the rigorous testing and standards like DO-178B and MCDC that ensure the fail-safe operation of flight systems. Jake's insights illuminate how even the smallest IT services can have profound impacts on safety, offering a rare glimpse into the interconnected world of aviation technology and its regulations born from past tragedies.As we wrap up, we venture into the realm of high availability software and evolving security technologies. Jake draws parallels from the aviation industry to illustrate the importance of redundancy and robust planning against failures. He discusses the benefits of unified authorization services and modern models, providing practical advice for handling software downtimes and authorization challenges in today's dynamic IT environments. Finally, listeners can learn how to connect with Jake and explore his current venture, Authzed, gaining further insights into innovative security solutions. This episode promises invaluable takeaways for tech enthusiasts and professionals alike.Support the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textWhat if you could protect your organization's data as effortlessly as sending an email? Join us for an enlightening conversation with Matt Howard, a veteran IT professional whose career spans the dawn of the application service provider model to the forefront of open-source software and application security. Matt's experience at tech conferences like DEFCON and Black Hat offers a firsthand look at the evolution of IT security. From his early days navigating the chaotic tech landscape to mastering the full technology stack, Matt's journey reveals critical insights for anyone aspiring to excel in the field of IT.Discover the future of data security architecture as Matt delves into the complexities of securing data within the finance industry and beyond. Learn how adopting a granular security architecture, similar to microservices in software development, can revolutionize secure data sharing across organizational boundaries. Through real-world applications, such as military alliances needing instantaneous and secure information exchange, Matt emphasizes the importance of dynamic, policy-driven access controls. His insights paint a picture of a more interconnected and securely collaborative world, one where data protection adapts to the demands of the moment.Trace the historical milestones of data security with Matt, from the emergence of thin client computing to the rise of cloud services and microservices. Hear about key developments like Lotus Notes and the vital role of cryptography, as well as the modern-day necessity of encryption. Learn about Virtru's innovative approach to simplifying data security with user-friendly encryption tools integrated into everyday platforms like Gmail and Outlook. Lastly, Matt introduces us to the Technical Data Format (TDF) and the OpenTDF project, shedding light on how they provide granular security benefits and regulatory compliance. As we conclude, Matt shares the privacy-centric philosophy of Virtru's founders and how you can connect with him for further insights.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a textEver wondered what it takes to stay one step ahead of cybercriminals? This episode, featuring cybersecurity expert Chris Hale, promises to unravel the complexities of safeguarding digital fortresses while sharing invaluable lessons from the frontlines. Chris's journey from a help desk technician to the founder of his own cybersecurity firm is nothing short of inspiring. His early interest in computers, paired with a dual major in Exercise Sport Science and Computer Information Systems, laid the foundation for a career that would see him tackling email viruses at Sports Authority and defending against sophisticated malware and ransomware attacks.The conversation shifts to the high-stakes world of incident response teams, where Chris recounts a harrowing ransomware incident caused by the absence of two-factor authentication on a global admin account. The relentless effort required to handle such crises, including long hours and meticulous post-mortem analyses, underscores the critical role of managed service providers (MSPs) and managed security service providers (MSSPs) in maintaining robust security practices and compliance. Chris's firsthand experiences highlight the importance of hands-on training and continuous learning, offering listeners a realistic glimpse into the demands and rewards of a career in cybersecurity.We also navigate the evolving threat landscape, discussing the necessity of quarterly audits, penetration testing, and consistent security practices across global enterprises. Chris shares insights into the importance of continuous cybersecurity training for all organizational levels, using tools like Breach Secure Now to keep security awareness sharp. The episode wraps up with a discussion on the recent CrowdStrike update debacle and the challenges of choosing reliable Endpoint Detection and Response (EDR) solutions. Through Chris's expert lens, listeners gain a comprehensive understanding of the current issues and best practices in cybersecurity, making this episode a must-listen for anyone invested in protecting their digital assets.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.What happens when a seasoned American cybersecurity expert navigates the intricate world of European data privacy? Richard Hollis, with over three decades in the cybersecurity industry, shares his captivating journey from Washington DC's government projects to leading Risk Crew in London. Listen as Richard emphasizes the critical role of process over products in cybersecurity and offers a wealth of insights into the ever-changing threat landscape. Along the way, he recounts the unique challenges and personal experiences of living and working in Europe, shedding light on the cultural contrasts that shape global cybersecurity practices.Imagine the personalized service of a cigar lounge in Germany and the stringent protections of GDPR — a stark contrast to American business practices and views on data privacy. This episode unpacks the cultural differences between Europe and America with vivid anecdotes and eye-opening discussions. We explore how European values around data privacy influence business operations and consumer rights, offering a fresh perspective on what Americans might learn from these practices. Richard's insights help bridge the gap, revealing the importance of robust data protections in today's interconnected world.Our conversation also delves into the urgent need for enhanced data privacy and cybersecurity regulations, drawing parallels to past safety improvements in other industries. Richard shares his candid thoughts on the influence of big tech companies and the current inadequacies in data protection measures. Reflecting on personal stakes and the emotional disconnect many professionals have with data security, we highlight the broader implications for both individuals and businesses. Don't miss this engaging episode that combines expert insights with a unique cross-cultural perspective, offering valuable lessons for listeners on both sides of the Atlantic.Chapters00:00 Introduction and Appreciation for the Podcast00:52 Richard's Background in Cybersecurity05:45 Living in Europe and Cultural Differences12:09 Being an American in Europe16:00 Data Privacy and GDPR20:12 The Lack of Federal Regulation for Data Protection in the US25:14 The Historical Context of Europe Compared to America31:20 The Impact of America's Size on Data Privacy Laws34:16 The Need for a Ralph Nader for Data Privacy36:07 Monetization of Personal Data and Lack of Accountability41:37 Differences in Mindset: Americans vs Europeans on Data PrivacyLifeLine 911A podcast hosted by 911 First Responders to discuss issues and stories in the field.Listen on: Apple Podcasts SpotifySupport the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.Have you ever wondered how drastically your media consumption could change just by crossing state lines? During a recent family vacation to Nashville, I experienced firsthand how my YouTube and social media feeds were manipulated to present opposing political views. This episode exposes the unnerving reality of regional media targeting, especially as we approach election season. By exploring the ease with which these platforms can alter our perspectives based on location, we uncover the potential for significant influence on public opinion.As we navigate through today's politically charged environment, it's more critical than ever to question the information presented to us. We discuss the alarming trend of historical facts being twisted or forgotten, drawing parallels to the propaganda tactics of the past. This episode underscores the importance of verifying sources and staying vigilant against misinformation. With election season on the horizon, our focus is on fostering awareness and preparedness to resist the unprecedented levels of targeted media influence aimed at swaying our opinions. Join us in this vital conversation about maintaining the integrity of our perspectives in the face of sophisticated propaganda techniques.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.How does a mischievous high school curiosity evolve into a rich, multifaceted career in IT and security? This episode promises a deep dive into Michael Goldstein's fascinating journey from tinkering with school computers to becoming an influential figure during the PC revolution. Learn from Michael's transition from mainframe to PC environments and his crucial role in an early managed service provider, all while absorbing the lessons of adaptability and foresight that have marked his professional life. Michael's story is not just a tale of technological advancement but a guide for anyone looking to carve their own path in IT and security.Ever wondered how to break into the world of IT and security? Michael offers actionable insights, emphasizing the foundational role of help desk positions and the vital troubleshooting skills necessary to thrive. The episode delves into the mental fortitude required in security roles, painting a picture of seasoned professionals who tackle complex problems with strategic independence. Through personal anecdotes and professional reflections, we underscore the importance of teamwork and versatility, drawing comparisons to the multifaceted skill sets needed for success in various IT roles.In your quest for success in the tech industry, what entrepreneurial lessons can you glean from a seasoned professional? Michael shares his entrepreneurial journey, discussing the challenges of adapting to industry changes and the importance of staying ahead with emerging technologies like AI and cybersecurity. Gain insights into forming the right team and treating customers with genuine respect, while also exploring the transformative applications of AI in business operations. Michael's conversation offers real-world examples and thought-provoking topics, making this episode a must-listen for anyone interested in the current and future landscape of technology.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.Imagine the bustling energy of DEF CON suddenly shifting from Caesars to the Las Vegas Convention Center. How will this change impact the magic of one of the world's most renowned cybersecurity events? Join us as we share personal experiences from past DEF CONs, consider the logistical hurdles, and discuss the potential financial implications for local resorts. Our guest, Rui Ribeiro, brings his invaluable insights into how such changes can alter the attendee experience, setting the stage for a deep dive into his impressive professional journey in cybersecurity.As we navigate the realm of client-side security, we uncover the fascinating story behind the founding of Chase Prep. From the chaotic days of the early internet boom to a pivotal meeting with Cloudflare's CEO, we explore the transformative power of JavaScript and the intricate parallels between telecom and banking industries. Rui and I emphasize the critical need for clear communication of security requirements to decision-makers, particularly in emerging markets, highlighting the often-overlooked technical challenges and opportunities in this niche field.Our conversation also tackles the evolving landscape of cybersecurity with a focus on balancing technical and soft skills. We discuss strategies for embedding security into everyday processes, the importance of adaptive security measures, and how rapid advancements like those during COVID-19 have reshaped business practices. From insurance risks and evolving security models to the joy of building a safer digital world, this episode covers the passion and practicalities that drive us in the field of cybersecurity. Join us for an enlightening discussion that promises to leave you with fresh insights and actionable takeaways.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.In this insightful interview, Joe sits down with cybersecurity expert Mr. Jeff Man to delve into his extensive background in security and his impactful tenure at the National Security Agency (NSA). They explore how Jeff embarked on his security career, the critical mission of the NSA, and the agency's compartmentalized structure. Jeff recounts his experiences working on significant projects at the NSA and underscores the importance of compartmentalization for security. The discussion also highlights the challenges of government work and the stringent entry requirements for agencies like the NSA.The conversation spans various topics, including the complexities of handling different telecom and operating systems, the advanced technology at the NSA, the pioneering days of hacking and network security, and the formation of the first red team. Jeff shares his motivations for staying at the NSA and the circumstances that led to his departure. Additionally, he talks about his current work in PCI compliance and his active participation in the security community through conferences and podcasts. Don't miss this deep dive into the world of cybersecurity from a seasoned expert.00:00 Introduction and Podcasting03:47 Getting into Security10:47 Jeff's Background and Entry into the NSA15:58 The Mission of the NSA22:27 Challenges of Working in the Government29:07 Overlapping Projects and Duplication of Efforts31:02 Technological Advancement at the Agency36:47 The Early Days of Hacking and Network Security51:42 Reasons for Staying at the Agency54:20 Leaving the Agency and the Significant Incident57:06 Current Work in PCI Compliance and Involvement in the Security CommunitySupport the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.In this episode, we dive into the fascinating story of Grant Borzikas, the CISO of Cloudflare. From his passion for baseball and a brief stint in accounting to becoming a prominent figure in IT, Grant's journey is anything but typical. Listen as he recounts how his father's influence and his own relentless curiosity led him into the tech world.Grant shares his early experiences balancing financial auditing and computer risk management roles at Arthur Andersen, highlighting the challenges he faced and how he overcame imposter syndrome through continuous learning. His insights and personal anecdotes offer valuable lessons for anyone navigating their career path.We discuss the importance of continuous learning for IT professionals, covering key areas such as understanding personal learning styles, asking fundamental questions, and securing certifications. Grant emphasizes building a strong foundation in technical areas like Linux, networking, and DNS, and staying ahead in rapidly evolving fields like AI and machine learning. Discover how tackling challenging subjects and maintaining curiosity can significantly enhance your career, keeping you relevant and effective in the fast-paced tech industry.The episode also explores the future of AI in cybersecurity, addressing both the promising advancements and the sophisticated threats posed by AI-driven attacks. Learn about the crucial role of data and intelligence in strengthening network security practices and the innovative approaches of companies like Cloudflare. Grant discusses the accessibility of Cloudflare's services, from creating accounts and developing websites to utilizing security solutions with ease.Packed with insights and practical tips, this episode is a must-listen for anyone interested in IT, cybersecurity, and the relentless pursuit of knowledge. Join us as we uncover the remarkable journey of Grant Borzikas and his contributions to the tech industry.What It's Like To Be...What's it like to be a Cattle Rancher? FBI Special Agent? Professional Santa? Find out!Listen on: Apple Podcasts SpotifySupport the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.What happens when a curious teenager gets hacked on AOL Instant Messenger and turns that experience into a thriving cybersecurity career? Join us as we sit down with Ron Edding from Hacker Valley Studios, who shares his journey from being a 13-year-old victim of hacking to becoming a professional at Booz Allen Hamilton by the age of 19. Along the way, he crossed paths with Marcus Carey, a pivotal mentor who recognized his potential and set him on the path to success. Ron's story underscores the importance of believing in young talent within the cybersecurity field. We explore how his initial dreams of joining federal law enforcement evolved into a passion for cybersecurity, driven by curiosity and determination. Learn how Ron faced skepticism head-on, proving that age is just a number when it comes to skill and dedication. His narrative is a testament to how setting intentions and vocalizing goals can help align opportunities, and how overcoming obstacles can fuel one's drive even further.We also dive into Ron's experiences working at Booz Allen, specifically on NSA contracts, and the unique process of obtaining security clearance. Discover the lessons learned during the "beach" period, the importance of becoming a subject matter expert, and the fine balance between meticulous documentation and creative problem-solving. Ron's journey through various challenges and his emphasis on detailed documentation provide valuable insights into career progression and the significance of mentorship and referrals in landing roles at prestigious firms.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.What if your career path took an unexpected turn into the fast-paced world of cybersecurity? Join us for an insightful conversation with Fayon, a senior cybersecurity advisor, who pivots from mathematics and mechanical engineering to become a cornerstone of breach response and risk advisory. Hear how her role as a breach assistant at an insurance company became the gateway to a successful cybersecurity career, and discover the unique challenges and rewards of navigating this dynamic field.We bring you personal stories of career transitions, from fields as diverse as mathematics and criminal justice, to the evolving landscape of cybersecurity. Fayon shares her experiences working in both reactive breach response and proactive risk advisory, shedding light on the importance of continuous learning and adaptability. This episode also tackles misconceptions about introversion in the professional world and highlights the perpetual need to stay ahead in the ever-changing cybersecurity industry.Dive into the unique challenges faced by Black women in cybersecurity as Fayon candidly discusses her experiences with imposter syndrome and the lack of representation. We also delve into the critical role of cybersecurity insurance, comparing it to auto insurance claims management, and emphasize why even small businesses need comprehensive security measures. From conducting incident response plan reviews to leveraging threat intelligence, this episode is packed with valuable insights for anyone interested in the intricate world of cybersecurity.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.Ever wondered how a degree in accounting could lead to a thriving career in cybersecurity? Join us as Chris Petersen shares his riveting journey from Colorado State University to becoming a cybersecurity expert. Initially hesitant to dive into engineering, Chris leveraged his minor in accounting information systems and a golden opportunity at Price water house to pivot into IT. His story underscores the importance of adaptability and seizing opportunities, offering invaluable insights for anyone contemplating a career shift in the tech industry.Small and medium-sized businesses (SMBs) in critical sectors often find themselves in the crosshairs of cyber adversaries. Chris and our hosts dissect the pressing cybersecurity challenges these businesses face, especially those in the defense industrial base. Learn about Radical's mission to democratize enterprise-level security through cloud technology and AI, making it affordable for vulnerable companies. We also discuss how upcoming regulations mandating third-party cybersecurity assessments could change the landscape, ensuring that contractors handling sensitive information are adequately protected.Finally, we tackle the evolving threats in the defense industry and the necessity for advanced threat detection and attribution. Chris offers an insider's perspective on the methodologies employed to counteract these sophisticated attacks. We also delve into the controversial topic of a national digital ID system, debating its potential to combat identity fraud and deep fakes while navigating the intricate balance between security and privacy. This episode is packed with critical information and actionable insights, making it a must-listen for anyone invested in the future of cybersecurity and digital identity.https://radicl.com/Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.What if you could unlock the secrets of a thriving tech career and learn how to safeguard sensitive data in the digital age? Join us for an insightful episode featuring our special guest, Ameesh Divatia, who shares his captivating journey into IT, sparked by reading tech articles in Time magazine and National Geographic. From his early fascination with electronics to pursuing electrical engineering and navigating the evolution of technology, Ameesh offers a unique perspective shaped by experiences in tech hubs like the San Francisco Bay Area.Ever wondered how stepping out of your comfort zone could propel your career in tech? We explore this theme with personal anecdotes about embracing discomfort for continuous growth, inspired by my father's philosophy. Discover how Amazon, particularly AWS, has revolutionized modern life and shopping habits. Learn about the dynamic culture of Silicon Valley, where rotating between major tech companies brings fresh perspectives. The episode also features an intriguing story about hiring practices and the essential lessons drawn from past cybersecurity breaches.Finally, we tackle the critical challenge of securing sensitive data in today's interconnected world. Dive into advanced topics such as cryptography, privacy-enhanced computation, and the looming threat of quantum computing. Understand the pivotal role of human factors in cybersecurity and how changing attitudes can enhance protection measures. This episode wraps up with insights on mastering encryption concepts and the importance of collaboration and simplification in the learning process, providing you with the knowledge to navigate the increasingly complex digital security landscape.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.Curious about the real history of artificial intelligence and how it has woven itself into the fabric of modern life? Join us as Erick Galinkin returns to share his insights on the evolution of AI, from its early conceptual stages to its present-day applications like self-driving cars. We promise you'll walk away with a deep understanding of the various levels of autonomous driving and the enormous strides AI has made, surpassing even the most ambitious expectations of the past. This is not just a technical conversation; it's a philosophical journey questioning AI's origins and contemplating its future.Discover the transformative role of massively parallel processing in AI, especially within computer vision. Learn how CUDA, initially designed for computer graphics, has become indispensable for deep learning by efficiently handling complex computations. We break down neural networks and activation functions, explaining how frameworks like TensorFlow and PyTorch leverage specialized hardware to achieve remarkable performance improvements. If you've ever wondered how deep learning mimics human neural behavior or how AI-specific hardware is optimized, this segment will be invaluable.In the latter part of our episode, we tackle the intricate relationship between AI and cybersecurity. Hear about the challenges of training machine learning models to detect malware and the dual-use nature of AI models that can serve both defensive and offensive purposes. We shed light on the complexities of securing AI systems, emphasizing the need for specialized risk management strategies distinct from traditional cloud security. From tools like Garak to frameworks like Nemo Guardrails, we explore various solutions to secure large language models and ensure they operate safely within an organization. This episode will arm you with the knowledge to understand and mitigate the risks associated with deploying AI technologies in your own projects.https://github.com/leondz/garakhttps://github.com/nvidia/nemo-guardrailsSupport the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.Is your mindset holding you back from achieving the success you desire? Discover how a simple shift in perspective can transform your life, as we share personal stories and actionable strategies to help you envision and reach your goals. Reflecting on my own journey, I recount how motivational videos in high school changed my thinking from "I can't afford that" to "How can I afford that?" This episode includes poignant anecdotes, such as navigating my sister's kidney disease and dealing with a broken air conditioning unit, to illustrate the power of maintaining a positive, proactive mindset in overcoming life's challenges.Join us as we delve into the contrasting paths siblings can take despite growing up in the same household, highlighting how different mindsets shape our futures. We explore the importance of confronting uncomfortable situations to build resilience and a growth-oriented approach to life. Drawing inspiration from influential figures like Mark Cuban and Steve Jobs, we stress the significance of setting high standards early on. Additionally, hear how a friend's daughter's perspective on wealth achievement underscores the impact of early exposure to certain lifestyles. This episode encapsulates the essence of mindset, hard work, and strategic planning as the cornerstones of lasting success.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Send us a Text Message.Are your cloud environments secure, or are they silently exposing you to threats? In this gripping episode, we sit down with security industry giant Sandy Bird from Sonrai Security. Sandy draws from his rich 20-year career, from founding Q1 Labs to his pivotal role as CTO of IBM's security division, to share invaluable insights. We uncover the evolution of cloud security, focusing on the intricate challenges of AWS IAM (Identity and Access Management). Sandy discusses how Sonrai Security is leading the way in transforming IAM with advanced analytics, helping teams effectively manage complex AWS privileges.Machine identities in cloud environments can be ticking time bombs. Sandy breaks down how developers might unintentionally create vulnerabilities that bypass traditional firewalls, making systems susceptible to external threats. With startling statistics on the number of forgotten cloud identities, we explore the enormous task of tracking these identities and the steep learning curve faced by new IAM security professionals. The conversation also covers the often non-intuitive nature of AWS permissions and API calls, adding another layer of complexity to security management.AWS environments are unique and bespoke, posing significant challenges. We discuss the intricacies of AWS certifications, the numerous traps in exam questions, and the importance of a centralized permissions firewall that offers guardrails while allowing developer freedom. Sandy introduces the idea of a 14-day trial for a cloud permissions firewall in a monitor-only mode, providing a risk-free opportunity to understand its benefits. Tune in to discover how innovative solutions are shaping the future of cloud security and why a permissions firewall could be a game-changer for your secure cloud operations.Free Trial: https://sonraisecurity.com/trial/Sonrai Security Website: https://sonraisecurity.com/LinkedIn: https://www.linkedin.com/in/sandy-bird-835b5576/Sonrai Security Sonrai prides themselves on being able to reveal every over-privileged identity and all pathsDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Experience the extraordinary journey of Indu Keri as he traverses the landscape of IT, from her upbringing in India to discovering her passion for computer science. With a choice between becoming a doctor or an engineer, Indu opted for electronics—motivated by her aversion to dissection—and eventually found herself captivated by the world of technology. In this episode, he shares compelling personal stories and underscores the immediate gratification of creating something tangible with technology, drawing parallels to hands-on professions and emphasizing the crucial role of mathematics in tech.Ever wondered how unconventional thinking can expose hidden vulnerabilities in security systems? Join us as we recount a fascinating anecdote about a simple number-guessing game used during interviews to demonstrate the importance of thinking outside the box. Indu also opens up about her own career decisions, including the pursuit of a PhD and the unexpected transition to management consulting. We discuss evolving cultural attitudes towards higher education and the profound value of betting on oneself, highlighting the skills and insights gained through diverse academic and professional experiences.Gain invaluable insights into the essential skills and mindset necessary for cybersecurity professionals. Indu emphasizes recognizing the limits of one's knowledge and collaborating with experts for effective risk management. Discover the challenge of balancing comprehensive security measures with practical approaches, and the critical need for combining prevention with detection and rapid response. Finally, explore the exciting journey of enterprise workloads moving to the public cloud, the complexities of managing hybrid environments, and the pivotal role of software-defined infrastructure in modern digital transformations. This episode promises to equip you with a deeper understanding of the dynamic world of cybersecurity and IT infrastructure.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Rocco D'Amico shares his journey into IT sales and the evolution of his business, Brass Valley, which specializes in decommissioning data centers and providing data security. The conversation touches on topics such as the shift from on-premises data centers to the cloud, the cyclical nature of technology, the depreciation of IT equipment, and the competition in the hardware industry. They also discuss the importance of continuous learning and reinventing oneself in the ever-changing IT landscape. The conversation covers topics such as cost reductions in software, recycling of electronics, and the importance of high reliability systems and learning from mistakes. The guests discuss how software prices seem inflated and how vendors often offer significant discounts. They also talk about the challenges and regulations surrounding the recycling of electronics, including the responsibility of major manufacturers to recycle their products. The conversation highlights the need for proper data destruction and the potential risks of data breaches. The guests also share insights on the implementation of high reliability practices in their businesses and the importance of communication and mentorship.The Neil Ashton PodcastThis podcast focuses on explaining the fascinating ways that science and engineering...Listen on: Apple Podcasts SpotifySupport the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Ari Andersen shares his journey from starting a podcast to founding a security startup. He discusses the importance of trust in the digital world and the need for a security layer based on trust. Ari explains how his company leverages trusted relationships to share information securely and prevent attacks like deep fakes and spoofed emails. The solution is built around the concept of pods, which are groups of trusted individuals. Ari highlights the growing risks introduced by AI and the need for innovative solutions to protect against them. Kibu is a secure communication platform that focuses on building trust and consensus among users. The app uses a unique invitation and voting system to ensure that only trusted individuals are part of a user's network. Kibu offers two ways to create a pod (a group of trusted individuals): through a digital invitation process or by physically meeting and using NFC or QR code technology. Once inside a pod, all communication and files are encrypted at the pod level, ensuring privacy and security. Kibu also uses cryptographic attestation to verify the authenticity and integrity of files within a pod. The goal of Kibu is to bring trusted relationships from the real world into the digital world and provide a secure environment for critical actions and decision-making.https://kibu.io/#podcast #security #ai #startup Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Have you ever gazed into the depths of a cybersecurity expert's mind? Prepare to be captivated as we sit down with Oliver, a virtuoso in the realms of IT and cybersecurity, whose tale unfolds from a childhood enchanted by math and sci-fi to the frontlines of digital defense. In today's episode, we peel back the layers of cybersecurity, from the bedrock of IBM mainframes to the latest in AI-driven security strategies, through the eyes of someone who has seen it all. Oliver's insights paint a vivid picture of the hacker's mindset and the relentless progression of cybersecurity challenges.Oliver doesn't shy away from the personal, either. He lays bare his struggles with imposter syndrome, reminding us that even the most seasoned professionals harbor self-doubt. This candid talk traverses the landscape of technological leadership, contrasting the role of yesterday's CTO with today's, and emphasizes the transformative journey required to shepherd teams through decades of tech evolution. With Oliver's narrative, you're invited to witness the metamorphosis of an industry and the professionals within it, rooted in the principle of lifelong learning.As we explore the shifting sands of network security, Oliver guides us through the sophisticated use of AI and machine learning in detecting cyber threats. We probe the vital nature of identity security in a boundaryless digital world and the adaptation of cybersecurity strategies to protect networks, clouds, identities, applications, and endpoints. Diving into the ethical quandaries of AI in security, we uncover the importance of safeguarding privileged access against the burgeoning capabilities of AI. Join us for this enlightening episode that promises to arm you with a deeper understanding of the complex, ever-changing theater of cybersecurity.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
When Ashley's journey led her from environmental studies to a pivotal role in cybersecurity, it wasn't just a career change – it was a reinvention. We're thrilled to share her candid story, illuminating how she balances the demands of family life with the rigors of fintech, where she excels in risk governance and vulnerability management. Ashley's narrative dismantles the myth that cybersecurity is only for the tech-savvy, showcasing how diverse experiences enrich the field.Our conversation with Ashley takes an honest look at the challenges and triumphs of establishing a comprehensive vulnerability management program. She discusses the importance of setting clear expectations and creating a supportive work environment, especially for those in development roles. Throughout our discussion, Ashley doesn't shy away from the harsh realities of workplace gender dynamics, recounting her encounters with toxic behavior and emphasizing the vital need for confidence and a culture of inclusivity.Ashley's resilience shines as she recounts overcoming career obstacles, from an unjust termination to battling negative references. She stresses the power of a nurturing workplace over the allure of a hefty paycheck. Her story serves as a beacon of encouragement for anyone contemplating a leap into cybersecurity, proving that with determination and the right support, obstacles of age and background can be conquered. Join us for this inspiring exploration of breaking barriers and forging new paths in the world of cybersecurity.Support the Show.Affiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
When Shauli stepped out of the army and into the world of engineering, little did he know that his love for math and physics would catapult him into the tech stratosphere. Our latest episode features Shauli's riveting journey as he navigates from algorithms engineering to the forefront of cybersecurity and beyond. His experiences reveal how a mix of curiosity, a robust educational background, and seizing opportunities can shape a multifaceted career in technology and startup management. We uncover the critical moments that prompted Shauli to weave his technical expertise with an MBA, shaping him into the business-savvy leader he is today.What does it take to stand out as a leader in the ever-evolving business landscape? Shauli and I dissect the fusion of an engineering mindset with the strategic foresight of an MBA, discussing how this powerful combination is essential for deciphering complex problems and steering towards success. We delve into the underestimated importance of soft skills and how international and consulting gigs can polish one's acumen for effective leadership. It's a candid exploration into the harmonic balance of technical prowess and emotional intelligence, and just how impactful this blend can be for those looking to leave their mark on the tech sector.But it's not all management talk—our conversation turns to the technical labyrinth of securing Kubernetes workloads in the cloud. Shauli sheds light on the challenges in aligning security with DevOps practices and the pressing need for Kubernetes-native security tools. We even speculate on the future of cloud infrastructure, with an eye on service offerings that may eclipse architectural shifts as the main game-changers. Join us as we navigate these complex themes, aiming to unravel the knots of cloud security misconfigurations and seeking solutions that stand up to the unique demands of operations.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Prepare to have your mind broadened and your digital defenses bolstered as we journey with cybersecurity expert Aaron Painter, whose insights from Microsoft and NameTag are nothing short of enlightening. We tackle the increasingly sophisticated realm of social engineering, where attackers prey on human psychology rather than system weaknesses. Discover the chilling ease with which these modern-day digital pickpockets can orchestrate account takeovers, and how traditional security questions are no match for their cunning. It's a deep dive into the human element of cybersecurity, with compelling anecdotes that reveal just how vulnerable we can be when our guard is down.This episode isn't just about the problems; it's a treasure trove of cutting-edge solutions! We explore the terrifying capabilities of deepfake technology and its impact on identity verification with a story that sounds like it's straight out of a spy thriller—a finance controller tricked into transferring $25 million. But there's hope yet, as we uncover the groundbreaking methods NameTag employs to thwart these digital doppelgängers, reshaping the landscape of multi-factor authentication resets to outsmart even the craftiest of con artists. Aaron's narrative is a testament to the fine line between innovation and security and how we must tread it carefully.Wrapping up, our discussion casts a spotlight on the shadowy operations of cybercriminal collectives and the ongoing battle against supply chain attacks. Witness the complexity of securing against compromised hardware and the constant threat of breaches that loom over every organization. We round out with a clarion call to action for heightened cybersecurity awareness and education—a beacon for anyone looking to navigate the treacherous waters of cyber threats. Aaron's stories and strategies, available through LinkedIn and getsnametag.com, serve as a vital arsenal in the fight to protect our digital footprint in an age of relentless change.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Embarking on the rollercoaster ride of higher education can be daunting, but what if it's the key to unlocking a career in the complex world of cybersecurity? That's exactly what I dive into in our latest episode, as I peel back the layers of my own experience, from the decision to pursue advanced degrees to the unexpected shift from a law enforcement dream to the cutting-edge field of cybersecurity. The journey is fraught with financial strain and motivation hurdles, but the grit needed to persevere becomes palpable as I discuss those pivotal moments that shaped my academic and professional trajectory.As we navigate through the intricacies of satellite security, you'll get an insider's look at why this lesser-known aspect of cybersecurity is becoming a battleground for future conflicts. The conversation orbits around the emerging threats to our space assets and the gravity of their role in global communications and national defense. My ongoing PhD research on securing satellite-based quantum communications enters the spotlight, offering a glimpse into the preparation necessary to safeguard not just our information, but the very infrastructure that could be targeted by adversaries from miles above us. Join us as we conclude with a heartfelt appreciation for our supportive listeners and a promise to continue delivering content that resonates and informs, all while teasing the thought of a well-deserved weekend break.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
From the fizz of soda pop to the buzz of cybersecurity – witness Joe's extraordinary journey through the tech landscape. Our latest podcast episode takes you through a narrative of unexpected career leaps and the critical role of intelligence in the digital age. Joe, a former soft drink enthusiast turned cybersecurity guru, shares tales from his early tech escapades to his pivotal role at iDefense, where his collaboration with government agencies like the NSA, painted a picture of a complex and ever-evolving cyber battleground.Unravel the twisted tale of Anthony Lewandowski's controversial departure from Google, highlighting the precarious nature of intellectual property and insider threats. This episode peels back the layers of corporate espionage, discussing how companies like Code 42 are at the vanguard of detecting unsanctioned data movement. We tackle the ethical quandaries posed by the race for innovation, where the lines between ownership and fair competition often blur. The discussion showcases the intricate work of safeguarding expansive AI datasets and the careful balance of advancing technology while maintaining integrity.Navigating the murky waters of data security, we dissect the nuanced approach required for managing insider threats. Balancing an investigative eye with the necessity for swift action, our conversation sheds light on how companies toe the line between education and enforcement. As we discuss the limitations of traditional DLP systems and the emerging prominence of cloud monitoring, you'll gain insight into how organizations are adapting to the challenges of ensuring data remains in the right hands – all while contending with the unforeseen risks AI platforms like ChatGPT might present to data security. Join us for an exploration into the strategies that fortify companies against the tides of insider threats.Support the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today