Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security dec...
All content for Security Unfiltered is the property of Joe South and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security dec...
Send us a text SaaS platforms represent a significant security blind spot for many organizations, with misconceptions about the shared responsibility model leaving sensitive data vulnerable to exposure. Aaron Costello, Chief of SaaS Security Research at AppOmni, shares insights from his research uncovering five zero-day vulnerabilities in Salesforce Industry Clouds and explains why SaaS security requires specialized expertise. • Security teams often mistakenly believe SaaS vendors are fully ...
Security Unfiltered
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security dec...