Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Health & Fitness
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/bf/2d/8f/bf2d8f3c-577b-0373-abce-16e047be40c8/mza_11189974766247544856.jpg/600x600bb.jpg
Security Unfiltered
Joe South
257 episodes
6 days ago
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. ...
Show more...
Technology
Business,
Careers,
News
RSS
All content for Security Unfiltered is the property of Joe South and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. ...
Show more...
Technology
Business,
Careers,
News
Episodes (20/257)
Security Unfiltered
Inside Offensive AI: From MCP Servers To Real Security Risks
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. ...
Show more...
6 days ago
1 hour 6 minutes

Security Unfiltered
What If AI Took Over Your Data Security Tomorrow?
Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a seasoned professional or new to the field, this conversation offers valuable insights into the complexities and opportunities within data security. ...
Show more...
1 week ago
50 minutes

Security Unfiltered
Top SAP Security Threat Hunting Strategies Used by Elite Researchers
Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Commodore 64 and BBS to IT and security • contrast between the Wild West era and today’s tool-rich learning • help desk as a foundation for people s...
Show more...
2 weeks ago
52 minutes

Security Unfiltered
From Apple’s Inside to a New Kind of Phone: Privacy, Free Speech, and Building a Third Platform
Send us a text We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable. • zero‑to‑one background from Nomi acquisition to Apple services • motivation for a third platform beyond Apple and Google • Raxxis test revealing 3,400 se...
Show more...
3 weeks ago
49 minutes

Security Unfiltered
Your AI is not as secure as you think it is, and here's why
Send us a text David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approaches fail when dealing with AI components that dynamically change their trustworthiness based on input data. • LLMs present unique security challenges beyond prompt injection or generating harmful content • Traditional security models foc...
Show more...
1 month ago
50 minutes

Security Unfiltered
Cloud, AI, and the Future of Identity Access Management
Send us a text Art Poghosyan shares his journey from IT security consultant to CEO of Britive, a cloud-native identity and access management company. His experience during economic downturns shaped his understanding of how cybersecurity services remain resilient through various market cycles. • Started in IT security right after completing a master's in technology risk management • Worked with early IAM solutions including LDAP directories, SSO, and authentication systems • Founded Advanced ...
Show more...
1 month ago
45 minutes

Security Unfiltered
Hack Your Way to Achievement: One Small Step at a Time
Send us a text Ted Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone overcome challenges and find overlooked opportunities. • Breaking big goals into smaller, manageable pieces makes difficult tasks achievable • Inspiration only gets you started; habits and consistency are what help you finish • The four tra...
Show more...
1 month ago
42 minutes

Security Unfiltered
The Future of AI: Security, Ethics, and Human Augmentation
Send us a text Artificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunities and profound challenges that we're only beginning to understand. • AI development is accelerating faster than any previous technology, with research papers becoming outdated within weeks or months • Current AI systems function primaril...
Show more...
1 month ago
39 minutes

Security Unfiltered
Breaking the Sky: How Vulnerable Are Our Satellites?
Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows of only 15 minutes during orbit • Most satellites run on outdated technology with numerous vulnerabilities that can allow complete takeover • A re...
Show more...
2 months ago
55 minutes

Security Unfiltered
Navigating the AI-Driven Job Market
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills needed for the future, and the balance between technological advancement and human potential. Tune in to understand the dynamics of this AI-driven era...
Show more...
2 months ago
54 minutes

Security Unfiltered
Finding Your Niche: How Specialization Drives Success in a Crowded Market
Send us a text Carlos Corrador shares his journey from aspiring lawyer to founding Condor Agency, a specialized marketing firm for B2B tech services companies. We explore how deep specialization, personal branding, and adapting to AI are critical for survival in today's rapidly changing business landscape. • Started as a sports journalist in Venezuela before discovering digital marketing through website building • Moved to Chicago for a master's in digital marketing before founding Condor Ag...
Show more...
2 months ago
44 minutes

Security Unfiltered
From Russia with Code: A Malware Analyst's Journey
Send us a text Sergey Novikov shares his fascinating journey from early days at Kaspersky Lab through his evolution as a malware analyst and cybersecurity expert, offering unique insights into the changing threat landscape and ethical considerations of security research. • Started at Kaspersky in 2002 when it was a small startup with fewer than 100 employees • Applied mathematics background led to research correlating human epidemic models with computer virus propagation • Worked as a "woodp...
Show more...
2 months ago
47 minutes

Security Unfiltered
Finding Zero Days in Salesforce Industry Clouds
Send us a text SaaS platforms represent a significant security blind spot for many organizations, with misconceptions about the shared responsibility model leaving sensitive data vulnerable to exposure. Aaron Costello, Chief of SaaS Security Research at AppOmni, shares insights from his research uncovering five zero-day vulnerabilities in Salesforce Industry Clouds and explains why SaaS security requires specialized expertise. • Security teams often mistakenly believe SaaS vendors are fully ...
Show more...
3 months ago
46 minutes

Security Unfiltered
Zero Trust Architecture: The Future of Cybersecurity
Send us a text Cybersecurity expert Bob Kochan from Beyond Identity discusses the evolution of security from network defense to identity-first approaches. He shares insights on how AI is transforming security operations while creating new threat vectors, emphasizing the need for phishing-resistant authentication solutions in today's threat landscape. • Traditional security focused on network layers, but SaaS adoption exposed vulnerable identity systems • Zero Trust architecture must start wi...
Show more...
3 months ago
50 minutes

Security Unfiltered
The Human Element Still Matters in a Quantum AI World
Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharing and community contributions • Quantum computing's progression from theoretical to practical applications in security • The challenges posed by u...
Show more...
3 months ago
50 minutes

Security Unfiltered
Ric Prado: CIA Black Ops Operator That Hunted Bin Laden
Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone to a Colorado orphanage • Joined Air Force Pararescue (PJs), enduring brutal training that forged his determination and resilience • Transitioned...
Show more...
3 months ago
1 hour 13 minutes

Security Unfiltered
Inside the Mind of a CIA Agent: Nuclear Threats and Intelligence Operations
Send us a text PodMatchPodMatch Automatically Matches Ideal Podcast Guests and Hosts For Interviews Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodc...
Show more...
4 months ago
54 minutes

Security Unfiltered
Can Your Messaging Survive the Quantum Computing Threat?
Send us a text Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete. • Anurag's extensive background in technology from Apple to Sprint and participation in the National Broadband Task Force • How mobile messaging has infiltrated enterprises without proper security consideration • Consumer messaging ...
Show more...
4 months ago
52 minutes

Security Unfiltered
The SHOCKING Truth About AI Security in Hospitals
Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert through a chance college course • The importance of diverse experience across different security domains for career longevity • How healthcare organiz...
Show more...
4 months ago
45 minutes

Security Unfiltered
Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an organization's reputation and online presence • Over 93% of security professionals can't identify their company's domain registrar or DNS provider •...
Show more...
5 months ago
55 minutes

Security Unfiltered
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. ...