Security Unfiltered
Episodes
274 episodes
AI Has Democratized the Most Dangerous Cyberattack Yet With Dylan Deanda From Doppel
Get ready to dive deep into the raw truths of modern cyber threats, the evolution of social engineering, and how AI is transforming the battlefield. With cybersecurity veterans Dylan DeAnda and Joe, we uncover the alarming acceleration of digit...
The Hidden Role Hackers Are Playing in Solving Human Trafficking and Saving Lives
Most organizations underestimate the staggering speed at which cyber threats are evolving—until it’s too late. Chris Nyhuis, a cybersecurity veteran who's been in the trenches for 16 years, pulls back the curtain on the terrifying future of cyb...
The Author of Code War, Allie Mellen Reveals How Geo-Politics & CyberWar Collide
Most of us are living in a digital battlefield we barely understand—until it's too late. Alli Mellen reveals how nations harness cyber tools shaped by centuries of history, and how today's chaos isn't random—it's deeply rooted in geopolitical m...
The Great Cyber Power Struggle: Russia, China, Iran, and the Coming Digital Chaos
The cybersecurity battlefield is evolving at a lightning pace—and in 2025, we saw threats go from sophisticated to unstoppable. Identity has become the new frontline, with hackers weaponizing OAuth tokens, SaaS integrations, and impersonations ...
Hackers Cracked AI Security | Here's How They Did It
Most cybersecurity stories talk about the hacks, but this episode peels back the curtain on the raw, unfiltered journey of a hacker turned industry pioneer. Jason Haddix shares how his early days of hex editing and fake IDs evolved into leading...
The Role of Lawyers in Cybersecurity Aren't What You Think — Here's Why It Matters
Most cybersecurity talks focus on technical solutions, but this episode reveals a game-changing perspective: building trust is at the core of cybersecurity success. Danielle Sheer, Chief Trust Officer at Commvault, shares how her legal backgrou...
Agentic Robots Are Here—And Your Security Strategy Is Broken with Ben Wilcox
In this episode, Joe and Ben Wilcox dive into the rapid advancements in AI and technology, sharing insights from the recent Microsoft Ignite conference. They explore the transformative impact of AI on security practices, the evolution of agenti...
Building Safer Online Habits Without Becoming Paranoid
We trade office chaos for focused remote work, then chart the journey from a 1999 idea to one of security’s most-used tools. The talk widens to cyber warfare, scams, and practical privacy steps anyone can take without going off-grid.• y...
The Grind and Growth: A Podcaster's Journey With Jack Rhysider From Darknet Diaries
Ever wonder why some shows last for years while others fade before episode seven? We sit down with Jack from Darknet Diaries to unpack the systems, mindset, and storytelling choices that keep a podcast resilient without burning out the host. In...
Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security
In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive ex...
Master The Fundamentals, Then Change The System
We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building ...
Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal...
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They del...
From Sewers To Subsea: Rethinking Data Centers And Defense
We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs re...
Inside The Global Push For Offensive Cyber And Smarter Defense
We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pip...
The FUTURE of Device Authentication is Here NOW
We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft acr...
The Future Hides In Plain Sight: Will We See It In Time?
We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilie...
Inside Offensive AI: From MCP Servers To Real Security Risks
Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart,...
What If AI Took Over Your Data Security Tomorrow?
In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact o...
Top SAP Security Threat Hunting Strategies Used by Elite Researchers
A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint bec...
From Apple’s Inside to a New Kind of Phone: Privacy, Free Speech, and Building a Third Platform
We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugg...
Your AI is not as secure as you think it is, and here's why
David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approac...
Cloud, AI, and the Future of Identity Access Management
Art Poghosyan shares his journey from IT security consultant to CEO of Britive, a cloud-native identity and access management company. His experience during economic downturns shaped his understanding of how cybersecurity services remain resili...
Hack Your Way to Achievement: One Small Step at a Time
Ted Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone ove...
The Future of AI: Security, Ethics, and Human Augmentation
Artificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunitie...