154 episodes

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

Security Unfiltered Joe South

    • Technology

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

    From Geology to Cybersecurity: Mike's Unexpected Journey

    From Geology to Cybersecurity: Mike's Unexpected Journey

    Ready for an unexpected journey? Meet Mike, a cyber security expert with a background as diverse as the challenges he tackles every day. Starting with an early passion for computers, through studying geology and anthropology, and finally landing in the world of IT, Mike's story is a testament to the value of curiosity and mentorship. We dig deep into his hacking escapades, the lessons learned, and how a knack for problem-solving morphed into a career securing our digital world.

    Mike opens up about the human risk element in cybersecurity, drawing fascinating comparisons between convenience store hold-ups and elaborate cyber attacks. He gives us a sobering reminder - the most secure computer is one that never gets powered on. Technology and security advancements are making it tougher for hackers, but Mike warns of the ever-present risk of human vulnerability. Even the smallest of betrayals can bloom into massive security breaches. 

    Wrapping up, Mike shines a light on the comprehensive cybersecurity services offered by his organization. Ranging from risk assessment, regulatory compliance, to incident response and digital forensics, they've got IT security covered from all angles. He emphasizes the significance of trust in his client relationships and unveils ambitious growth plans for the next few years. Whether a tech enthusiast or an IT professional, this conversation is packed with insights and practical advice to help you navigate your way in the ever-evolving world of IT security.
    Support the showAffiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    • 41 min
    Exploring Evolution and Consequences in Cybersecurity Management

    Exploring Evolution and Consequences in Cybersecurity Management

    Get ready to embark on an enlightening journey with our guest, Huxley, a seasoned cybersecurity professional known for his extraordinary career path. From manipulating dial-up ISPs as a teenager, to landing a serious role in the field through a thrilling discovery, Huxley's tale will bring you to the edge of your seat. We dive deep into how he overcame fear and uncertainty while dealing with the unknown, and how he relishes the thrill of unraveling complex cybersecurity puzzles.

    Our conversation spans the significant consequences of ignoring account management. Listen to compelling anecdotes underscoring the importance of disabling employee accounts after their departure. We also retrace Huxley's time at Cisco, discussing how the tech giant transformed into a security services provider. We also delve into the real-life repercussions of lax security practices, illustrating how even large corporations can suffer monumental losses.

    As the conversation unfolds, we chart the evolution of cyber asset management. We further explore how Cisco expanded its security product portfolio and how Rumble Network Discovery transformed into RunZero. We highlight the necessity of securing all devices in an increasingly interconnected world, from office networks to personal devices and IoT. As a cherry on top, we'll delve into how RunZero assures complete network coverage, reducing the risks and reinforcing the importance of protecting an organization's attack surface. Tune in for a gripping and enlightening conversation about cybersecurity and asset management.
    Support the showAffiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    • 36 min
    Exploring the Intricacies of Cybersecurity with Expert Aviv Grafi

    Exploring the Intricacies of Cybersecurity with Expert Aviv Grafi

    Prepare for a thrilling exploration of the cybersecurity world with our extraordinary guest, Aviv Grafi. A cybersecurity expert, founder of a successful tech startup, and a former member of Israel's elite cybersecurity unit 8200 group, Aviv's journey will take you from his early days of hacking and building computer systems to the cutting edge of IT security. Learn from his experiences and discover how an engineering mindset, combined with a passion for problem-solving, can lead to unexpected career paths.

    Aviv gives a gripping account of his transition from working in startups to founding his own venture. The highlights of our conversation revolve around hacking prevention, defensive programming, and the pioneering concept of Content Disarmament, Reconstruction (CDR) technology. The technology, which creates a virtual shield against malicious software by transferring the content of a document onto a new template, is a fascinating leap in cybersecurity. Watch as he unravels how startups are navigating the complex world of cybersecurity.

    As we steer into the intricacies of kernel security, you'll get an in-depth understanding of the challenges faced by tech giants like Microsoft with their longstanding Windows system. Contrast that with Apple's leading security architecture, and it's a captivating exploration of the tech world's giants. We end our journey with a peek into the future of document security - the evolution of Voteer's solution to safeguard users from harmful content and its innovative API-centric platform that integrates seamlessly with popular services. It's all about creating a barrier between the user and the data to ensure a safe digital experience. Join us on this exciting journey through the world of cybersecurity with Aviv!"

    [END SHOW NOTES]
    Support the showAffiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    • 42 min
    Exploring the Versatility of Cybersecurity with Sans Instructor Jason Ostrom

    Exploring the Versatility of Cybersecurity with Sans Instructor Jason Ostrom

    Just as a river takes unexpected turns, so too does a career journey. Our special guest, Jason Ostrom, began with an eye towards federal law enforcement but found himself swept away into the world of Linux and security engineering for startups. A chance encounter with a mentor opened the door towards a career in cybersecurity, and the creation of a game changing pen test tool. Discover the story behind his first presentation at a hacker conference and how the early days of parenthood influenced his journey.

    Ever wonder why a broad skill-set trumps specialization in cybersecurity? Jason breaks it down, emphasizing why IT experience, soft skills, and understanding the business context for executing vulnerabilities can make or break your success in this industry. Whether you're on cloud nine or keeping it grounded with on-prem projects, Jason explains why adaptability is crucial and how to keep your skills sharp and marketable.

    Lastly, Jason demystifies the process of presenting at cybersecurity conferences and how to become a SANS instructor. The desire to teach or earn a SANS certification burns in many, but the path can seem obscured by smoke. Jason clears the air, providing a transparent look into the pros and cons of this career move. If you're fascinated by the world of pen testing, this episode will shed light on the various types and the importance of gaining broad experience before selecting a specialty. Buckle up, this ride with Jason is not one to be missed.
    Support the showAffiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    • 34 min
    Insights on Self-Employment and Cyber Threats from Boom Supersonic's CISO Chris Roberts

    Insights on Self-Employment and Cyber Threats from Boom Supersonic's CISO Chris Roberts

    You've heard of Boom Supersonic, right? Let's journey into the mind of its CISO, Chris Roberts, our most sought-after guest yet. His tales of transitioning to self-employment, battling the IRS, and the challenges of running his own company are nothing short of enlightening. This episode not only explores Chris's professional journey but also offers practical advice to aspiring entrepreneurs.

    Navigating the labyrinth of self-employment can be daunting. Chris opens up about the unexpected costs and the importance of consistency and responsibility. The conversation expands to his role at Boom Supersonic, where he promised his staff that he would never make them look like fools. The implications of this promise, along with the challenges of handling multiple phishing tests, are discussed in depth. We then venture into the realm of corporate bigwigs, exploring Chris's experiences in the corporate environment, the unique opportunities it presents, and his memorable board meeting attire.

    But that's not all. We delve into the merging of the physical and digital world, exploring the challenges of distinguishing truth from lies in an uncertain environment. Cybersecurity enthusiasts will relish Chris's insights on how hackers exploit these situations. His fears of who may gain access to plane systems, the potential implications of AI, and the reality of cyber warfare are sure to keep you on the edge of your seat. We wrap up with a hearty discussion on the public perception of these issues and why it's crucial to take them seriously. This episode is a treasure trove of insights and advice on self-employment, corporate life, and cybersecurity.
    Support the showAffiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    • 1 hr 1 min
    Immersing in Defcon and Navigating CISSP Exam Prep: A Journey Towards Personal Development in Tech

    Immersing in Defcon and Navigating CISSP Exam Prep: A Journey Towards Personal Development in Tech

    Prepare for a deep-dive into the exhilarating world of Defcon, where the brilliant and the curious unite. This year was a spectacular display of innovative minds, intriguing events, and diverse vendors, making it potentially the best one yet. Disregard the media's fear-mongering about Defcon's purported dangers; if you're not attending, there's no need for panic or to switch off your Wi-Fi or Bluetooth.

    You'll find solace in my personal journey through the tumultuous path of preparing for the CISSP exam. I unravel the complexities of finding the right resources and speak of my experience with Ben Malisow's practice platform, a treasure compared to the meandering paths of Udemy courses. As I share my last-minute strategy leading up to my second CISSP attempt, you might just find the inspiration you need for your certification journey.

    Finally, we'll explore the importance of giving back to the DefCon community and the power of creating a personal brand. Don't let feelings of inadequacy hold you back; authenticity is the key to standing out in a sea of faces. Stay tuned as we discuss the surprising rarity of imposters and introduce a series of swift mentorship episodes. Get ready for a rollercoaster of insights, advice, and inspiring stories as we delve into the fascinating world of tech and personal development.
    Support the showAffiliate Links:
    NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902

    Follow the Podcast on Social Media!
    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast
    Patreon: https://www.patreon.com/SecurityUnfilteredPodcast
    YouTube: https://www.youtube.com/@securityunfilteredpodcast
    TikTok: Not today China! Not today

    • 32 min

Top Podcasts In Technology

DR
DR
DR
DR
DR
DR

You Might Also Like

N2K Networks
N2K Networks
Chris Tarbell & Hector Monsegur
Graham Cluley & Carole Theriault
Jack Rhysider
ITWC