Security Unfiltered

Joe South

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

  1. Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges

    HACE 13 H

    Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges

    Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world. 00:00:19 Introduction to Vishnu's Journey 00:00:30 Entering the US and Cisco 00:02:18 Cloud Security and AI 00:02:48 Data Governance and Challenges 00:08:47 The Expansiveness of Cloud 00:11:00 AI's Appetite for Data 00:12:11 Data Security in the JNI Era 00:14:29 The Importance of Context 00:16:13 Data Used by Enterprises 00:22:24 Conclusion and Future Trends https://www.bonfy.ai/ Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    54 min
  2. 24 NOV

    From Sewers To Subsea: Rethinking Data Centers And Defense

    Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas  • kids chasing influence and the low barrier to entry  • leaving school early, offshore work, and non-linear careers  • social engineering as ordinary behavior with intent  • red team vs blue team dynamics and trust  • the sewer break-in that birthed an idea  • how subsea data centers plug into power and fiber  • threat models at sea and nation-state realities  • latency wins for gaming, streaming, fintech, telehealth  • AI hype, thin moats, and the need for stack control Find Maxi: most active on LinkedIn; launching an AI security blog and weekly newsletter at maxirynolds.com Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    53 min
  3. 17 NOV

    Inside The Global Push For Offensive Cyber And Smarter Defense

    Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together. • Verona’s route from public policy to cybersecurity • Why slow law and fast threats collide • Updating the Computer Misuse Act and research protections • Offensive cyber, deterrence, and ethical guardrails • Zero days, decision latency, and operational windows • SMEs and supply chains as systemic risk • Secure by design and secure by default at scale • State cyber reserves and public–private secondments • Talent gaps, pay gaps, and global accreditation • EU and UK moves to standardize skills and tighten rules • Government roles in funding, convening, and capability building Find Verona on LinkedIn: Verona Johnstone Hulse. Read NCC Group’s Global Cyber Policy Radar on the NCC Group website or via Verona’s LinkedIn posts Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    46 min
  4. 10 NOV

    The FUTURE of Device Authentication is Here NOW

    Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines. • life on the road, burnout signals and recovery • global threats to critical infrastructure and state actor pressure • startup culture, expectations and keeping teams healthy • Jason’s path through engineering to entrepreneurship • identity’s failure modes and why credentials are stolen • asymmetric, hardware-bound authentication and device posture • extending identity to agents, drones and satellites • cyber-physical risk and why finance invests heavily • identity as the universal control plane in cloud • practical steps to prevent session hijack and MFA fatigue Connect with Jason: “Hit me up on LinkedIn… our website, beyondidentity.com… even X” Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    45 min
  5. 3 NOV

    The Future Hides In Plain Sight: Will We See It In Time?

    Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and patch constraints • harvest now decrypt later and crypto agility • early adopters of quantum‑resistant algorithms • futurist methods for security decision‑making • shifting from passwords to stronger credentials • efficiency versus resilience trade‑offs in cloud • lessons from government redundancy models • attack surface, attacker and defender effectiveness • deepfakes, social engineering, and process tripwires • practical controls like rotating passcodes and dual control • resources and where to find Heather’s work Pick up Heather’s books and reach out if you want Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    56 min
  6. 27 OCT

    Inside Offensive AI: From MCP Servers To Real Security Risks

    Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now. Eric shares takeaways from Offensive AI Con: how models help triage code and surface likely bug classes, why decomposed workflows beat “find all vulns” prompts, and what happens when toy benchmarks meet stubborn, real binaries. We explore reinforcement learning environments as a scalable way to train security behaviors without leaking sensitive data, and we grapple with the uncomfortable reality that jailbreaks aren’t going away—so output validation, sandboxing, and principled boundaries must do the heavy lifting. We also dig into Garak, the open-source system security scanner that targets LLM-integrated apps where it hurts: prompted cross-site scripting, template injection in Jinja, and OS command execution. By mapping findings to CWE, Garak turns vague model “misbehavior” into concrete fixes tied to known controls. Along the way, we compare GPT, Claude, and Grok, talk through verification habits to counter confident nonsense, and zoom out on careers: cultivate niche depth, stay broadly literate, and keep your skepticism calibrated. If you’ve ever wondered how to harness AI without handing it the keys to prod, this one’s for you. Enjoyed the episode? Follow, share with a teammate, and leave a quick review so more builders and defenders can find the show. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    1 h y 5 min
  7. 20 OCT

    What If AI Took Over Your Data Security Tomorrow?

    Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a seasoned professional or new to the field, this conversation offers valuable insights into the complexities and opportunities within data security. Tune in to learn how to navigate the ocean of data and protect your organization's most valuable assets. 00:00 Introduction to Gidi Cohen and His Background 01:49 The Role of 8200 Unit in Cybersecurity 04:25 Transitioning from Military to Industry 11:32 Identifying Problems in Data Security 16:00 The Challenges of Data Management in Organizations 23:58 The Challenge of Data Classification 26:59 Understanding Context in Data Security 29:44 Adaptive Learning in AI Solutions 32:22 Proactive Risk Mitigation Strategies 34:57 Integrating Data Security Across Platforms 37:33 The Future of Data Security Solutions Bonfy ACS is a next-gen DLP platform built for the AI era, combining contextual intelligence and adaptive remediation to secure sensitive data and enable AI innovation at scale. With high accuracy and out-of-the-box policies, it delivers fast time to value while reducing false alerts and investigation overhead. Trusted by regulated organizations, Bonfy ensures compliance and integrates seamlessly with Microsoft 365, Salesforce, Slack, and Google Workspace. Speaker: Gidi Cohen, CEO and Co-Founder of Bonfy.AI https://www.bonfy.ai/ Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    50 min
  8. 14 OCT

    Top SAP Security Threat Hunting Strategies Used by Elite Researchers

    Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Commodore 64 and BBS to IT and security • contrast between the Wild West era and today’s tool-rich learning • help desk as a foundation for people skills and pressure • practical advice for students on coding, protocols, Wireshark • hiring by attitude, approach and aptitude over tool checklists • navigating WAF pushback and risk acceptance with dev teams • Onapsis research labs and SAP’s threat landscape • deep-dive on the SAP 31324 Java gadget chain RCE • attacker interest, attribution signals, and factory impact • offensive research versus traditional pen testing • building culture that rewards questions and learning Find us: onapsis.com → Research Labs. Search “Onapsis 2025 31324” for our zero-day article. SAP thanked us in their patch notes. Connect with Paul on LinkedIn to talk SAP security, offensive work, or careers. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    52 min
5
de 5
13 calificaciones

Acerca de

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

También te podría interesar