Security Unfiltered

Joe South

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

  1. 3D AGO

    The Role of Lawyers in Cybersecurity Aren't What You Think — Here's Why It Matters

    Send us a text Most cybersecurity talks focus on technical solutions, but this episode reveals a game-changing perspective: building trust is at the core of cybersecurity success. Danielle Sheer, Chief Trust Officer at Commvault, shares how her legal background and emotional connection strategies transform organizations’ approach to security—making cybersecurity relatable, manageable, and resilient. You'll discover: The surprising skills lawyers develop that elevate cybersecurity leadership—like seeing multiple sides of a problem and translating complex threats into business language. How trust, not just technology, is the secret to effective security—why relationships matter more than firewalls alone. Practical insights on handling breaches, from crisis communication to resilience strategies that go beyond spending more. The role of AI in expanding the threat landscape, and why understanding and simplifying cybersecurity is crucial as attacks get more advanced. Why the future of cybersecurity hinges on your ability to foster trust, build internal alignment, and communicate clearly across technical and non-technical teams. If you're a security professional, a leader trying to bridge the tech-human gap, or anyone interested in how trust can be your greatest shield—this episode is your must-listen. Danielle Sheer’s unique journey from law to security offers lessons on leadership, relationship-building, and proactive resilience that could redefine how your organization defends itself in a digital age. Timestamps:  00:00 - Introduction to Danielle Sheer and her career journey 02:07 - From law to leadership: Building emotional connections and trust 04:28 - Defining the Chief Trust Officer role and its organizational value 05:59 - Skills gained in law school that translate across industries 08:38 - The importance of perspective-taking and storytelling in cybersecurity 09:34 - Strategies for communicating cybersecurity issues effectively to non-technical stakeholders 11:53 - Managing internal security processes and building trust through transparency 13:12 - The anatomy of breaches and translating between technical and business language 15:24 - The importance of resilience, employee education, and business continuity plans 17:00 - Conducting effective tabletop exercises and lessons from breach simulations 20:36 - Ransomware payments and industry responses to emerging threats 22:29 - How AI is transforming cybersecurity: skill gaps and threat detection challenges 26:13 - State-sponsored attacks, malware timelines, and geopolitical cybersecurity concerns 28:37 - The need for global cooperation and continuous vigilance in cybersecurity 30:27 - Final thoughts: connecting organizations and sharing resources Support the show Follow the Podcast on Soc Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    39 min
  2. JAN 27

    Agentic Robots Are Here—And Your Security Strategy Is Broken with Ben Wilcox

    Send us a text In this episode, Joe and Ben Wilcox dive into the rapid advancements in AI and technology, sharing insights from the recent Microsoft Ignite conference. They explore the transformative impact of AI on security practices, the evolution of agentic robots, and the growing importance of data security in today's digital landscape. Tune in to hear a lively discussion between an AI skeptic and an optimist, and discover how these technological shifts are reshaping business and innovation. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    51 min
  3. JAN 19

    Building Safer Online Habits Without Becoming Paranoid

    Send us a text We trade office chaos for focused remote work, then chart the journey from a 1999 idea to one of security’s most-used tools. The talk widens to cyber warfare, scams, and practical privacy steps anyone can take without going off-grid. • year-end boundaries and remote work focus • origin of WhatIsMyIPAddress and staying humble • don’t invite hackers, real-world conference fallout • elite cyber training, Ukraine drones, satellite comms • podcast guest vetting, authenticity, and value • preventing scams, empathy for victims, proof problems • privacy without becoming a hermit, actionable steps • 2FA on email, credit freezes, password strategy • data collection at retail, saying no with confidence • ads as social engineering, better defaults online “I will give anyone who wants the book can come to my website and get the book… If you don’t want to give me your email address or your name, I’ll give you the book without the email address and your name.” Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    49 min
  4. JAN 12

    The Grind and Growth: A Podcaster's Journey With Jack Rhysider From Darknet Diaries

    Send us a text Ever wonder why some shows last for years while others fade before episode seven? We sit down with Jack from Darknet Diaries to unpack the systems, mindset, and storytelling choices that keep a podcast resilient without burning out the host. Instead of chasing viral spikes, Jack lays out a playbook for steady growth: batch recording, rest cycles, and that deceptively powerful one percent month-over-month target. It’s practical, humane, and it works. We dig into his editorial compass with three distinct tracks: personal obsessions, proven crowd favorites, and bold forays into new communities like crypto and gaming. Jack explains why listeners often prefer penetration test stories over higher-stakes CIA operations, and what it takes to earn trust from niche audiences by learning their culture first. The curtain pulls back on hard-to-book guests, silent PR walls, and the rare times a source vanishes after recording—plus the elusive thrill of chasing “ghost” hackers who should never speak on record. From there, the conversation turns to craft. Jack’s background as a network security engineer sharpened his ability to explain complex topics simply. He shares how layered explanations let beginners and veterans both feel seen, why command line beats screenshot soup, and how relentless revision turns knowledge into clarity. We also tackle AI and cybersecurity with nuance: not as job eraser, but capability amplifier. Think better triage, secure-by-default coding, and an arms race where defenders and attackers wield similar tools—and the edge comes from better questions and stronger priorities. Beyond the studio, Jack talks health, music, language learning, and swing dance, and how a wetware mindset—designing stories to trigger empathy and memory—guides every episode. If you care about making work that lasts, telling stories that land, and adopting AI without losing the plot, this conversation is a masterclass in sustainable creativity and modern security. Subscribe, share with a friend who needs a morale boost, and leave a review with the one tactic you’ll try next. Darknet Diaries: https://www.youtube.com/jackrhysider Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    49 min
  5. JAN 5

    Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security

    Send us a text In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security controls. Tune in to learn about the future of cybersecurity and how companies can better prepare for the next wave of digital threats. 00:00 Introduction to Security Challenges 04:08 AI-Powered Social Engineering Threats 09:45 The Opaque Nature of Cybersecurity Incidents 14:08 Deep Fakes and Their Evolution 18:48 Hiring Risks in the Age of Deep Fakes 23:00 The Future of Cyber Threats and Anarchy 28:04 The Arms Race: AI Detection vs. Deepfakes 32:49 Preparing for the Future: Awareness and Training 39:26 The Evolving Threat Landscape: Beyond Traditional Security https://www.adaptivesecurity.com/ https://www.linkedin.com/in/brianclong/ Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    44 min
  6. 12/15/2025

    Master The Fundamentals, Then Change The System

    Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide. • curiosity-driven path from fear to purpose • foundations before security: systems then networks • depth of concepts vs surface knowledge • thinking at scale with distributed systems • threat modeling as a constant that endures • learning the why behind legacy architectures • community building through a book and courses • coding confidence for security practitioners • practical framework for choosing certifications • direction over collecting badges • reflecting on progress and resetting goals • links to connect and learn more Use the code security50 to get 50% off the upcoming cybersecurity bootcamp at learn.thecyberinstructor.com Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    57 min
  7. 12/08/2025

    Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online

    Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’ digital lifelines. • launching a policy career by building expert networks • founding the DEF CON Voting Village and publishing policy insights • managing imposter syndrome with trusted advisors and study • shifting from shields up to active defense in cyber • why Stuxnet’s visibility served a political goal • using law enforcement cyber tactics beyond ransomware • how fentanyl economics and pill presses scaled harm • China’s precursor role and Sinaloa’s market pivot • Coast Guard and HSI authorities for upstream disruption • making fentanyl unprofitable through targeted cyber pressure Find Jake on LinkedIn: Jake Bronn Book: Fentanyl, The Mass Poisoning Of America And The Cartel Behind It Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    1h 14m
  8. Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges

    12/01/2025

    Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges

    Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world. 00:00:19 Introduction to Vishnu's Journey 00:00:30 Entering the US and Cisco 00:02:18 Cloud Security and AI 00:02:48 Data Governance and Challenges 00:08:47 The Expansiveness of Cloud 00:11:00 AI's Appetite for Data 00:12:11 Data Security in the JNI Era 00:14:29 The Importance of Context 00:16:13 Data Used by Enterprises 00:22:24 Conclusion and Future Trends https://www.bonfy.ai/ Bonfy.aiBonfy ACS is a next-gen DLP platform built for the AI era. Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcast Affiliates ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh ➡️ OffGrid Coupon Code: JOE ➡️ Unplugged Phone: https://unplugged.com/ Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    54 min
5
out of 5
13 Ratings

About

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!

You Might Also Like