Security Unfiltered Podcast
1) Master The Fundamentals, Then Change The System
Send us a text We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way,...Show More
2) Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless le...Show More
3) Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his ex...Show More
4) From Sewers To Subsea: Rethinking Data Centers And Defense
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along ...Show More
5) Inside The Global Push For Offensive Cyber And Smarter Defense
Send us a text We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks...Show More
6) The FUTURE of Device Authentication is Here NOW
Send us a text We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup l...Show More
7) The Future Hides In Plain Sight: Will We See It In Time?
Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share ...Show More
8) Inside Offensive AI: From MCP Servers To Real Security Risks
Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defend...Show More
9) What If AI Took Over Your Data Security Tomorrow?
Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve in...Show More
10) Top SAP Security Threat Hunting Strategies Used by Elite Researchers
Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line wh...Show More