Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/99/8e/f4/998ef47b-4e95-d7f8-5b6c-567a6b8bef7b/mza_537803305394389172.png/600x600bb.jpg
Legitimate Cybersecurity Podcasts
LegitimateCybersecurity
32 episodes
1 week ago
Legitimate Cybersecurity Podcasts
Show more...
Technology
RSS
All content for Legitimate Cybersecurity Podcasts is the property of LegitimateCybersecurity and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Legitimate Cybersecurity Podcasts
Show more...
Technology
Episodes (20/32)
Legitimate Cybersecurity Podcasts
AI Is Rebuilding the Dead — With Your Data
Your body dies — but your accounts don’t. And now AI can be trained on the dead.So who “owns” your digital afterlife… and who gets to use it?In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer unpack the real risk behind “legacy accounts,” AI memorial bots, and digital grief tools: consent, identity control, and what happens when someone can simulate you without you.We cover the ethics of training on deceased users, the slippery slope from grief-support to manufactured relationships, and why regulation vs. private control matters more than people realize.Media & interview requests: admin@legitimatecybersecurity.comAudio subscription: https://legitimatecybersecurity.podbean.com/C) Chapter Breaks (YouTube Chapters)0:00 — Your body dies… does your data?1:05 — Legacy accounts & “consent” after death3:20 — The DIY “Talk to my dead loved one” GPT5:45 — Why Facebook stopped being “social”7:10 — DNA data + the real nightmare scenario10:50 — Should your AI ghost include your flaws?13:05 — “Do we erase the racism?” (history vs. sanitizing)17:45 — Sci-fi already warned us (AI Lincoln moment)20:20 — Grief tools: healthy coping or dependency?26:00 — The slippery slope: AI partners & manufactured bonds27:40 — Who should control this: government or private sector?34:00 — Guardrails + “whole-ham” threat actor reality36:10 — Wrap: what we should demand before “digital afterlife” goes mainstream#Cybersecurity #AI #Privacy #DataOwnership #DigitalIdentity #Deepfakes #TechEthics #OnlineSafety #DigitalLegacy #Governance #LegitimateCybersecurity #AI #DigitalAfterlife #Privacy #Cybersecurity #ArtificialIntelligence #TechEthics #DataOwnership
Show more...
1 week ago
37 minutes

Legitimate Cybersecurity Podcasts
5 Holiday Scams That Drain Your Money Fast (Gift Cards, Texts, QR)
Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now.In December, attackers don’t need skill. They need distracted people.In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down the five highest-volume holiday scams hitting normal, smart people—gift cards, shipping texts, QR codes, travel Wi-Fi, and even AI voice cloning.You’ll learn:How gift cards are drained before activationWhy “package can’t be delivered” texts work so wellHow QR codes are being weaponized in parking lots and charitiesWhat actually keeps you safe while travelingHow to stop family-emergency scams instantlyMedia & interview requests: admin@legitimatecybersecurity.com🎧 Audio version: https://legitimatecybersecurity.podbean.com/Chapters:00:00 — Christmas morning: the gift card is already empty01:40 — Why December supercharges scams (stress + urgency)07:45 — Gift card heists (how they steal it before purchase)15:55 — “Pay in gift cards” = funding a crime17:00 — Shipping smishing texts (the #1 holiday scam)23:15 — MFA: annoying, but it works24:40 — QR scams & fake charities (quishing explained)28:10 — Travel season: Wi-Fi, hotel TVs, charging traps34:15 — Proximity attacks: NFC & crowded spaces36:45 — AI voice cloning & family emergency scams41:45 — The boring-target checklist (do this, relax)44:10 — Final takeaway + share with the link-clicker#cybersecurity #holidayscams #onlinesafety #phishing #giftcards #scams #identitytheft #LegitimateCybersecurity #Cybersecurity #HolidayScams #GiftCardHeist #AIVoiceCloning #Privacy #Infosec #TechSafety
Show more...
3 weeks ago
45 minutes

Legitimate Cybersecurity Podcasts
Your Phone, Your Car, Your Movies—You Don’t Actually Own ANY of It #cybersecurity
Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke your access, or simply shut down the servers your devices rely on. And now with AI moderation quietly deleting accounts behind the scenes… who’s really in control?In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer explore:How Apple, Google, Tesla, and John Deere can remotely brick your devicesWhy your “purchased” movies on Vudu/Fandango can disappearThe subscription takeover: cars, games, self-driving, even pill bottlesHow AI bots on Reddit, Facebook, and Google can silently erase your accountWhy Gen Z and Gen Alpha face a job market that’s never been harderThe hidden danger of companies shutting down and taking your devices with themWhether you can really own anything digital anymoreFrom tractors to Tesla pricing chaos, FMV Sega nostalgia, disappearing media libraries, HOA jokes, and mushroom farming jokes… this episode covers the entire collapsing spectrum of digital ownership in 2025.🎯 QUESTION FOR YOU:What’s something you thought you owned… that you later realized wasn’t really yours?Post it in the comments — we’ll feature the best ones.🎧 Prefer audio?Subscribe to the Legitimate Cybersecurity podcast on any platform:👉 https://legitimatecybersecurity.podbean.com/📩 Media / interview requests:admin@legitimatecybersecurity.comChapter Breaks:00:00 – Cold Open: “Your phone can be remotely disabled—so do you actually own it?”00:33 – Streaming, OS licensing, and why your iPhone is rented, not owned01:20 – Companies can delete your data at will — Google, Tesla, Apple01:45 – The John Deere DRM nightmare02:58 – Gaming industry: the original warning sign04:09 – Cloud gaming, Stadia, GeForce Now, and the upside of subscriptions05:59 – But tractors doubling in price? Ownership gone wrong06:30 – “They can brick you at any moment” — the Dustin phone hypothetical07:23 – Dustin’s reaction: “I’d never use Google again”08:08 – OFAC, false positives, and the real risk of automated bans08:43 – Dustin’s farming family and the tractor brand civil war09:24 – The horse-as-subscription joke + automated farming tech10:35 – Tesla’s bizarre pricing, self-driving subscriptions, and BlueCruise12:08 – Frank’s Sega CD tragedy and the death of ownership nostalgia13:42 – Porn, HD DVD vs Blu-ray, and where video compression really came from15:55 – Streaming illusions of ownership: Vudu → Fandango disaster17:27 – EULA manipulations and the illusion of choice18:56 – Forced ads even with “ad-free” subscriptions19:27 – Millennials vs the streaming trap — we’re back to cable pricing20:27 – Pillsy shutdown: When smart devices die because companies die21:49 – The normalization of owning nothing23:33 – Subscription cars, self-driving distrust, and ambulances costing thousands24:40 – Can we stop the subscription takeover? Voting with wallet & laws25:34 – Food costs, Whole Foods jokes, inflation, and generational struggle26:10 – Mitsubishi Mirage, Slate truck, and forced compromise27:30 – Gen Z’s brutal job market and AI crushing coder roles29:33 – The CyberSeek fallout: disappearing salary data32:20 – AI moderation deleting posts and accounts without warning33:33 – Should AI ever be allowed to delete people? Objectivity vs bias35:19 – Moderating subreddits and HOAs = punishment jobs36:16 – What digital things do you really own? NAS vs cloud37:26 – Photos, privacy, and pulling memories off the cloud38:25 – Average people don’t have the tools to self-host anything39:13 – Benjamin Franklin quote + “It’s too late to go back”40:32 – Knock-knock joke + Dustin’s hope speech42:24 – The 98% vs the 2% — who really has control43:54 – Outro + Raspberry Pi phone joke#legitimatecybersecurity #cybersecurity #digitalownership #righttorepair #streamingwars #AIModeration #SubscriptionEconomy #johndeere #tesla #cloudcomputing #techpodcasts #dataprivacy #digitalrights #genz #cyberjobs
Show more...
4 weeks ago
44 minutes

Legitimate Cybersecurity Podcasts
Why Security Tools Are Designed To Fail (VP Revelations) #cybersecurity
The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts trying to use them.In this episode, Jennifer Von Kainold (VP of Product Management at BlueVoyant) reveals the dirty secret of security engineering: the tools are built for the builders, not the defenders. Jen breaks down the "Sleep Paralysis" of modern SOCs, why the industry refuses to simplify, and how she went from a Chemistry degree to leading product strategy for a major MDR firm.We also dismantle the panic over Quantum Computing and explain why you’re worried about Q-Day when you don’t even have an asset inventory.Media and interview requests can be made to: admin@legitimatecybersecurity.comAudio listeners can subscribe on any platform and can do it through: https://legitimatecybersecurity.podbean.com/⏱️ CHAPTER BREAKS00:00 – The Dashboard That Causes Panic Attacks00:14 – The “Illusion of Safety” in Tech02:31 – From Coding Fortran to Hacking Genomes06:18 – The “Sleep Paralysis Demon” of Bad UI09:16 – Why Engineers Build Tools for Robots, Not Humans14:29 – Translating “Engineer” to “Human” (The Polyglot Problem)19:31 – The Archer Paradox: When Flexibility Becomes Failure21:58 – Agentic AI: The End of the Dashboard?31:22 – The Myth of the “Single Pane of Glass”35:37 – The Quantum Computing ("Q-Day") Hysteria37:44 – “Where Is Your Super Cold Fridge?!”40:32 – Why We Refuse to Do the Basics (Burnout & Cognitive Load)44:29 – Don’t Wait for the Apocalypse to Lock Your Door46:22 – The Final Verdict#legitimatecybersecurity #uxdesign #quantumcomputing #infosec #burnout #agenticai #techfails #cyberwarfare
Show more...
1 month ago
46 minutes

Legitimate Cybersecurity Podcasts
The Drone Privacy Crisis: What No One Is Telling You. #cybersecurity
Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customers’ houses to jack up premiums. And here’s the terrifying part: nobody knows who owns them, and the laws protecting you are a mess.In this episode of Legitimate Cybersecurity, Frank, Dustin, and Chris Adkins break down:• The explosion of drone trespassing across the U.S.• Drone “etiquette” (if such a thing exists)• Why shooting down a drone might be illegal… but hijacking its open Wi-Fi might not be• How insurance companies are secretly flying drones to deny coverage• Whether YOU own the air above your home (the answer will piss you off)• The ethics of taking over unencrypted drones• Why the U.S. military once had its Predator drones hacked• The insane world of bathtub drones and balloon monks• And how long until drones accidentally kill someone and trigger a legal revolutionThis episode is chaotic, hilarious, and honestly a little terrifying — one of our most eye-opening discussions yet.Media or interview inquiries: admin@legitimatecybersecurity.comSubscribe to the audio podcast:🔗 https://legitimatecybersecurity.podbean.com/Chapters00:00 – A Drone Could Be Watching You Right Now00:35 – Drone Trespassing is Exploding01:30 – Drone Etiquette: Does It Even Exist?02:45 – The Campsite Drone Freakout03:20 – Drones vs. Guns: Which Is Actually Easier to Stop?04:00 – Anti-Drone Weapons & the FCC Problem05:20 – Building “Ghost Wi-Fi Guns” (Totally Legal?)06:30 – Why Drones Are Outpacing the Law07:15 – Privacy, Backyards & the “Altitude Problem”08:55 – Insurance Companies Are Flying Drones Over Your Home10:45 – Data, Bias & Discrimination From the Sky12:20 – The Future of Drone Regulation (and Why It Will Suck)14:10 – Enforcement, Penalties & the Reality of Privacy16:00 – Drones Getting Better, Cameras Getting Scarier17:20 – Can You Hijack an Unencrypted Drone?19:30 – Military Drone Hacks (Yep… That Happened)20:50 – Ukrainian Fiber-Wire Drones21:30 – Dustin’s Ethics: “If It’s Unsecured… That’s On You.”22:15 – Should Homeowners Be Notified Before Being Filmed?23:00 – Air Rights: Who Actually Owns the Sky Above Your House?26:00 – Maryland Airspace Laws You Didn’t Know27:30 – The Insane Bathtub Drone Guy28:20 – Balloon Monks & BB Guns at 10,000 Feet29:50 – Final Thoughts & Holiday ScheduleHashtags#legitimatecybersecurity #cybersecurity #dronesurveillance #DronePrivacy#technews #Hacking#privacyrights #infosec #cyberethics #InsuranceFraud
Show more...
1 month ago
30 minutes

Legitimate Cybersecurity Podcasts
SIM Swapping Is Back — And They Can Steal Your Phone Without Touching It #cybersecurity
SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how modern thieves hijack your SIM, clone your phone, intercept your MFA codes, and drain your accounts… all without ever touching your device.We cover:• Why your phone number is the master key to your digital life• How eSIMs changed the threat landscape• Real-world stories of Gmail & crypto takeovers• Why teens AND the elderly are getting hit hard• Why your SIM might be less secure than the Coca-Cola formula• Chinese electronics bans, printer economics, zombie barter value, and exploding Hezbollah pagers (yes, really)This episode is technical, hilarious, terrifying, and extremely relevant — especially if you rely on your phone for anything in your life.📩 Media & Interview Requests: admin@legitimatecybersecurity.com🎧 Audio listeners can subscribe on any platform:https://legitimatecybersecurity.podbean.com/⏱️ CHAPTER BREAKS00:00 — HOOK: “Why is my phone being used at 3AM?”00:35 — Welcome Back + Celebrating 10,000 Subscribers01:25 — What SIM Swapping Looks Like in the Real World02:22 — Why Your Phone Number Is the Master Key to Your Life03:36 — Kids, Phones, and the Multi-Screen Generational Divide04:07 — Why eSIM Makes Attacks Easier to Pull Off05:23 — Dustin’s 40 Old Burner Phones and Spy-Grade Persona Tricks06:25 — The Ancient Sony Xperia Tablet-Phone Monster07:25 — What SIM Cards Actually Are (Clear Explanation)08:10 — SIM Cloning → eSIM Social Engineering Attacks09:20 — MFA Hijacking & Why Your Text Codes Aren’t Safe10:22 — The Missing Industry: “SIM Credit Freezing”12:00 — Carriers as the Weakest Link (And Why They Can’t Stop It)13:10 — Third-Party Risk: Your Data Is Only as Safe as Everyone Else’s Security14:30 — The $90 ‘Most Secure Phone Service on Earth’15:35 — Chris’s Gmail + Coinbase Hack Story From Vacation17:34 — Frank’s 100,000+ Unread Emails & Gmail Identity Crisis19:01 — Credit Report Drama & Who’s Really Most Vulnerable20:11 — Elderly Crypto Retirement Liquidation Scams21:20 — Dustin’s Grandmother Rode a Horse to School (And Why Tech Speed Matters)22:15 — People Don’t Understand How Phones Actually Work24:00 — Teens & AI: The New Scam Generation25:25 — Printer Economics: “Is it Cheaper to Buy a New Printer?”26:34 — Apocalypse Bartering: Printers, Lithium, and Ham Radios29:01 — The Hezbollah Exploding Pagers Operation30:12 — Chinese Electronics Bans: Are We Going Too Far?32:19 — Consumer vs Enterprise Tech Vulnerabilities34:00 — Free Market, Tariffs, and Why We Can’t Buy China’s Best EVs36:00 — Why TP-Link Isn’t Malicious… It’s Just Cheap38:15 — Regulation vs Innovation: Who Should Protect the Consumer?39:26 — FINAL QUESTION: What’s More Secure — Your SSN, Nuclear Blueprints, Your SIM, or the Coca-Cola Formula?43:00 — Closing + The New Catchphrase: “Be Safe, Don’t Do Anything We Wouldn’t Do.”#legitimatecybersecurity #cybersecurity #infosec #simswapping #esim #PhoneHacks #digitalidentity #databreach #techpodcasts
Show more...
1 month ago
44 minutes

Legitimate Cybersecurity Podcasts
AI vs Religion: The Vatican Breaks Its Silence — And It’s Terrifying #cybersecurity
The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin dive deep into the rising spiritual panic around artificial intelligence: AI as a therapist, AI as a partner, AI as a spiritual advisor… and the truly wild question: Should an AI ever be baptized?In this episode of Legitimate Cybersecurity, we explore why major religious leaders are suddenly speaking out, whether AI could cause a crisis of faith, what it means for humanity’s spiritual future, and whether we’re all just NPCs in God's cosmic simulator.Plus:• Why people are telling AI their deepest secrets• Whether AI can “feel” anything• Star Trek’s Data vs. real-world AI• What the FIRST religion to baptize an AI will be• Why robots should NOT have teeth• Dustin invents the term “Crab with a K Cybersecurity”• Frank creates “FrankBible.ai” (please, no one do this)If you want an episode that’s funny, thought-provoking, and utterly uncomfortable in all the best ways… this one’s it.Media & interview requests: admin@legitimatecybersecurity.comAudio listeners: Subscribe everywhere or at https://legitimatecybersecurity.podbean.com/🧭 Chapters00:00 – Can AI cause a crisis of faith?00:42 – The Vatican’s AI Warning: Extinction-level concerns01:23 – Why NOW? Dustin explains the timing02:20 – Anthropomorphizing AI & why we do it03:20 – AI hallucinations vs. just “breaking”03:45 – When people start dating AI04:30 – AI replacing spouses, therapists… and maybe pastors?05:21 – Why the Church might be afraid of losing influence06:19 – When religious leaders start using AI themselves07:10 – Social media déjà vu: Echo chambers and faith08:00 – Will AI reshape religion?09:30 – Frank and Dustin’s childhood church trauma dump (lol)11:00 – Can AI enhance sermons without replacing faith?13:00 – Are religious texts just “data”?14:45 – Using AI to process spiritual conflicts16:00 – Danger: AI as a moral mirror16:30 – Echo chambers & spiritual distortion17:47 – Bible versions + algorithmic interpretation18:37 – How do OTHER religions interpret this?19:20 – Talking to AI = talking to yourself?20:30 – Can AI really replace clergy?22:00 – Faith vs. Ones & Zeros23:30 – Will AI ever be baptized?25:00 – Can AI “feel” emotions? Frank hopes the answer is no27:00 – Why emotional responses ≠ AI feelings28:30 – Philosophical chaos: Are WE God’s AI?29:30 – Frank’s “FrankBible.ai” — the heresy arc30:20 – Which religion baptizes AI first? The answer is spicy31:00 – VR Church, Second Life, and digital baptisms33:10 – Household robots, C-3PO vs. R2-D234:45 – Why are we building humanoid robots?36:00 – Ewok-shaped robot companions? Dustin says no teeth37:20 – Do we need AI commandments?38:00 – Historical pattern: tech never actually kills religion40:00 – Jesus as organic AI?? Frank breaks Dustin41:00 – Are we all Sims and God is AFK?42:00 – The wrap-up: uncomfortable but enlightening#legitimatecybersecurity #ai #religion #vatican #artificialintelligence #cybersecurity #techpodcasts #faithandtech #aiwarning #VaticanStatement #llm #ethicsinai
Show more...
1 month ago
42 minutes

Legitimate Cybersecurity Podcasts
Leonardo da Vinci Had Better Wi-Fi: The $100M Louvre Heist #cybersecurity
What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”?💎 $100 million in jewels disappear, and the world’s best art collection learns what Defense in Dumb really means.In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer unpack how the Louvre Museum was robbed in broad daylight — not just by thieves, but by bad passwords, unpatched servers, and leadership that never took cybersecurity seriously.👉 Topics include:The Windows Server 2003 still guarding priceless art“Defense in Dumb” vs. real defense in depthWhy pen tests without remediation are a waste of moneyHow boredom and bureaucracy kill security programsThe Rosetta Stone irony: stolen artifacts complaining about theftWhat NIST CSF, GRC, and governance diffusion all have to do with itWhy multi-factor authentication isn’t two French guards and a shrugAnd yes — Leonardo da Vinci had better wireless security.📩 Media & Interview Requests: admin@legitimatecybersecurity.com🎧 Audio listeners: Subscribe on any platform →https://legitimatecybersecurity.podbean.com/👇 Comment below: What’s the dumbest password or security setup you’ve seen in the wild?We might feature your story in a future episode.Chapters00:00 – Cold Open: “Imagine robbing the most secure museum on Earth…”01:00 – Defense in Dumb: Louvre’s password was literally “louvre”02:10 – British & French museums suddenly hate theft03:45 – The Cyber Audit That Nobody Fixed05:30 – Pen Testing vs. Actually Doing the Work07:00 – Roof access, open windows, and Netflix-level stupidity09:00 – Boring but critical: why remediation never happens11:00 – Framework fails: ISO, NIST, GDPR, and no one enforces them13:30 – Cyber careers, boredom, and the “borification” of information16:00 – “It really HUMPS your packets”: why GRC isn’t sexy but matters18:30 – Leadership without packets: Steve Jobs, Woz, and cyber blind spots20:00 – How the Louvre failed every NIST CSF function23:00 – MDR myths: detection ≠ protection25:00 – APTs, insurance loopholes, and cyber blame games29:00 – Governance diffusion: when everyone assumes someone else did it31:00 – Legacy tech, no funding, and free open-source fixes33:00 – PFSense, Security Onion & AI helping broke orgs35:00 – Final Takeaway: “Leonardo da Vinci had better Wi-Fi security.”#LegitimateCybersecurity #LouvreHeist #CyberFail#DataBreach #cybersecurity#Hackers#PenTesting#InfoSec#NISTCSF#GRC#MDR#APT#CyberRisk#MuseumHeist#DefenseInDumb#WindowsServer2003
Show more...
2 months ago
37 minutes

Legitimate Cybersecurity Podcasts
Haunted Networks: Possessed Printers, Phantom Texts, and the OG Computer ‘Bug’ #cybersecurity
Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”:• The Ghost in the Printer—Why old JetDirects spit hieroglyphics at night.• Laughing Alexa—The infamous 2018 bug that creeped out the world.• #GhostText—When delayed SMS messages arrived from the… beyond.• Grace Hopper’s Moth—The first literal computer “bug,” preserved in a logbook.We translate spooky glitches into plain-English cyber hygiene: broadcast storms, wake-on-LAN, noisy IoT, always-listening assistants, SMS spoofing, and why physical world failures (heat, humidity, insects!) still crash modern stacks.🎤 Media & interview requests: admin@legitimatecybersecurity.com🎧 Audio listeners: subscribe on any platform via https://legitimatecybersecurity.podbean.com/💬 Drop your own “haunted tech” stories in the comments—we may read them on-air!Chapter Breaks00:00 – Cold open: “Possessed” printers in Portland01:21 – Halloween setup + how we’ll demystify “paranormal” tech02:14 – Case #1: The Ghost in the Printer (broadcast storms + wake-on-LAN)05:01 – Why vulnerability scans make printers spit gibberish08:32 – Broadcast packets 101 (and why Frank hates wake-on-LAN)12:15 – Case #2: Alexa’s bone-chilling laugh (2018 trigger bug)16:55 – Smart speakers as always-listening risk (home & remote work)18:31 – Agentic AI + voice triggers = future home-automation threats23:16 – Case #3: #GhostText—delayed SMS from the “afterlife”27:42 – “HauntLater.com” (Frank’s dubious startup idea)32:59 – Case #4: Grace Hopper and the first literal computer “bug”36:45 – Physical world vs. digital systems (heat, humidity, pests)39:45 – Wrap & CTA: Share your creepy tech stories#legitimatecybersecurity #cybersecurity #halloweenspecial #ghostinthemachine #infosec #smarthome #iot #gracehopper
Show more...
2 months ago
40 minutes

Legitimate Cybersecurity Podcasts
AI Is Quietly Killing Entry-Level Jobs (And No One Wants To Admit It)
Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a subtle shift with massive consequences for cybersecurity, tech, and the middle class. Frank Downs and Dr. Dustin Brewer break down what’s really happening: the automation sugar high, the hollowing of mid-tier careers, why experience over degree over certifications is driving gatekeeping, and how this ends if we don’t course-correct.Learn more about the study here: https://www.economist.com/graphic-detail/2025/10/13/can-ai-replace-junior-workers?giftId=c059cef1-fdf2-4e22-80f7-e8fc16f025bf&utm_campaign=gifted_articleMedia and interview requests: admin@legitimatecybersecurity.comAudio listeners: subscribe on any platform via https://legitimatecybersecurity.podbean.com/Chapter Breaks00:00 – Cold Open: AI is quietly killing entry jobs00:27 – The stat nobody’s talking about 7.7 percent junior hiring drop02:05 – Correlation vs causation pandemic and RTO chaos03:35 – Gatekeeping madness 8 years of Swift and entry roles needing 5 years04:50 – What employers actually value experience over degree over certs06:20 – Why juniors are disappearing AI excels at lower-level tasks07:40 – The seduction shareholders execs and the AI won’t leave you trap09:00 – Societal fallout angry grads hollowed middle class12:30 – Who replaces us if we skip training14:10 – The wall where AI plateaus and humans must return15:30 – Safe vs squeezed trades and specialists vs shrinking middle16:50 – Adaptation 2.0 lessons from past automation waves19:40 – Tech is not automatic good phones social media and productivity23:30 – Cyber never sleeps always-on culture and cognitive offloading25:45 – AI friends the Zuckerberg take and why it is dangerous29:20 – Phone yes social no ethics engagement and shareholders31:10 – Sign-off Black Mirror the void and what we do next#aijobs #cybersecurity #techcareers #futureofwork #generativeai #automation #entryleveljobs #jobmarket #middleclass #legitimatecybersecurity #ai
Show more...
2 months ago
31 minutes

Legitimate Cybersecurity Podcasts
The Day the Cloud Died: How One Outage Broke Everything
What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and enterprise apps face-plant? Frank & Dr. Dustin break down Monday’s AWS DNS outage, why the internet’s “old bones” (DNS/IPv4) still run everything, how dependency hell spreads a local failure worldwide, and whether Web3/IPv6/real decentralization can stop the next domino run.👂 Audio listeners: subscribe on any podcast platform via our feed: https://legitimatecybersecurity.podbean.com/🎤 Media & interview requests: admin@legitimatecybersecurity.comChapters below. Drop your wildest “my house broke when AWS sneezed” story in the comments. ⬇️Chapter Breaks00:00 – Cold Open: “This was Monday” doomsday (beds, banks, Blackboard)00:50 – DNS for Normals: the internet’s phone book (and why it failed)02:45 – Single Point of Failure? us-east-1 and the centralization problem04:03 – “There is no cloud, it’s someone else’s computer” (and your bed’s on it)05:21 – How a regional outage went global: dependencies & third-party calls06:40 – SBOMs, supply chain, and internet-scale dependency hell07:24 – Pi-hole story: when your home DNS goes down, everything stops09:12 – Resiliency vs reality: why some services lived while others died10:45 – The domino stack: uptime, TTLs, and stale DNS making pain linger12:18 – Could IPv6 help? (and why we still haven’t adopted it)14:25 – “Second-gen DNS”: what would a safer, faster resolver look like?16:07 – Monopoly math: if busting big clouds won’t happen, what will?18:47 – Web3/Blockchain as a decentralized DNS idea—promise & tradeoffs20:13 – Tor ≠ the model: decentralization without the dark-web baggage22:20 – AI as infrastructure: power, cost, and more single points of failure23:53 – Why blockchain never got sexy (and why it still might)26:24 – Ghosts in the machine? (Spooky season teaser)27:54 – Wrap: what to do before the next Monday#aws #dns #outage #cloudcomputing #cybersecurity #web3 #ipv6 #smarthome #supplychain #sbom #devops #incidentresponse
Show more...
2 months ago
27 minutes

Legitimate Cybersecurity Podcasts
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) that can hijack AI integrations like email and office suites, quietly exfiltrate your prompts and IP, and even leak them to attacker infrastructure—no clicks required. We also talk about why your chats aren’t protected by legal privilege, how AI activity factored into the California wildfire arsonist story, and what actually works: DLP, model governance, and when you should go local with LLMs.We keep it real (and a little nihilistic) while giving CISOs, IT leaders, and curious humans the playbook to reduce risk without killing innovation.👉 Media & interview requests: admin@legitimatecybersecurity.com🎧 Audio listeners: subscribe on any platform via https://legitimatecybersecurity.podbean.com/💬 Drop your idea for our new sign-off catchphrase in the comments!Chapters:0:00 Cold Open — “What if your AI is spying on you?”0:30 Welcome & Today’s Agenda (EchoLeak, ShadowLeak, legal privilege, arsonist story)1:55 Zero-Touch Exploits Explained (no clicks, still owned)3:11 How It Works via Email & Integrations (silent prompt injection → exfil)4:48 Old Tradecraft, New Target (drive-by vibes, LLMs in the loop)7:55 “Plain-Language Hacking” (Gandalf game, prompt judo)10:27 Why This Still Counts as a Hack (intent, abuse of designed behavior)12:52 Why SOCs Might Miss It (looks like normal AI traffic)14:24 DLP, Asset Mgmt, and the “Hated but Needed” Controls16:44 Should You Run Local LLMs? (pros, cons, update churn)20:30 Liability & Definitions — Is This Really a Hack? (yes, and why)22:25 AI Has No Feelings… But It Leaks Yours (reflection, social engineering)23:16 “No Legal Privilege” Bombshell & The Arsonist Example26:36 Privacy Culture Shift (profiling even when you opt-out)29:45 Cat-and-Mouse Prompts (policy workarounds, “encrypt my answer” tricks)31:19 Don’t Panic, Do Fundamentals — Then Regulate32:36 What Good Regulation Looks Like (and where it fails)35:40 Penalties with Teeth (or companies just budget the fines)38:26 Next Week Tease: DOGE whistleblowers & data handling39:01 Help Us Pick a Catchphrase (Outro & CTAs)#cybersecurity #ai #dataprivacy #pentesting #ZeroTouch #llm #copilot #chatgpt #dlp #infosec #datalossprevention
Show more...
2 months ago
37 minutes

Legitimate Cybersecurity Podcasts
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior talent without gatekeeping, and where AI actually helps (and where it absolutely doesn’t).🎧 Audio listeners can subscribe on any platform (Spotify, Apple, etc.) or here: https://legitimatecybersecurity.podbean.com/💼 Media & interview requests: admin@legitimatecybersecurity.comYou’ll learnWhy scan ≠ secure and how to make risk registers stickThe hiring shift: junior roles, budgets, and AI misconceptionsPackets vs. button-ology—what juniors lose when tools do too muchHow to communicate VM risk at 10k+ asset scaleAI’s “sweet spot” for practitioners (and the painful edges)Chapter Breaks00:00 Cold Open — “Misconceptions about what AI can replace”00:17 Intro — Who is James Gustafson (BlueVoyant)01:14 Origin Story — Movies, IRC, and early curiosity03:13 Army to IT — “Combat cable guy” and real-world networking04:31 Breaking In — 2009 job market, degrees & certs05:48 Obsession & Passion — How to pivot from IT to cyber06:39 Where Did Juniors Go? — Budgets + AI hype08:20 AI Reality Check — Risk shifts, phishing, unknowns10:02 History Rhymes — From mainframes to printing press to AI14:05 VM at Scale — Actionable comms, policy, and ownership15:18 Why Orgs Scan but Don’t Fix — The uncomfortable truth17:06 Priorities vs. Patching — Firefights and thin teams18:05 SOC Then vs. Now — Packets, Snort, SIEM & automation19:54 Button-ology vs Fundamentals — Hiring for platforms22:10 Teaching Without Gatekeeping — Recreating “packet” intuition28:07 Training the Next Gen — Translating deep knowledge30:26 Parenting & Passion — “Be excellent at something”34:27 What’s Going Right — Industry sobers up on AI36:33 Thought Experiment — If we “laid down arms” in cyber…38:08 Wrap — Why fundamentals still win#cybersecurity #vulnerabilitymanagement #bluevoyant #ai #riskmanagement #soc #infosec #careerincybersecurity #cve #CISAKnownExploited #wireshark #Qualys #tenable #crowdstrike #microsoftdefender
Show more...
3 months ago
39 minutes

Legitimate Cybersecurity Podcasts
Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)
What if your “credit score” wasn’t the full story?Frank and Dr. Dustin uncover LexisNexis, the massive data broker quietly collecting everything about you — from your social posts and insurance claims to your driving habits (even roller coasters count).💥 In this episode:The hidden company that knows more about you than Equifax or ExperianWhy you can’t easily see, freeze, or delete your LexisNexis fileThe outrageous “roller coaster incident” that broke a man’s insurance ratingHow U.S. privacy laws fail to protect your data — and why you’re still the productPlus: Taco Bell’s failed AI experiment & what it reveals about the limits of artificial intelligence📺 Watch to the end for a hilarious (and slightly terrifying) discussion on AI gone wrong — from 100,000 tacos to SOCs that might order them next.Subscribe for more Legitimate Cybersecurity deep dives — where we mix real-world cyber truths with humor, clarity, and brutal honesty.👉 Listen anywhere you get podcasts💬 Join the community: r/LegitimateCyber🎙️ Hosted by Frank Downs & Dr. Dustin BrewerChapter Breaks00:00 – Cold Open: The roller coaster that broke his insurance00:20 – “There’s a company tracking your life — and it’s not Equifax”01:25 – The Big Three vs. the unseen fourth: LexisNexis03:44 – How LexisNexis profiles you: social, insurance, driving, and debt05:34 – The invisible rules: Not a credit bureau, not regulated07:36 – Frank’s nightmare: trying to request your LexisNexis file09:29 – “It knows your driving habits — and it’s probably wrong”11:51 – Where’s the line for privacy, jobs, and mortgages?13:18 – Data pollution: Can you flood your profile with fake info?14:11 – OPM breach, lost privacy, and why we’ve already been exposed15:34 – Privacy vs. necessity: the cost of living in a connected world17:22 – Capitalism, democracy, and the right to your own data19:44 – “It just hasn’t made you upset yet”: why no one fights back20:48 – Data ownership: should we get paid for our data?23:10 – The last bipartisan law (and why it was about dogs, not data)27:22 – Hard left turn: Taco Bell’s AI disaster29:44 – The limits of AI — and why you’ll always need humans31:17 – Machine learning déjà vu in cybersecurity32:13 – Cloud, costs, and the AI uncanny valley33:37 – Wrap-up: The real threat behind the “shadow credit bureau”#cybersecurity #dataprivacy #lexisnexis #databrokers #ShadowCredit #ai #consumerprotection #privacyrights #infosec #legitimatecybersecurity
Show more...
3 months ago
32 minutes

Legitimate Cybersecurity Podcasts
Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”
Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controversial cybersecurity questions—no fluff, real talk.In this episode, Frank Downs and (now) Dr. Dustin break down:How to brief a non-technical board so they actually fund security (tie risk to $$, ops impact, and avoid doom-mongering).What should already be automated (network topology & asset management… why isn’t this solved yet?).Should you take a pay cut to break into cyber? The honest “it depends” with finance, family, and sanity in mind.Unpopular opinions: degrees vs certs, do you need to code, and why humility beats fake expertise.“Cybersecurity sucks”—when it does, why it does, and how to know if it’s time to pivot.Where the next gen of cyber talent will come from (CS, bootcamps, liberal arts, law… and maybe alien overlords 👽).👉 New episodes every week.💬 Press or communications inquiries:👇 Chapters below for quick jumping.If you found this helpful, smash Like, drop your spiciest hot take in the comments, and Subscribe for weekly episodes.Chapter Breaks00:00 – Frank crowns Dr. Dustin Brewer (graduation, hoods, and coronation jokes)01:42 – How do you explain risk to a non-technical board?03:16 – From vuln counts to business dollars ($500k vs $23M losses)05:26 – Avoiding “boy who cried wolf” cyber doom-scenarios09:37 – What should already be automated in cybersecurity?10:25 – Network topology & asset management: the automation failures15:25 – Frank’s asset management horror story (Vista laptop box fail)15:51 – Should you take a pay cut to get into cybersecurity?19:20 – Frank’s unsolicited marriage advice for career-changers22:19 – You are not your job: cyber ≠ your identity23:22 – Unpopular opinions: degrees vs certs, no coding required29:30 – Why you still need a risk register29:51 – “There are no experts in cybersecurity”… or are there?35:33 – Does cybersecurity suck? When it does, and why37:37 – Frank’s dentist “tongue suction” horror story → career clarity42:26 – Where the next generation of cyber talent will come from47:48 – Final thoughts & wrap-up#cybersecurity #ciso #riskmanagement #cybercareers #automation #infosec #cyberjobs #reddit #legitimatecybersecurity
Show more...
3 months ago
45 minutes

Legitimate Cybersecurity Podcasts
From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity
Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory.In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependency hell, to Dustin’s Coast Guard days that led him into DoD cyber operations and battlefield coding.What you’ll hear:Frank’s unexpected pivot from English major → Arabic → US Intelligence → Packet Hunters → ISACA → vCISODustin’s childhood obsession with modems, Prodigy, and “Hackers” → DoD cyber ops → Iraq deployment software award → BlueVoyant leadershipWhy Wireshark still matters more than ever in an encrypted worldThe three inflection points that changed Frank’s career foreverWhy frameworks (NIST, ISO, HITRUST) keep failing—and Dustin’s PhD research into the human factor of securityWhat we focus on today: AI, vCISO work, penetration testing, and the balance of family + cyber🎯 If you’re looking for career inspiration, real stories, and unfiltered lessons from two practitioners who’ve done the work—this episode is for you.Timestamps below.📩 Questions? admin@legitimatecybersecurity.com💬 Drop a comment—we reply fast.🔔 Subscribe for more real-world cybersecurity with humor and honesty.Chapter Breaks00:00 Cold Open – “Why should you listen to us? You shouldn’t.”00:19 Meet your hosts: Dustin & Frank00:36 Why this episode: career steps & credibility check01:23 Setting the stage: our backgrounds in cyber02:06 Frank’s accidental entry into cybersecurity (post-9/11, US Intelligence)03:26 The language grind: Arabic immersion & Spanish surprises05:24 From Nordstrom suits to DoD analyst (wrong master’s degree first!)07:15 Building real skills, Packet Hunters, and ISACA transition07:40 Discovering Wireshark: packets as puzzles with real-world impact09:02 Wi-Fi experiments, streaming flex, and home internet humility09:48 Frank’s advice: explore cyber early—or you’ll be miserable10:19 Dustin’s story begins: Palm Bay, Florida + engineering neighbors11:14 Simpsons saxophone teacher → first coding mentor12:32 AOL for DOS, Prodigy, CompuServe → modem obsession13:26 Networking excitement & “Hackers” movie inspiration14:23 Linux from scratch & dependency hell at age 1515:17 School vs passion: community college frustrations → military track16:25 Coast Guard IT school → voluntold to Fort Meade (DoD cyber ops)18:03 Ground-up learning → teaching others by doing19:13 Linux from scratch = trial by fire learning19:51 Wireshark packet analysis as the foundation skill21:02 Policy + frameworks: the cowboy days before NIST awareness22:43 Frank’s 3 inflection points: contracting leap, Packet Hunters, discovering NIST25:50 Dustin’s inflection points: first root login, Project Phalanx, Iraq software success27:54 Building impactful systems → Army Achievement Medal for battlefield code29:27 Perspective: cyber ops under fire → calm in the private sector30:22 Frank now: family focus, vCISO variety, and AI’s cultural impacts34:14 Tech culture & identity: from iPods to Meta glasses34:53 Dustin now: pen testing, vuln mgmt, and a PhD on framework adoption37:42 Why frameworks keep failing: the human layer39:31 Rethinking cybersecurity like medicine, not just militaristic defense40:15 How to reach us & engage with the show41:04 Sign-off#cybersecurity #careerstories #packets #wireshark #linux #dod #usintelligence #techcareers #careeradvice #pentesting #vCISO #humanfactors #ai #frameworks
Show more...
3 months ago
41 minutes

Legitimate Cybersecurity Podcasts
Secret Algorithms Controlling You! Are You the User… or the Product?
Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s engagement shift—this episode asks the hard question: are you in control, or are you being steered?We also hit the nuance: when AI spots tumors earlier and flags outbreaks faster, do the ends justify the data means? Echo chambers, algorithm “poisoning,” privacy laws (or lack thereof in the U.S.), and the real-world line between convenience and manipulation—plus the wild story of a nurse who could smell disease before doctors could test for it.🎧 Subscribe for sharp, funny, no-fluff cyber talk every week.💬 Drop your take: are you comfortable trading agency for convenience?—👥 Hosts: T. Frank Downs & Dustin Brewer🎙️ Podcast + clips: @LegitimateCybersecurity🧠 Subreddit: r/LegitimateCyber🔔 Like, subscribe, and share to beat the algorithm at its own game.Chapter Breaks00:00 – Cold Open: “If you’re not paying, you’re the product.”01:20 – TikTok: personalization vs. geopolitics02:37 – OPM breach & SF-86: the most intimate data spill04:08 – Data brokers & geolocation: finding anyone (even Congress)05:22 – The U.S. privacy gap (hello CCPA, goodbye federal law)06:11 – Shadow credit files: LexisNexis, GM telemetry & your insurance07:45 – Maps that nudge: are routes sold to brands?08:23 – Amazon’s “sponsored” defaults & subtle purchase steering09:39 – “Emergent behaviors” & divisive feed design10:53 – Can we trust any filter—and do we have options?11:30 – AI is code (and code is messy): hallucinations & ad-stuffed search12:27 – Living private vs. living miserable: the balance problem15:16 – Biased training data: we met the trainer and it’s us17:47 – Medicine wins: diagnostics vs. the data tradeoff19:30 – Joy Milne & “the smell of disease”: human pattern-finding#cybersecurity #algorithms #privacy #ai #databrokers #tiktok #opm #EchoChambers #RecommenderSystems #DigitalEthics #Nudging #LegitimateCybersecurity22:44 – AI for signals, humans for meaning23:34 – Robots, laundry… and the rental future24:57 – Do people want out of echo chambers?26:57 – Comfort vs. being “right”: why rage sells27:24 – Algorithm poisoning ethics: self-defense or sabotage?28:11 – The kindness trap: loneliness, AI compliments & harms30:16 – What practitioners should do: policy, guardrails, education32:25 – The inevitable? Choosing agency in a steered world33:16 – Outro: “If this was recommended to you…”
Show more...
4 months ago
33 minutes

Legitimate Cybersecurity Podcasts
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—and eventually advising top companies through breaches and building cyber programs.We cover:How non-traditional paths (like the Navy) can launch cyber careersThe evolution of SOC life and tools (FireEye, ArcSight, Palo Alto, CrowdStrike, etc.)The AI security paradox: why AI will cause more breaches, not fewerWhy leadership culture determines breach resilienceThe controversial new “Letters of Marque” bill that could legalize U.S. cyber privateersThis episode is packed with career lessons, insider war stories, and the kind of weird/funny hypotheticals that only Legitimate Cybersecurity delivers.⏱️ Chapter Breaks00:00 – Intro & Chris’ non-traditional entry into cyber01:20 – Life on submarines & discovering IT underwater04:20 – From BackTrack to BP: finding cybersecurity as a career07:00 – SOC life at BP: Panama shifts, POCs, and new tools10:40 – FireEye, EDR, and the evolution of detection tech13:50 – Why AI may actually increase breaches16:30 – Career changers & why it’s hard to “get into cyber”20:00 – The problem with cybersecurity education & perception27:30 – The “Letter of Marque” bill: cyber privateers?!38:40 – Post-breach consulting: calming chaos & fixing culture44:20 – Bias, assumptions, and the hidden root of breaches50:00 – If SOCs ran on ChatGPT: complaints & HR problems52:40 – Funniest phishing excuses & cyber training fails59:40 – Leadership, culture, and why CEOs define cyber success1:03:30 – Wrap up & Chris’ future return#Cybersecurity #Hacking #AI #SOC #CyberCareers #LegitimateCybersecurity #NavyToCyber #Infosec
Show more...
4 months ago
48 minutes

Legitimate Cybersecurity Podcasts
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success.We cover:How a team helped take down the dark web—twiceDFIR reality vs myth: scoping, persistence hunts, EDR triage, due diligence in M&AThe RDP ≈ drunk driving analogy you’ll never forgetFBI - Private sector: what translates (and what doesn’t)Career advice for students & pros in the age of AI: become “rangeful,” seize moments👥 Guest: Vincent D’Agostino — Head of DFIR @ BlueVoyant; former FBI agent & attorney🎙 Hosts: Frank Downs & Dustin Brewer📌 Subscribe for deep, funny, legit cyber every week.Chapter List0:00 Cold Open — “Dark Web x2”0:22 Intro & Who is Vincent D’Agostino1:05 8086, 5MB HDD & falling in love with computers5:30 From law to FBI: timing, tech, and reality checks10:45 Cyber squads, TOR, Bitcoin & dark web context16:30 DFIR in practice: scoping, EDR, persistence hunts24:30 The RDP ≈ drunk driving analogy every CISO needs29:30 Competence over politics (how to show up in calls)34:30 Career “Range”: why hobbies compound into expertise45:30 M&A due diligence: IR skills without the sirens51:00 Humor as a tool: rapport in dark situations57:00 3 Takeaways + Subscribe/Next Episode#DarkWeb #DFIR #DigitalForensics #IncidentResponse #FBI #BlueVoyant #Cybersecurity #CyberPodcast #ThreatHunting #EDR #Velociraptor #SentinelOne #Ransomware #CISO #Bitcoin #TOR #BlueTeam #CareerAdvice #AI #LegitimateCybersecurity #MandA #DueDiligence
Show more...
4 months ago
1 hour 1 minute 27 seconds

Legitimate Cybersecurity Podcasts
ChatGPT-5: Smarter Hackers, Dumber Defenders?
ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and the future of cybersecurity.👉 Is ChatGPT-5 truly artificial intelligence, or just machine learning with a better paint job?👉 Can AI pass cybersecurity exams like the CISSP?👉 Will AI babysit your kids one day — and should that terrify you?Stay tuned for the myths, the laughs, and the real risks.Watch to the end for a wild take on Star Trek, civil wars, and whether AI could really replace humans.#AI #CyberSecurity #ChatGPT5 #Hacking #TechNewsChapter List:0:00 – Cold Open (funny/hooky clip)0:10 – Welcome + Episode Setup1:00 – What’s Actually New in ChatGPT-5?3:00 – Pretty Code That Doesn’t Work5:00 – AI as the Annoying Coworker7:00 – Is This Really AI or Just ML?10:00 – Hackers Don’t Care If It’s Wrong13:00 – Cognitive Offloading + Laziness Debate15:30 – Weird Time: Frank’s Coding Fail Story18:30 – The Rise of Prompt Engineers21:00 – AI Gone Wrong (Teen Suicide Example)23:30 – Postmodern Truth & Poisoned Data Sources27:00 – Can AI Pass the CISSP? Cheating & Proctors33:00 – The Real Definition of AI (John McCarthy 1956)36:00 – AI Slop in Writing and Coding38:30 – Certification Exams & The Drunk Security Practitioner40:30 – Wrap Up: ChatGPT-5 = Faster, Not Smarter#ChatGPT5 #CyberSecurity #ArtificialIntelligence #TechNews #Hacking #MachineLearning #AIHype
Show more...
4 months ago
41 minutes 40 seconds

Legitimate Cybersecurity Podcasts
Legitimate Cybersecurity Podcasts