Home
Categories
EXPLORE
Music
True Crime
Comedy
Society & Culture
News
History
Business
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/bf/2d/8f/bf2d8f3c-577b-0373-abce-16e047be40c8/mza_11189974766247544856.jpg/600x600bb.jpg
Security Unfiltered
Joe South
261 episodes
3 days ago
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, an...
Show more...
Technology
Business,
Careers,
News
RSS
All content for Security Unfiltered is the property of Joe South and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, an...
Show more...
Technology
Business,
Careers,
News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/bf/2d/8f/bf2d8f3c-577b-0373-abce-16e047be40c8/mza_11189974766247544856.jpg/600x600bb.jpg
Top SAP Security Threat Hunting Strategies Used by Elite Researchers
Security Unfiltered
52 minutes
1 month ago
Top SAP Security Threat Hunting Strategies Used by Elite Researchers
Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Commodore 64 and BBS to IT and security • contrast between the Wild West era and today’s tool-rich learning • help desk as a foundation for people s...
Security Unfiltered
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, an...