Home
Categories
EXPLORE
Music
True Crime
Society & Culture
Comedy
Business
Education
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/bf/2d/8f/bf2d8f3c-577b-0373-abce-16e047be40c8/mza_11189974766247544856.jpg/600x600bb.jpg
Security Unfiltered
Joe South
261 episodes
4 days ago
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, an...
Show more...
Technology
Business,
Careers,
News
RSS
All content for Security Unfiltered is the property of Joe South and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, an...
Show more...
Technology
Business,
Careers,
News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/bf/2d/8f/bf2d8f3c-577b-0373-abce-16e047be40c8/mza_11189974766247544856.jpg/600x600bb.jpg
Zero Trust Architecture: The Future of Cybersecurity
Security Unfiltered
50 minutes
4 months ago
Zero Trust Architecture: The Future of Cybersecurity
Send us a text Cybersecurity expert Bob Kochan from Beyond Identity discusses the evolution of security from network defense to identity-first approaches. He shares insights on how AI is transforming security operations while creating new threat vectors, emphasizing the need for phishing-resistant authentication solutions in today's threat landscape. • Traditional security focused on network layers, but SaaS adoption exposed vulnerable identity systems • Zero Trust architecture must start wi...
Security Unfiltered
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, platform fatigue, and curated personas • kids chasing influence and the low barrier to entry • leaving school early, offshore work, an...