Security Unfiltered Podcast Por Joe South arte de portada

Security Unfiltered

Security Unfiltered

De: Joe South
Escúchala gratis

Acerca de esta escucha

Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!© 2025 Security Unfiltered Economía Exito Profesional Política y Gobierno
Episodios
  • Can Your Messaging Survive the Quantum Computing Threat?
    Jun 24 2025

    Send us a text

    Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete.

    • Anurag's extensive background in technology from Apple to Sprint and participation in the National Broadband Task Force
    • How mobile messaging has infiltrated enterprises without proper security consideration
    • Consumer messaging apps were never designed to be secure, controlled by IT, or regulatory-compliant
    • What "true end-to-end encryption" means and why most platforms claiming it actually decrypt messages in transit
    • The concept of "Q-Day" - when quantum computers will break current encryption methods
    • Biden administration's executive order mandating quantum-resistant encryption by 2028
    • How cyber capabilities have been weaponized by nation-states, creating unprecedented threats
    • AI-powered phishing attacks becoming increasingly sophisticated, including voice cloning
    • The importance of implementing quantum-proof encryption now rather than waiting
    • Netsphere's approach to quantum-resistant security for enterprise messaging

    Find Anurag on LinkedIn (Anurag Lal) and learn more about Netsphere at netsphere.com

    Chapters

    00:00 Introduction and Background of Anurag Lal
    05:52 Netsphere: A Solution for Secure Enterprise Messaging
    12:08 The Importance of Encryption and Quantum Security
    18:03 Apple's Approach to Security and Personal Experiences
    28:34 Security Perspectives: Apple vs. Android
    35:46 The Urgency of Quantum Security
    43:10 Access Control: The Weakest Link in Security
    49:42 AI in Phishing: A Real-World Example

    Digital Disruption with Geoff Nielson
    Discover how technology is reshaping our lives and livelihoods.

    Listen on: Apple Podcasts Spotify

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Más Menos
    52 m
  • The SHOCKING Truth About AI Security in Hospitals
    Jun 16 2025

    Send us a text

    Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust.

    • Taylor's journey from aspiring physical therapist to cybersecurity expert through a chance college course
    • The importance of diverse experience across different security domains for career longevity
    • How healthcare organizations have become prime targets due to valuable data and outdated security
    • The emerging AI arms race creating unprecedented security challenges and opportunities
    • Voice cloning technology enabling sophisticated social engineering attacks, including an almost successful $20 million fraud
    • Emerging trends in security validation with tools pulling data directly from security systems
    • The shift from viewing security as a cost center to leveraging it as a sales advantage
    • Why enterprises are driving security standards more effectively than regulators

    Eden Data provides outsourced security, compliance, and privacy services for technology companies at all stages, from pre-revenue startups to publicly traded enterprises, helping them build robust security programs aligned with regulatory frameworks and customer expectations.


    Digital Disruption with Geoff Nielson
    Discover how technology is reshaping our lives and livelihoods.

    Listen on: Apple Podcasts Spotify

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Más Menos
    46 m
  • Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
    Jun 2 2025

    Send us a text

    Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever.

    • Domain security is often overlooked despite being critical to an organization's reputation and online presence
    • Over 93% of security professionals can't identify their company's domain registrar or DNS provider
    • Modern cyber criminals are sophisticated organizations who target "soft targets" rather than heavily defended perimeters
    • AI-powered tools like FraudGPT and WormGPT enable custom malware creation for as little as $200 on the dark web
    • Voice cloning and deepfake technologies are being used in increasingly convincing social engineering attacks
    • Zero Trust architecture and layered security approaches are essential for comprehensive protection
    • Blended attacks targeting multiple systems simultaneously represent the future of cyber warfare
    • Reputation management encompasses domain protection, brand abuse prevention, and counterfeit detection
    • Personal data protection requires vigilance about what you share online and implementing proper security at home
    • Companies must have actionable response plans, not just detection capabilities

    Connect with Ihab Shraim on LinkedIn or email him at ihab.shraim@cscglobal.com to learn more about domain security and protecting your online presence.


    Digital Disruption with Geoff Nielson
    Discover how technology is reshaping our lives and livelihoods.

    Listen on: Apple Podcasts Spotify

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Más Menos
    55 m
adbl_web_global_use_to_activate_webcro805_stickypopup
Todavía no hay opiniones