podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
LegitimateCybersecurity
Shows
Legitimate Cybersecurity Podcasts
AI Is Rebuilding the Dead — With Your Data
Your body dies — but your accounts don’t. And now AI can be trained on the dead. So who “owns” your digital afterlife… and who gets to use it? In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer unpack the real risk behind “legacy accounts,” AI memorial bots, and digital grief tools: consent, identity control, and what happens when someone can simulate you without you. We cover the ethics of training on deceased users, the slippery slope from grief-support to manufactured relationships, and why regulation vs. private co...
2025-12-28
37 min
Legitimate Cybersecurity Podcasts
5 Holiday Scams That Drain Your Money Fast (Gift Cards, Texts, QR)
Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now. In December, attackers don’t need skill. They need distracted people. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down the five highest-volume holiday scams hitting normal, smart people—gift cards, shipping texts, QR codes, travel Wi-Fi, and even AI voice cloning. You’ll learn: How gift cards are drained before act...
2025-12-19
45 min
Legitimate Cybersecurity Podcasts
Your Phone, Your Car, Your Movies—You Don’t Actually Own ANY of It #cybersecurity
Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke your access, or simply shut down the servers your devices rely on. And now with AI moderation quietly deleting accounts behind the scenes… who’s really in control? In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer explore: How Apple, Google, Tesla, and John Deere can remotely brick your devices Why your “purchased” movies on Vudu/Fanda...
2025-12-12
44 min
Legitimate Cybersecurity Podcasts
Why Security Tools Are Designed To Fail (VP Revelations) #cybersecurity
The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts trying to use them. In this episode, Jennifer Von Kainold (VP of Product Management at BlueVoyant) reveals the dirty secret of security engineering: the tools are built for the builders, not the defenders. Jen breaks down the "Sleep Paralysis" of modern SOCs, why the industry refuses to simplify, and how she went from a Chemistry degree to leading product strategy for a major MDR firm.
2025-12-05
46 min
Legitimate Cybersecurity Podcasts
The Drone Privacy Crisis: What No One Is Telling You. #cybersecurity
Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customers’ houses to jack up premiums. And here’s the terrifying part: nobody knows who owns them, and the laws protecting you are a mess. In this episode of Legitimate Cybersecurity, Frank, Dustin, and Chris Adkins break down: • The explosion of drone trespassing across the U.S. • Drone “etiquette” (if such a thing exists) • Why shooting down a drone might be illegal… but hijacking its open Wi-Fi might not...
2025-11-28
30 min
Legitimate Cybersecurity Podcasts
SIM Swapping Is Back — And They Can Steal Your Phone Without Touching It #cybersecurity
SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how modern thieves hijack your SIM, clone your phone, intercept your MFA codes, and drain your accounts… all without ever touching your device. We cover: • Why your phone number is the master key to your digital life • How eSIMs changed the threat landscape • Real-world stories of Gmail & crypto takeovers • Why teens AND the elderly are getting hit hard • Why...
2025-11-21
44 min
Legitimate Cybersecurity Podcasts
AI vs Religion: The Vatican Breaks Its Silence — And It’s Terrifying #cybersecurity
The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin dive deep into the rising spiritual panic around artificial intelligence: AI as a therapist, AI as a partner, AI as a spiritual advisor… and the truly wild question: Should an AI ever be baptized? In this episode of Legitimate Cybersecurity, we explore why major religious leaders are suddenly speaking out, whether AI could cause a crisis of faith, what it means for humanity’s spiritual future, and whether we’re...
2025-11-16
42 min
Legitimate Cybersecurity Podcasts
Leonardo da Vinci Had Better Wi-Fi: The $100M Louvre Heist #cybersecurity
What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”? 💎 $100 million in jewels disappear, and the world’s best art collection learns what Defense in Dumb really means. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer unpack how the Louvre Museum was robbed in broad daylight — not just by thieves, but by bad passwords, unpatched servers, and leadership that never took cybersecurity seriously. 👉 Topics include: The Windows Se...
2025-11-10
37 min
Legitimate Cybersecurity Podcasts
Haunted Networks: Possessed Printers, Phantom Texts, and the OG Computer ‘Bug’ #cybersecurity
Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”: • The Ghost in the Printer—Why old JetDirects spit hieroglyphics at night. • Laughing Alexa—The infamous 2018 bug that creeped out the world. • #GhostText—When delayed SMS messages arrived from the… beyond. • Grace Hopper’s Moth—The first literal computer “bug,” preserved in a logbook. We translate spooky glitches into plain-English cyber hygiene: broadcast storms, wake-on-LAN, noisy IoT, always-listening assistants, SMS spoofing, and why physical world failures (heat, humidity, insects!) still c...
2025-10-31
40 min
Legitimate Cybersecurity Podcasts
AI Is Quietly Killing Entry-Level Jobs (And No One Wants To Admit It)
Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a subtle shift with massive consequences for cybersecurity, tech, and the middle class. Frank Downs and Dr. Dustin Brewer break down what’s really happening: the automation sugar high, the hollowing of mid-tier careers, why experience over degree over certifications is driving gatekeeping, and how this ends if we don’t course-correct. Learn more about the study here: https://www.economist.com/graphic-detail/2025/10/13/can-ai-replace-junior-workers?giftId=c059cef1-fdf2-4e22-80f7-e8f...
2025-10-28
31 min
Legitimate Cybersecurity Podcasts
The Day the Cloud Died: How One Outage Broke Everything
What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and enterprise apps face-plant? Frank & Dr. Dustin break down Monday’s AWS DNS outage, why the internet’s “old bones” (DNS/IPv4) still run everything, how dependency hell spreads a local failure worldwide, and whether Web3/IPv6/real decentralization can stop the next domino run. 👂 Audio listeners: subscribe on any podcast platform via our feed: https://legitimatecybersecurity.podbean.com/ 🎤 Media & interview requests: admin@legitimatecybersecurity.com ...
2025-10-22
27 min
Legitimate Cybersecurity Podcasts
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) that can hijack AI integrations like email and office suites, quietly exfiltrate your prompts and IP, and even leak them to attacker infrastructure—no clicks required. We also talk about why your chats aren’t protected by legal privilege, how AI activity factored into the California wildfire arsonist story, and what actually works: DLP, model governance, and when you should go local with LLMs. We keep it real (and a little nihilist...
2025-10-17
37 min
Legitimate Cybersecurity Podcasts
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior talent without gatekeeping, and where AI actually helps (and where it absolutely doesn’t). 🎧 Audio listeners can subscribe on any platform (Spotify, Apple, etc.) or here: https://legitimatecybersecurity.podbean.com/ 💼 Media & interview requ...
2025-10-11
39 min
Legitimate Cybersecurity Podcasts
Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)
What if your “credit score” wasn’t the full story? Frank and Dr. Dustin uncover LexisNexis, the massive data broker quietly collecting everything about you — from your social posts and insurance claims to your driving habits (even roller coasters count). 💥 In this episode: The hidden company that knows more about you than Equifax or Experian Why you can’t easily see, freeze, or delete your LexisNexis file The outrageous “roller coaster incident” that broke a man’...
2025-10-06
32 min
Legitimate Cybersecurity Podcasts
Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”
Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controversial cybersecurity questions—no fluff, real talk. In this episode, Frank Downs and (now) Dr. Dustin break down: How to brief a non-technical board so they actually fund security (tie risk to $$, ops impact, and avoid doom-mongering). What should already be automated (network topology & asset management… why isn’t this solved yet?). Should you...
2025-09-29
45 min
Legitimate Cybersecurity Podcasts
From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity
Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependency hell, to Dustin’s Coast Guard days that led him into DoD cyber operations and battlefield coding. What you’ll hear: Frank’s unexpected pivot from English m...
2025-09-22
41 min
Legitimate Cybersecurity Podcasts
Secret Algorithms Controlling You! Are You the User… or the Product?
Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s engagement shift—this episode asks the hard question: are you in control, or are you being steered? We also hit the nuance: when AI spots tumors earlier and flags outbreaks faster, do the ends justify the data means? Echo chambers, algorithm “poisoning,” privacy laws (or lack thereof in th...
2025-09-12
33 min
Legitimate Cybersecurity Podcasts
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—and eventually advising top companies through breaches and building cyber programs. We cover: How non-traditional paths (like the Navy) can launch cyber careers ...
2025-09-05
48 min
Legitimate Cybersecurity Podcasts
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth: scoping, persistence hunts, EDR triage, due diligence in M&A The RDP ≈ drunk driving analogy you’ll never forget...
2025-08-25
1h 01
Legitimate Cybersecurity Podcasts
ChatGPT-5: Smarter Hackers, Dumber Defenders?
ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and the future of cybersecurity. 👉 Is ChatGPT-5 truly artificial intelligence, or just machine learning with a better paint job? 👉 Can AI pass cybersecurity exams like the CISSP? 👉 Will AI babysit your kids one day — and...
2025-08-18
41 min
Legitimate Cybersecurity Podcasts
From Recon to Wrecked: The Cyber Kill Chain Breakdown (With Laughs)
What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cyber Kill Chain — Lockheed Martin’s 7-stage framework for understanding and stopping attacks — and compare it to the MITRE ATT&CK framework, hacker methodology, and even… honeypots, magicians, and Christopher Nolan films. We cover: The 7 stages: Recon, Weaponization, Delivery, Exploitation, Installation, C2, and Actions on Objectives Why insurance companies make cyber defense harder
2025-08-13
40 min
Legitimate Cybersecurity Podcasts
Quantum Day is Coming: Will Quantum Computing Break Cybersecurity?
Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and Dustin break down Q-Day, the moment when quantum computers may render current cryptography useless. We explore how close we really are, the science (and hype) behind quantum technology, and what CISOs should be doing NOW to prepare. Along the way, expect tangents about Star Trek, Ant-Man, AI, and a few moments that’ll make you laugh out loud. 🎙️ Got a topic or guest suggestion? Email us at: admin@legitimatecybersecurity.com
2025-08-04
36 min
Legitimate Cybersecurity Podcasts
Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots
Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the creepy rise of biohacking and RFID implants, and find out what happens when Roombas spy on you in the bathroom. We also break down why IoT devices are so vulnerable, the challenges with...
2025-07-24
32 min
Legitimate Cybersecurity Podcasts
We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry
Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it. We explore: Strategic cyber risk (not just IT vulnerabilities) Mapping 50,000+ exposed devices across U.S. counties The "operational art" of cyber warfare ...
2025-07-18
53 min
Legitimate Cybersecurity Podcasts
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoning and post-truth dangers 🛡️ AI in cybersecurity: helper or hazard? 🎭 Aquaman scams grandma?! ...
2025-07-14
35 min
Legitimate Cybersecurity Podcasts
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, and GPEN really mean ✅ Why most companies have no idea what’s on their network ✅ Real pen test experiences gone sideways ✅ Why you might st...
2025-07-10
41 min
Legitimate Cybersecurity Podcasts
AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You
Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting and blue team burnout, we demystify the buzzwords, talk real-world applications, and get a little weird with some philosophical takes. And yes, Clippy makes a comeback. 🧠 Topic...
2025-06-28
57 min
Legitimate Cybersecurity Podcasts
Quiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World Security
In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype: what’s real, what’s marketing How tribalism creeps into tech debates—and how to resist it ...
2025-06-24
47 min
Legitimate Cybersecurity Podcasts
He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach
What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, tracking cybercriminals through the rise of Tor and Bitcoin, and launching the FBI’s first data wiretap. Today, he serves as Global Head of Professional Services at BlueVoyant, advising Fortune 500 companies on how to stay ahead of...
2025-06-24
52 min
Legitimate Cybersecurity Podcasts
Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)
🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NIST CSF and ISO 27001 matter How corporate culture can make or break your cybersecurity And… how Frank may have cursed...
2025-06-17
47 min
Legitimate Cybersecurity Podcasts
Cyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital Resilience
In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-world examples of companies affected by cyber incidents and emphasize the need for proactive measures and continuous education in the field of cybersecurity. Takeaways Cybersecurity is a continuous concern that businesses must address. Recent ransomware attacks have...
2025-05-21
45 min
Legitimate Cybersecurity Podcasts
Cybersecurity, Dishwashers, and AI Threats: Welcome Back!
After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They explore: The cultural and business reasons patching never gets prioritized How vulnerability management became the garbage collection of cyber Why budget...
2025-05-13
47 min