Look for any podcast host, guest or anyone
Showing episodes and shows of

LegitimateCybersecurity

Shows

Legitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsInternet of (Terrifying) Things: IoT Hacks, Biochips & Beer BotsToday on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the creepy rise of biohacking and RFID implants, and find out what happens when Roombas spy on you in the bathroom. We also break down why IoT devices are so vulnerable, the challenges with...2025-07-2432 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsWe’re Losing the Cyber War — Here’s Why | UMD’s Charles HarryDr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it. We explore: Strategic cyber risk (not just IT vulnerabilities) Mapping 50,000+ exposed devices across U.S. counties The "operational art" of cyber warfare ...2025-07-1853 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsYou Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoning and post-truth dangers 🛡️ AI in cybersecurity: helper or hazard? 🎭 Aquaman scams grandma?! ...2025-07-1435 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsThe Truth About Ethical Hacking (Pen Testing Myths Busted!)Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, and GPEN really mean ✅ Why most companies have no idea what’s on their network ✅ Real pen test experiences gone sideways ✅ Why you might st...2025-07-1041 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsAI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify YouSorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting and blue team burnout, we demystify the buzzwords, talk real-world applications, and get a little weird with some philosophical takes. And yes, Clippy makes a comeback. 🧠 Topic...2025-06-2857 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsQuiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World SecurityIn this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype: what’s real, what’s marketing How tribalism creeps into tech debates—and how to resist it ...2025-06-2447 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsHe Took Down Silk Road — Now He’s Warning About a 16 Billion Record BreachWhat happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, tracking cybercriminals through the rise of Tor and Bitcoin, and launching the FBI’s first data wiretap. Today, he serves as Global Head of Professional Services at BlueVoyant, advising Fortune 500 companies on how to stay ahead of...2025-06-2452 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsCyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NIST CSF and ISO 27001 matter How corporate culture can make or break your cybersecurity And… how Frank may have cursed...2025-06-1747 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsCyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital ResilienceIn this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-world examples of companies affected by cyber incidents and emphasize the need for proactive measures and continuous education in the field of cybersecurity. Takeaways Cybersecurity is a continuous concern that businesses must address. Recent ransomware attacks have...2025-05-2145 minLegitimate Cybersecurity PodcastsLegitimate Cybersecurity PodcastsCybersecurity, Dishwashers, and AI Threats: Welcome Back!After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They explore: The cultural and business reasons patching never gets prioritized How vulnerability management became the garbage collection of cyber Why budget...2025-05-1347 min