podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
LegitimateCybersecurity
Shows
Legitimate Cybersecurity Podcasts
AI Is Now Faking Loved Ones and Setting Prices
AI is no longer just answering prompts — it is imitating dead relatives, profiling shoppers, and helping companies decide what people pay. That matters because the same hidden data systems behind convenience can reshape grief, prices, privacy, work, and trust without clear consent. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down a disturbing wave of AI and surveillance stories: AI avatars of deceased loved ones, Maryland’s move against surveillance pricing, Washington’s restrictions around public access to ALPR data, Virginia’s precise geolocation data ban, dee...
2026-04-27
34 min
Legitimate Cybersecurity Podcasts
Can AI Agents Actually Hack Systems?
A new AI is being framed as a tool that can find zero-days fast and even “hack its way out” of containment. If that claim is real, defenders, developers, and everyday users are about to feel the consequences. On this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer are joined by Jason Casey, CEO of Beyond Identity, to break down the panic around Anthropic’s “Mythos” discussion, what AI can actually do for offense and defense, and where the marketing may be outrunning the real-world risk.
2026-04-18
45 min
Legitimate Cybersecurity Podcasts
Why Is LinkedIn Spying on Your Browser?
A new lawsuit alleges LinkedIn may have been collecting data from inside users’ browsers in ways most people never expected. If that is true, this is not just normal tracking. It is a much more invasive look into how websites can profile you behind the scenes. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer break down the class-action allegations against LinkedIn, explain browser extension detection in plain English, and talk about why so many people are fed up with paying for platforms that still treat their identity li...
2026-04-10
28 min
Legitimate Cybersecurity Podcasts
What’s Inside the White House App?
You expect a government app to inform you. You probably do not expect tracking capability, mystery dependencies, and sloppy security decisions. This episode breaks down why the White House app is a warning sign for anyone who installs “official” software without asking what it can really do. Frank Downs and Dustin Brewer dig into the White House app as a real-world case study in mobile privacy, dormant GPS functionality, third-party code dependencies, digital supply-chain risk, and the uncomfortable question of who is actually accountable when insecure software gets released.
2026-04-04
38 min
Legitimate Cybersecurity Podcasts
AI Is Already in Your Tools. No One Wrote the Rules
AI is being forced into the tools you use every day before most companies have written real rules. That matters because one careless prompt can become a privacy, compliance, or job-risk problem fast. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Walter Haydock to break down what happens when AI shows up in Word, email, HR systems, search, and business workflows before organizations are actually ready for it. They unpack where companies get AI adoption wrong, why “ju...
2026-04-01
45 min
Legitimate Cybersecurity Podcasts
AI Is Replacing Tech Jobs With Insecure Code
AI is starting to replace parts of white-collar work faster than most people realize. The bigger problem is that it may also flood the market with insecure code, weaker judgment, and fewer real entry-level paths. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dr. Dustin Brewer break down Anthropic’s latest report on the jobs most exposed to AI and explain what the headlines are getting wrong. They dig into the difference between AI exposure and actual job loss, why the data ma...
2026-03-20
44 min
Legitimate Cybersecurity Podcasts
Your TV Is Recording What You Watch
Your smart TV may be taking snapshots of what you watch, even when you think you bypassed the built-in apps. That data can be used to identify shows, measure advertisements, and help build a profile of behavior inside your home. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dr. Dustin Brewer explain how Automatic Content Recognition (ACR) works, why HDMI devices like Apple TV or gaming consoles may not stop it, and how companies correlate TV viewing with other data sources.
2026-03-13
30 min
Legitimate Cybersecurity Podcasts
After the Breach, the Legal Crisis Begins
A cyber incident is not just a technical problem. The legal response can shape what happens next, what gets disclosed, and how much worse the damage becomes. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Kate Hanniford, cybersecurity and data privacy partner at Alston & Bird, to unpack the part of cyber incidents most people overlook: the legal side. Kate explains what really happens when the phone rings after a breach, how executives think under pressure, where regulators draw the line...
2026-03-07
45 min
Legitimate Cybersecurity Podcasts
The FBI Isn’t Your Cyber Defense Anymore (It’s Privatized Now)
America’s cyber “first responder” isn’t the FBI anymore—it’s private companies. That shift changes what gets prioritized during a breach: mission vs. margin, attribution vs. recovery, and who gets help first. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Milan Patel (Global Head of MDR at BlueVoyant, former FBI) to unpack what breaks when cyber defense gets outsourced—because it already has. Milan shares how the FBI actually works in real incidents, why private-sector response dominates, and the recurring failures that keep brea...
2026-03-03
50 min
Legitimate Cybersecurity Podcasts
AI Is Rewriting Compliance (GRC)
Compliance isn’t “paperwork”—it’s the last line between your customers and the next Equifax-level mess. But GRC teams are stuck chasing screenshots and questionnaires instead of reducing real risk—and AI is about to change that. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Richa Kaul, CEO & Founder of Compliance (an AI-native enterprise GRC platform), right after her company’s $20M raise led by Google Ventures. We dig into: Why GRC gets h...
2026-02-23
36 min
Legitimate Cybersecurity Podcasts
Your Doorbell Camera Is Quietly Building a Surveillance Database
You bought a security camera… but what you actually bought was a cloud evidence locker. And when you hit “delete,” it might only mean you lose access—not that the footage is gone. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer break down what Ring, Google/Nest, Wyze, and other camera ecosystems really are: subscription workflows that convert your home life into searchable records—sometimes shared by default, sometimes accessible through legal requests, and often retained longer than you think. What you’l...
2026-02-19
42 min
Legitimate Cybersecurity Podcasts
AI Agents Are Malware Now (And We’re Installing Them)
AI agents aren’t just “tools” anymore — they’re getting delegated access, running workflows, calling APIs, and making decisions inside your environment. That’s why some security folks are starting to call them malware… with permission. In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Jasson Casey (CEO & Co-Founder of Beyond Identity) to break down what actually breaks in identity and access when software can reason, plan, and take real actions. We cover why prompt injection is fundamentally “control + data mixing,” why agent toolchains resemble living-off-the-land techniques, and why visibility...
2026-02-15
37 min
Legitimate Cybersecurity Podcasts
This Surveillance Network Is Spreading Quietly—And You Can’t Opt Out
You can be tracked in the real world—without consent—just by driving down a public road. And the scariest part isn’t “live tracking”… it’s rewind: searchable history after the fact. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer break down Automated License Plate Readers (ALPRs)—why they’re popping up everywhere, why they’re easy to miss, and why the data is more dangerous than the camera. You’ll learn: What ALPR cameras ca...
2026-02-11
34 min
Legitimate Cybersecurity Podcasts
Your AI Agents Need Logins (Or They’ll Burn Your Company Down)
AI is pushing security into a new failure mode: tools that don’t just talk… they act. If you don’t treat AI agents like identities—with guardrails + telemetry—you’re building silent insiders. In this episode of Legitimate Cybersecurity, Frank and Dustin sit down with Ben Wilcox (CTO + CISO at ProArch) to get practical about what’s quietly breaking as companies rush into AI. What you’ll learn: The real conflict (and advantage) of being both CTO and CISO
2026-02-09
42 min
Legitimate Cybersecurity Podcasts
Stop Saying You Have Nothing to Hide! It’s Costing You Money!
The "I have nothing to hide" argument is dead. It’s not about secrecy anymore—it’s about your wallet. Most people assume data collection is just for "better ads." They’re wrong. In this episode, Frank and Dustin break down how data brokers, insurance companies, and retailers are building a "digital twin" of you to manipulate dynamic pricing and assess your risk profile. From your car reporting your driving habits to insurance providers, to "The Retail Equation" banning you from stores for returning items, the surveillance economy is actively costing you money. ...
2026-02-02
48 min
Legitimate Cybersecurity Podcasts
The TikTok ”Sale” is a Lie: Why the Algorithm remains the Threat
Everyone thinks the TikTok problem is solved because "US Data stays in the US." That is a dangerous misunderstanding of how the technology works. In this episode, Frank and Dustin break down the 80-page filing of the new TikTok joint venture. We analyze the ownership structure (Oracle, Silver Lake, and ByteDance) and explain why the "divestiture" is actually a loophole. The reality? Your data might live on Oracle servers, but the algorithm—the weaponized model that influences behavior—is still controlled by ByteDance. What we cover:
2026-01-23
43 min
Legitimate Cybersecurity Podcasts
The Tools Cyber Pros Use To Monitor You!
Your work laptop isn’t yours — and one legal issue inside your company can put your logins, browsing, and messages under review. We break down the real tools cyber pros use to “see” what’s happening on networks — and what that visibility means for your privacy. In this episode, we unpack: Why Wireshark is the “truth serum” of the internet How SOC tools (like Snort) catch real behavior on real networks Why using personal a...
2026-01-19
55 min
Legitimate Cybersecurity Podcasts
AI is Hacking Your Brain! The Truth about Digital Affairs!
AI can sound empathetic, supportive, even “therapeutic”—but it can’t be accountable. That gap matters most when someone is isolated, vulnerable, or in crisis. In this episode, Frank Downs and Dustin Brewer sit down with Dr. Onna Brewer (licensed psychologist) to unpack why people are forming real attachments to AI—friendship, intimacy, and “therapy”—and where the danger line is when general-purpose chatbots become a substitute for human care. What you’ll learn: Why AI relationships meet real needs (and wh...
2026-01-10
51 min
Legitimate Cybersecurity Podcasts
AI Is Rebuilding the Dead — With Your Data
Your body dies — but your accounts don’t. And now AI can be trained on the dead. So who “owns” your digital afterlife… and who gets to use it? In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer unpack the real risk behind “legacy accounts,” AI memorial bots, and digital grief tools: consent, identity control, and what happens when someone can simulate you without you. We cover the ethics of training on deceased users, the slippery slope from grief-support to manufactured relationships, and why regulation vs. private co...
2025-12-28
37 min
Legitimate Cybersecurity Podcasts
5 Holiday Scams That Drain Your Money Fast (Gift Cards, Texts, QR)
Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now. In December, attackers don’t need skill. They need distracted people. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down the five highest-volume holiday scams hitting normal, smart people—gift cards, shipping texts, QR codes, travel Wi-Fi, and even AI voice cloning. You’ll learn: How gift cards are drained before act...
2025-12-19
45 min
Legitimate Cybersecurity Podcasts
Your Phone, Your Car, Your Movies—You Don’t Actually Own ANY of It #cybersecurity
Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke your access, or simply shut down the servers your devices rely on. And now with AI moderation quietly deleting accounts behind the scenes… who’s really in control? In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer explore: How Apple, Google, Tesla, and John Deere can remotely brick your devices Why your “purchased” movies on Vudu/Fanda...
2025-12-12
44 min
Legitimate Cybersecurity Podcasts
Why Security Tools Are Designed To Fail (VP Revelations) #cybersecurity
The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts trying to use them. In this episode, Jennifer Von Kainold (VP of Product Management at BlueVoyant) reveals the dirty secret of security engineering: the tools are built for the builders, not the defenders. Jen breaks down the "Sleep Paralysis" of modern SOCs, why the industry refuses to simplify, and how she went from a Chemistry degree to leading product strategy for a major MDR firm.
2025-12-05
46 min
Legitimate Cybersecurity Podcasts
The Drone Privacy Crisis: What No One Is Telling You. #cybersecurity
Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customers’ houses to jack up premiums. And here’s the terrifying part: nobody knows who owns them, and the laws protecting you are a mess. In this episode of Legitimate Cybersecurity, Frank, Dustin, and Chris Adkins break down: • The explosion of drone trespassing across the U.S. • Drone “etiquette” (if such a thing exists) • Why shooting down a drone might be illegal… but hijacking its open Wi-Fi might not...
2025-11-28
30 min
Legitimate Cybersecurity Podcasts
SIM Swapping Is Back — And They Can Steal Your Phone Without Touching It #cybersecurity
SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how modern thieves hijack your SIM, clone your phone, intercept your MFA codes, and drain your accounts… all without ever touching your device. We cover: • Why your phone number is the master key to your digital life • How eSIMs changed the threat landscape • Real-world stories of Gmail & crypto takeovers • Why teens AND the elderly are getting hit hard • Why...
2025-11-21
44 min
Legitimate Cybersecurity Podcasts
AI vs Religion: The Vatican Breaks Its Silence — And It’s Terrifying #cybersecurity
The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin dive deep into the rising spiritual panic around artificial intelligence: AI as a therapist, AI as a partner, AI as a spiritual advisor… and the truly wild question: Should an AI ever be baptized? In this episode of Legitimate Cybersecurity, we explore why major religious leaders are suddenly speaking out, whether AI could cause a crisis of faith, what it means for humanity’s spiritual future, and whether we’re...
2025-11-16
42 min
Legitimate Cybersecurity Podcasts
Leonardo da Vinci Had Better Wi-Fi: The $100M Louvre Heist #cybersecurity
What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”? 💎 $100 million in jewels disappear, and the world’s best art collection learns what Defense in Dumb really means. In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer unpack how the Louvre Museum was robbed in broad daylight — not just by thieves, but by bad passwords, unpatched servers, and leadership that never took cybersecurity seriously. 👉 Topics include: The Windows Se...
2025-11-10
37 min
Legitimate Cybersecurity Podcasts
Haunted Networks: Possessed Printers, Phantom Texts, and the OG Computer ‘Bug’ #cybersecurity
Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”: • The Ghost in the Printer—Why old JetDirects spit hieroglyphics at night. • Laughing Alexa—The infamous 2018 bug that creeped out the world. • #GhostText—When delayed SMS messages arrived from the… beyond. • Grace Hopper’s Moth—The first literal computer “bug,” preserved in a logbook. We translate spooky glitches into plain-English cyber hygiene: broadcast storms, wake-on-LAN, noisy IoT, always-listening assistants, SMS spoofing, and why physical world failures (heat, humidity, insects!) still c...
2025-10-31
40 min
Legitimate Cybersecurity Podcasts
AI Is Quietly Killing Entry-Level Jobs (And No One Wants To Admit It)
Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a subtle shift with massive consequences for cybersecurity, tech, and the middle class. Frank Downs and Dr. Dustin Brewer break down what’s really happening: the automation sugar high, the hollowing of mid-tier careers, why experience over degree over certifications is driving gatekeeping, and how this ends if we don’t course-correct. Learn more about the study here: https://www.economist.com/graphic-detail/2025/10/13/can-ai-replace-junior-workers?giftId=c059cef1-fdf2-4e22-80f7-e8f...
2025-10-28
31 min
Legitimate Cybersecurity Podcasts
The Day the Cloud Died: How One Outage Broke Everything
What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and enterprise apps face-plant? Frank & Dr. Dustin break down Monday’s AWS DNS outage, why the internet’s “old bones” (DNS/IPv4) still run everything, how dependency hell spreads a local failure worldwide, and whether Web3/IPv6/real decentralization can stop the next domino run. 👂 Audio listeners: subscribe on any podcast platform via our feed: https://legitimatecybersecurity.podbean.com/ 🎤 Media & interview requests: admin@legitimatecybersecurity.com ...
2025-10-22
27 min
Legitimate Cybersecurity Podcasts
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) that can hijack AI integrations like email and office suites, quietly exfiltrate your prompts and IP, and even leak them to attacker infrastructure—no clicks required. We also talk about why your chats aren’t protected by legal privilege, how AI activity factored into the California wildfire arsonist story, and what actually works: DLP, model governance, and when you should go local with LLMs. We keep it real (and a little nihilist...
2025-10-17
37 min
Legitimate Cybersecurity Podcasts
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior talent without gatekeeping, and where AI actually helps (and where it absolutely doesn’t). 🎧 Audio listeners can subscribe on any platform (Spotify, Apple, etc.) or here: https://legitimatecybersecurity.podbean.com/ 💼 Media & interview requ...
2025-10-11
39 min
Legitimate Cybersecurity Podcasts
Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)
What if your “credit score” wasn’t the full story? Frank and Dr. Dustin uncover LexisNexis, the massive data broker quietly collecting everything about you — from your social posts and insurance claims to your driving habits (even roller coasters count). 💥 In this episode: The hidden company that knows more about you than Equifax or Experian Why you can’t easily see, freeze, or delete your LexisNexis file The outrageous “roller coaster incident” that broke a man’...
2025-10-06
32 min
Legitimate Cybersecurity Podcasts
Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”
Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controversial cybersecurity questions—no fluff, real talk. In this episode, Frank Downs and (now) Dr. Dustin break down: How to brief a non-technical board so they actually fund security (tie risk to $$, ops impact, and avoid doom-mongering). What should already be automated (network topology & asset management… why isn’t this solved yet?). Should you...
2025-09-29
45 min
Legitimate Cybersecurity Podcasts
From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity
Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer open up about their real beginnings—from accidental entry into US Intelligence after 9/11, to packet-hunting puzzles, Wi-Fi tinkering, and Linux dependency hell, to Dustin’s Coast Guard days that led him into DoD cyber operations and battlefield coding. What you’ll hear: Frank’s unexpected pivot from English m...
2025-09-22
41 min
Legitimate Cybersecurity Podcasts
Secret Algorithms Controlling You! Are You the User… or the Product?
Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news, drives, purchases, health, and even relationships. From TikTok fear-mongering to Cambridge Analytica, OPM’s breach fallout, Google Maps routing incentives, Amazon “sponsored” defaults, and Facebook’s engagement shift—this episode asks the hard question: are you in control, or are you being steered? We also hit the nuance: when AI spots tumors earlier and flags outbreaks faster, do the ends justify the data means? Echo chambers, algorithm “poisoning,” privacy laws (or lack thereof in th...
2025-09-12
33 min
Legitimate Cybersecurity Podcasts
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—and eventually advising top companies through breaches and building cyber programs. We cover: How non-traditional paths (like the Navy) can launch cyber careers ...
2025-09-05
48 min
Legitimate Cybersecurity Podcasts
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpack dark web takedowns, real DFIR process, and how a “range” of skills (law, tech, stand-up, curiosity) compounds into cyber success. We cover: How a team helped take down the dark web—twice DFIR reality vs myth: scoping, persistence hunts, EDR triage, due diligence in M&A The RDP ≈ drunk driving analogy you’ll never forget...
2025-08-25
1h 01
Legitimate Cybersecurity Podcasts
ChatGPT-5: Smarter Hackers, Dumber Defenders?
ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and the future of cybersecurity. 👉 Is ChatGPT-5 truly artificial intelligence, or just machine learning with a better paint job? 👉 Can AI pass cybersecurity exams like the CISSP? 👉 Will AI babysit your kids one day — and...
2025-08-18
41 min
Legitimate Cybersecurity Podcasts
From Recon to Wrecked: The Cyber Kill Chain Breakdown (With Laughs)
What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cyber Kill Chain — Lockheed Martin’s 7-stage framework for understanding and stopping attacks — and compare it to the MITRE ATT&CK framework, hacker methodology, and even… honeypots, magicians, and Christopher Nolan films. We cover: The 7 stages: Recon, Weaponization, Delivery, Exploitation, Installation, C2, and Actions on Objectives Why insurance companies make cyber defense harder
2025-08-13
40 min
Legitimate Cybersecurity Podcasts
Quantum Day is Coming: Will Quantum Computing Break Cybersecurity?
Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and Dustin break down Q-Day, the moment when quantum computers may render current cryptography useless. We explore how close we really are, the science (and hype) behind quantum technology, and what CISOs should be doing NOW to prepare. Along the way, expect tangents about Star Trek, Ant-Man, AI, and a few moments that’ll make you laugh out loud. 🎙️ Got a topic or guest suggestion? Email us at: admin@legitimatecybersecurity.com
2025-08-04
36 min
Legitimate Cybersecurity Podcasts
Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots
Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the creepy rise of biohacking and RFID implants, and find out what happens when Roombas spy on you in the bathroom. We also break down why IoT devices are so vulnerable, the challenges with...
2025-07-24
32 min
Legitimate Cybersecurity Podcasts
We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry
Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it. We explore: Strategic cyber risk (not just IT vulnerabilities) Mapping 50,000+ exposed devices across U.S. counties The "operational art" of cyber warfare ...
2025-07-18
53 min
Legitimate Cybersecurity Podcasts
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoning and post-truth dangers 🛡️ AI in cybersecurity: helper or hazard? 🎭 Aquaman scams grandma?! ...
2025-07-14
35 min
Legitimate Cybersecurity Podcasts
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, and GPEN really mean ✅ Why most companies have no idea what’s on their network ✅ Real pen test experiences gone sideways ✅ Why you might st...
2025-07-10
41 min
Legitimate Cybersecurity Podcasts
AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You
Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting and blue team burnout, we demystify the buzzwords, talk real-world applications, and get a little weird with some philosophical takes. And yes, Clippy makes a comeback. 🧠 Topic...
2025-06-28
57 min
Legitimate Cybersecurity Podcasts
Quiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World Security
In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype: what’s real, what’s marketing How tribalism creeps into tech debates—and how to resist it ...
2025-06-24
47 min
Legitimate Cybersecurity Podcasts
He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach
What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, tracking cybercriminals through the rise of Tor and Bitcoin, and launching the FBI’s first data wiretap. Today, he serves as Global Head of Professional Services at BlueVoyant, advising Fortune 500 companies on how to stay ahead of...
2025-06-24
52 min
Legitimate Cybersecurity Podcasts
Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)
🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NIST CSF and ISO 27001 matter How corporate culture can make or break your cybersecurity And… how Frank may have cursed...
2025-06-17
47 min
Legitimate Cybersecurity Podcasts
Cyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital Resilience
In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-world examples of companies affected by cyber incidents and emphasize the need for proactive measures and continuous education in the field of cybersecurity. Takeaways Cybersecurity is a continuous concern that businesses must address. Recent ransomware attacks have...
2025-05-21
45 min
Legitimate Cybersecurity Podcasts
Cybersecurity, Dishwashers, and AI Threats: Welcome Back!
After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They explore: The cultural and business reasons patching never gets prioritized How vulnerability management became the garbage collection of cyber Why budget...
2025-05-13
47 min