• The Grind and Growth: A Podcaster's Journey With Jack Rhysider From Darknet Diaries
    Jan 12 2026

    Send us a text

    Ever wonder why some shows last for years while others fade before episode seven? We sit down with Jack from Darknet Diaries to unpack the systems, mindset, and storytelling choices that keep a podcast resilient without burning out the host. Instead of chasing viral spikes, Jack lays out a playbook for steady growth: batch recording, rest cycles, and that deceptively powerful one percent month-over-month target. It’s practical, humane, and it works.

    We dig into his editorial compass with three distinct tracks: personal obsessions, proven crowd favorites, and bold forays into new communities like crypto and gaming. Jack explains why listeners often prefer penetration test stories over higher-stakes CIA operations, and what it takes to earn trust from niche audiences by learning their culture first. The curtain pulls back on hard-to-book guests, silent PR walls, and the rare times a source vanishes after recording—plus the elusive thrill of chasing “ghost” hackers who should never speak on record.

    From there, the conversation turns to craft. Jack’s background as a network security engineer sharpened his ability to explain complex topics simply. He shares how layered explanations let beginners and veterans both feel seen, why command line beats screenshot soup, and how relentless revision turns knowledge into clarity. We also tackle AI and cybersecurity with nuance: not as job eraser, but capability amplifier. Think better triage, secure-by-default coding, and an arms race where defenders and attackers wield similar tools—and the edge comes from better questions and stronger priorities.

    Beyond the studio, Jack talks health, music, language learning, and swing dance, and how a wetware mindset—designing stories to trigger empathy and memory—guides every episode. If you care about making work that lasts, telling stories that land, and adopting AI without losing the plot, this conversation is a masterclass in sustainable creativity and modern security. Subscribe, share with a friend who needs a morale boost, and leave a review with the one tactic you’ll try next.


    Darknet Diaries: https://www.youtube.com/jackrhysider


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    49 mins
  • Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security
    Jan 5 2026

    Send us a text

    In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security controls. Tune in to learn about the future of cybersecurity and how companies can better prepare for the next wave of digital threats.

    00:00 Introduction to Security Challenges
    04:08 AI-Powered Social Engineering Threats
    09:45 The Opaque Nature of Cybersecurity Incidents
    14:08 Deep Fakes and Their Evolution
    18:48 Hiring Risks in the Age of Deep Fakes
    23:00 The Future of Cyber Threats and Anarchy
    28:04 The Arms Race: AI Detection vs. Deepfakes
    32:49 Preparing for the Future: Awareness and Training
    39:26 The Evolving Threat Landscape: Beyond Traditional Security

    https://www.adaptivesecurity.com/

    https://www.linkedin.com/in/brianclong/

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    44 mins
  • Master The Fundamentals, Then Change The System
    Dec 15 2025

    Send us a text

    We trace a journey from a teenage online threat to security engineering at global scale, exploring how deep fundamentals and distributed thinking shape reliable defenses. Along the way, we unpack certifications, teaching at scale, and building a practical path for learners worldwide.

    • curiosity-driven path from fear to purpose
    • foundations before security: systems then networks
    • depth of concepts vs surface knowledge
    • thinking at scale with distributed systems
    • threat modeling as a constant that endures
    • learning the why behind legacy architectures
    • community building through a book and courses
    • coding confidence for security practitioners
    • practical framework for choosing certifications
    • direction over collecting badges
    • reflecting on progress and resetting goals
    • links to connect and learn more

    Use the code security50 to get 50% off the upcoming cybersecurity bootcamp at learn.thecyberinstructor.com


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    57 mins
  • Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
    Dec 8 2025

    Send us a text

    We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’ digital lifelines.

    • launching a policy career by building expert networks
    • founding the DEF CON Voting Village and publishing policy insights
    • managing imposter syndrome with trusted advisors and study
    • shifting from shields up to active defense in cyber
    • why Stuxnet’s visibility served a political goal
    • using law enforcement cyber tactics beyond ransomware
    • how fentanyl economics and pill presses scaled harm
    • China’s precursor role and Sinaloa’s market pivot
    • Coast Guard and HSI authorities for upstream disruption
    • making fentanyl unprofitable through targeted cyber pressure

    Find Jake on LinkedIn: Jake Bronn
    Book: Fentanyl, The Mass Poisoning Of America And The Cartel Behind It


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    1 hr and 14 mins
  • Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
    Dec 1 2025

    Send us a text

    In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how BonFi AI is innovating in data security. Tune in to learn about the importance of context in data protection and the future of cybersecurity in a rapidly changing digital world.

    00:00:19 Introduction to Vishnu's Journey
    00:00:30 Entering the US and Cisco
    00:02:18 Cloud Security and AI
    00:02:48 Data Governance and Challenges
    00:08:47 The Expansiveness of Cloud
    00:11:00 AI's Appetite for Data
    00:12:11 Data Security in the JNI Era
    00:14:29 The Importance of Context
    00:16:13 Data Used by Enterprises
    00:22:24 Conclusion and Future Trends

    https://www.bonfy.ai/

    Bonfy.ai
    Bonfy ACS is a next-gen DLP platform built for the AI era.

    Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    54 mins
  • From Sewers To Subsea: Rethinking Data Centers And Defense
    Nov 24 2025

    Send us a text

    We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes.

    • junk folders, platform fatigue, and curated personas
    • kids chasing influence and the low barrier to entry
    • leaving school early, offshore work, and non-linear careers
    • social engineering as ordinary behavior with intent
    • red team vs blue team dynamics and trust
    • the sewer break-in that birthed an idea
    • how subsea data centers plug into power and fiber
    • threat models at sea and nation-state realities
    • latency wins for gaming, streaming, fintech, telehealth
    • AI hype, thin moats, and the need for stack control

    Find Maxi: most active on LinkedIn; launching an AI security blog and weekly newsletter at maxirynolds.com


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    53 mins
  • Inside The Global Push For Offensive Cyber And Smarter Defense
    Nov 17 2025

    Send us a text

    We trace how cyber policy tries to catch up with fast-moving threats, from decades-old laws to a new push for offensive capabilities. Along the way, we unpack what real resilience looks like for SMEs, critical infrastructure, and the talent pipeline that holds it all together.

    • Verona’s route from public policy to cybersecurity
    • Why slow law and fast threats collide
    • Updating the Computer Misuse Act and research protections
    • Offensive cyber, deterrence, and ethical guardrails
    • Zero days, decision latency, and operational windows
    • SMEs and supply chains as systemic risk
    • Secure by design and secure by default at scale
    • State cyber reserves and public–private secondments
    • Talent gaps, pay gaps, and global accreditation
    • EU and UK moves to standardize skills and tighten rules
    • Government roles in funding, convening, and capability building

    Find Verona on LinkedIn: Verona Johnstone Hulse. Read NCC Group’s Global Cyber Policy Radar on the NCC Group website or via Verona’s LinkedIn posts


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    46 mins
  • The FUTURE of Device Authentication is Here NOW
    Nov 10 2025

    Send us a text

    We explore why most breaches are identity failures and how to flip the model with hardware-backed, device-bound credentials that never move. Jason shares global threat trends, startup lessons, and a blueprint for preventing credential theft across people, agents, and machines.

    • life on the road, burnout signals and recovery
    • global threats to critical infrastructure and state actor pressure
    • startup culture, expectations and keeping teams healthy
    • Jason’s path through engineering to entrepreneurship
    • identity’s failure modes and why credentials are stolen
    • asymmetric, hardware-bound authentication and device posture
    • extending identity to agents, drones and satellites
    • cyber-physical risk and why finance invests heavily
    • identity as the universal control plane in cloud
    • practical steps to prevent session hijack and MFA fatigue

    Connect with Jason: “Hit me up on LinkedIn… our website, beyondidentity.com… even X”


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Show More Show Less
    45 mins