
Sign up to save your podcasts
Or


Send us a text
We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience.
• mapping careers toward emerging security domains
• zero trust for satellites and patch constraints
• harvest now decrypt later and crypto agility
• early adopters of quantum‑resistant algorithms
• futurist methods for security decision‑making
• shifting from passwords to stronger credentials
• efficiency versus resilience trade‑offs in cloud
• lessons from government redundancy models
• attack surface, attacker and defender effectiveness
• deepfakes, social engineering, and process tripwires
• practical controls like rotating passcodes and dual control
• resources and where to find Heather’s work
Pick up Heather’s books and reach out if you want
Listen on: Apple Podcasts Spotify
Support the show
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Affiliates
➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
➡️ OffGrid Coupon Code: JOE
➡️ Unplugged Phone: https://unplugged.com/
Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout
*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
By Joe South5
1313 ratings
Send us a text
We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience.
• mapping careers toward emerging security domains
• zero trust for satellites and patch constraints
• harvest now decrypt later and crypto agility
• early adopters of quantum‑resistant algorithms
• futurist methods for security decision‑making
• shifting from passwords to stronger credentials
• efficiency versus resilience trade‑offs in cloud
• lessons from government redundancy models
• attack surface, attacker and defender effectiveness
• deepfakes, social engineering, and process tripwires
• practical controls like rotating passcodes and dual control
• resources and where to find Heather’s work
Pick up Heather’s books and reach out if you want
Listen on: Apple Podcasts Spotify
Support the show
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Affiliates
➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
➡️ OffGrid Coupon Code: JOE
➡️ Unplugged Phone: https://unplugged.com/
Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout
*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

2,001 Listeners

652 Listeners

8,019 Listeners

136 Listeners

41 Listeners