Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
LegitimateCybersecurity Podcasts

1
ChatGPT-5: Smarter Hackers, Dumber Defenders?
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break down the hype vs. reality. From coding disasters that “look pretty but don’t work,” to AI being more like “that coworker who makes everything harder,” we explore what this means for hackers, defenders, and t…
…
continue reading

1
From Recon to Wrecked: The Cyber Kill Chain Breakdown (With Laughs)
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cyber Kill Chain — Lockheed Martin’s 7-stage framework for understanding and stopping attacks — and compare it to the MITRE ATT&CK framework, hacker methodology, and even… honeypots, magicians, and Chris…
…
continue reading

1
Quantum Day is Coming: Will Quantum Computing Break Cybersecurity?
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and Dustin break down Q-Day, the moment when quantum computers may render current cryptography useless. We explore how close we really are, the science (and hype) behind quantum technology, and what CISOs sho…
…
continue reading

1
Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the c…
…
continue reading

1
We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry
53:21
53:21
Play later
Play later
Lists
Like
Liked
53:21Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it. We ex…
…
continue reading

1
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoni…
…
continue reading

1
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
41:33
41:33
Play later
Play later
Lists
Like
Liked
41:33Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, …
…
continue reading

1
AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting an…
…
continue reading

1
Quiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World Security
47:55
47:55
Play later
Play later
Lists
Like
Liked
47:55In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype:…
…
continue reading

1
He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach
52:09
52:09
Play later
Play later
Lists
Like
Liked
52:09What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, …
…
continue reading

1
Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)
47:52
47:52
Play later
Play later
Lists
Like
Liked
47:52🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NI…
…
continue reading

1
Cyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital Resilience
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-wo…
…
continue reading

1
Cybersecurity, Dishwashers, and AI Threats: Welcome Back!
47:35
47:35
Play later
Play later
Lists
Like
Liked
47:35After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They ex…
…
continue reading