Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
A new lawsuit alleges LinkedIn may have been collecting data from inside users’ browsers in ways most people never expected.
If that is true, this is not just normal tracking. It is a much more invasive look into how websites can profile you behind the scenes.
In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer break down the class-action allegations against LinkedIn, explain browser extension detection i...
You expect a government app to inform you. You probably do not expect tracking capability, mystery dependencies, and sloppy security decisions.
This episode breaks down why the White House app is a warning sign for anyone who installs “official” software without asking what it can really do.
Frank Downs and Dustin Brewer dig into the White House app as a real-world case study in mobile privacy, dormant GPS functionality, third-...
AI is being forced into the tools you use every day before most companies have written real rules.
That matters because one careless prompt can become a privacy, compliance, or job-risk problem fast.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Walter Haydock to break down what happens when AI shows up in Word, email, HR systems, search, and business workflows before organizatio...
AI is starting to replace parts of white-collar work faster than most people realize.
The bigger problem is that it may also flood the market with insecure code, weaker judgment, and fewer real entry-level paths.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dr. Dustin Brewer break down Anthropic’s latest report on the jobs most exposed to AI and explain what the headlines are getting wrong.
They dig int...
Your smart TV may be taking snapshots of what you watch, even when you think you bypassed the built-in apps.
That data can be used to identify shows, measure advertisements, and help build a profile of behavior inside your home.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dr. Dustin Brewer explain how Automatic Content Recognition (ACR) works, why HDMI devices like Apple TV or gaming consoles may not st...
A cyber incident is not just a technical problem. The legal response can shape what happens next, what gets disclosed, and how much worse the damage becomes.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Kate Hanniford, cybersecurity and data privacy partner at Alston & Bird, to unpack the part of cyber incidents most people overlook: the legal side.
Kate explains what real...
America’s cyber “first responder” isn’t the FBI anymore—it’s private companies.
That shift changes what gets prioritized during a breach: mission vs. margin, attribution vs. recovery, and who gets help first.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Milan Patel (Global Head of MDR at BlueVoyant, former FBI) to unpack what breaks when cyber defense gets outsourced—because it ...
Compliance isn’t “paperwork”—it’s the last line between your customers and the next Equifax-level mess.
But GRC teams are stuck chasing screenshots and questionnaires instead of reducing real risk—and AI is about to change that.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Richa Kaul, CEO & Founder of Compliance (an AI-native enterprise GRC platform), right after her company...
You bought a security camera… but what you actually bought was a cloud evidence locker.
And when you hit “delete,” it might only mean you lose access—not that the footage is gone.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer break down what Ring, Google/Nest, Wyze, and other camera ecosystems really are: subscription workflows that convert your home life into searchable records—sometimes shar...
AI agents aren’t just “tools” anymore — they’re getting delegated access, running workflows, calling APIs, and making decisions inside your environment. That’s why some security folks are starting to call them malware… with permission.
In this episode of Legitimate Cybersecurity, hosts Frank Downs and Dustin Brewer sit down with Jasson Casey (CEO & Co-Founder of Beyond Identity) to break down what actually breaks in identity...
You can be tracked in the real world—without consent—just by driving down a public road.
And the scariest part isn’t “live tracking”… it’s rewind: searchable history after the fact.
In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer break down Automated License Plate Readers (ALPRs)—why they’re popping up everywhere, why they’re easy to miss, and why the data is more dangerous than the camera.
You’l...
AI is pushing security into a new failure mode: tools that don’t just talk… they act.
If you don’t treat AI agents like identities—with guardrails + telemetry—you’re building silent insiders.
In this episode of Legitimate Cybersecurity, Frank and Dustin sit down with Ben Wilcox (CTO + CISO at ProArch) to get practical about what’s quietly breaking as companies rush into AI.
What you’ll learn:
The real conflict (and advant...
The "I have nothing to hide" argument is dead. It’s not about secrecy anymore—it’s about your wallet.
Most people assume data collection is just for "better ads." They’re wrong. In this episode, Frank and Dustin break down how data brokers, insurance companies, and retailers are building a "digital twin" of you to manipulate dynamic pricing and assess your risk profile. From your car reporting your driving habits to insurance pr...
Everyone thinks the TikTok problem is solved because "US Data stays in the US." That is a dangerous misunderstanding of how the technology works.
In this episode, Frank and Dustin break down the 80-page filing of the new TikTok joint venture. We analyze the ownership structure (Oracle, Silver Lake, and ByteDance) and explain why the "divestiture" is actually a loophole. The reality? Your data might live on Oracle servers, but th...
Your work laptop isn’t yours — and one legal issue inside your company can put your logins, browsing, and messages under review.
We break down the real tools cyber pros use to “see” what’s happening on networks — and what that visibility means for your privacy.
In this episode, we unpack:
Why Wireshark is the “truth serum” of the internet
How SOC tools (like Snort) catch real behavior on real networks
Why using persona...
AI can sound empathetic, supportive, even “therapeutic”—but it can’t be accountable.
That gap matters most when someone is isolated, vulnerable, or in crisis.
In this episode, Frank Downs and Dustin Brewer sit down with Dr. Onna Brewer (licensed psychologist) to unpack why people are forming real attachments to AI—friendship, intimacy, and “therapy”—and where the danger line is when general-purpose chatbots become a substitute ...
Your body dies — but your accounts don’t. And now AI can be trained on the dead.
So who “owns” your digital afterlife… and who gets to use it?
In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer unpack the real risk behind “legacy accounts,” AI memorial bots, and digital grief tools: consent, identity control, and what happens when someone can simulate you without you.
We cover the ethics of training on de...
Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now.
In December, attackers don’t need skill. They need distracted people.
In this episode of Legitimate Cybersecurity, Frank Downs and Dr. Dustin Brewer break down the five highest-volume holiday scams hitting normal, smart people—gift cards, shipping texts, QR codes, travel Wi-Fi, and even AI voice cloning.
You’ll le...
Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke your access, or simply shut down the servers your devices rely on. And now with AI moderation quietly deleting accounts behind the scenes… who’s really in control?
In this episode of Legitimate Cybersecurity, Frank and Dr. Dustin Brewer explore:
How Apple, Google, Tesla, and John...
The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts trying to use them.
In this episode, Jennifer Von Kainold (VP of Product Management at BlueVoyant) reveals the dirty secret of security engineering: the tools are built for the builders, not the defenders. Jen breaks down the "Sleep Paralysis" of modern SOCs, why the industry refu...
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by Audiochuck Media Company.
Saskia Inwood woke up one morning, knowing her life would never be the same. The night before, she learned the unimaginable – that the husband she knew in the light of day was a different person after dark. This season unpacks Saskia’s discovery of her husband’s secret life and her fight to bring him to justice. Along the way, we expose a crime that is just coming to light. This is also a story about the myth of the “perfect victim:” who gets believed, who gets doubted, and why. We follow Saskia as she works to reclaim her body, her voice, and her life. If you would like to reach out to the Betrayal Team, email us at betrayalpod@gmail.com. Follow us on Instagram @betrayalpod and @glasspodcasts. Please join our Substack for additional exclusive content, curated book recommendations, and community discussions. Sign up FREE by clicking this link Beyond Betrayal Substack. Join our community dedicated to truth, resilience, and healing. Your voice matters! Be a part of our Betrayal journey on Substack.
The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com