Coming Soon
The cybersecurity industry spent decades calling people the weakest link.
They got it backwards.
Cybersecurity · Human Layer · Independent
The cybersecurity industry spent decades calling people the weakest link. They got it backwards. This show is about where security breaks down — and where it holds.
The Show
Every major breach follows the same script.
Not a genius exploit. Not a zero-day.
It starts with a person.
Someone clicks a link. Someone reuses a password. Someone trusts a voice on the phone that sounds exactly like their boss. Because now it can.
The technology keeps getting better. The firewalls get smarter. The budgets get bigger. And the attacks still get through — because they stopped aiming at the machines a long time ago. They aim at us.
At the moment we are distracted, tired, trusting, or just never taught what to look for.
Each episode starts with a simple question: what is the perimeter today? Sometimes the answer is a phishing campaign that fooled an entire department. Sometimes a deepfake call that nearly moved six figures out of a company account. Sometimes one person who noticed something felt wrong and stopped an attack cold.
No jargon unless we explain it. No scare tactics. No sponsors. Real stories, plain language, for smart adults who just have not been given the right information yet.
Phishing
How attacks exploit trust, not technology
Social Engineering
The psychology of manipulation
Deepfakes
When the voice on the phone can be anyone
Insider Threats
Attacks that start from the inside
Why This Exists
01
The Gap
Most cybersecurity content is either deeply technical and written for people who already know, or surface-level advice that stops at "use strong passwords." Almost nothing sits in between.
02
The Stakes
Kids go online before anyone teaches them what a scam looks like. Seniors lose savings to fraud a ten-minute conversation could have prevented. Small businesses get breached and never recover.
03
The Belief
Digital safety is a right, not a product. Education is the strongest first line of defense. A person who knows what to look for is the perimeter that holds.
The Hosts
Infrastructure · Webnestify
Runs Webnestify, a managed cloud and security company serving agencies and businesses across the world. He has spent years on the infrastructure side — building servers, locking them down, cleaning up when things go sideways. He started Webnestify Education because he kept watching the same pattern: people hit by attacks that five minutes of training could have prevented.
Strategic Opposition · andredaus.com
Independent consultant based in Cologne, Germany. Over twenty-five years getting organizations to confront the questions they would rather skip. Background in banking and financial risk. Built his reputation on one thing: walking into a room and asking why everyone assumed they were safe. Applies Red Team thinking — the adversarial mindset that stress-tests assumptions before reality does.
One builds the wall.
Simon knows how attacks work, how infrastructure fails, and what the fix looks like at three in the morning.The other asks why everyone assumed it was strong enough.
André knows why people fall for things, and what it takes to make questioning feel normal instead of uncomfortable.Listen
Available wherever you get your shows.
Get in Touch
We want to hear from people who have been inside a breach, run a security team, noticed something that did not feel right, or just want to understand what they are up against. Real stories. No pitch decks.