Compromising Positions - A Technology Podcast
BookmarkCompromising Positions
Compromising Positions - A Technology Podcast is a technology podcast hosted by Compromising Positions. It has 60 episodes, with the latest published March 2026.
The award-winning tech podcast that asks : "Are we the ones breaking the world?"Most tech podcasts are an echo chamber for builders. We step outside. We talk to the observers, the social scientists, and the deep thinkers who study the friction we create and the human systems we disrupt.Lianne Potter and Jeff Watkins strip away the industry fluff and pit academic research against the harsh reality of real organisations and real human incentives.We don’t just talk about AI, security, and automation; we explore the unintended consequences of our own "elegant" solutions.We’re here to look at tech through a different lens and ask the uncomfortable questions that the industry usually avoids. Because if you’ve built a system that has become everyone else's problem, you have to ask:"Am I the compromising position here?"
technology ·en ·60 episodes
EPISODE 58: Self-Driving Cars, Cybersecurity & Trust
EPISODE 57: SUSPICION BY DESIGN: INSIDE DWP’S UNIVERSAL CREDIT AI FRAUD SYSTEM
EPISODE 56: From Dark Triads to Patriotic Hackers: Human Maliciousness in Cybersecurity
EPISODE 55: Hack the Movies! The Best and WorsT Hacker Movies Part 2!
EPISODE 54: CFO Secrets: How to Secure Your Cybersecurity Budget
EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?
EPISODE 52: People Don’t Follow Companies, They Follow People: How To Build Your Personal Brand On LinkedIN
EPISODE 51: Cha, Cha, Cha, Changes! How to get excited about organisational change (re-release)
EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!
EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity
EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags
EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI
EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development
EPISODE 45: Can Cybersecurity Teams Actually Do Scrum?
EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error
EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity!
EPISODE 42: Mind Science - Cyber Psychology 101
EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast
EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show
EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance
EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED!
EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It!
EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?
EPISODE 35: Can Cybersecurity Teams Flex Their Creativity To Keep Us All Safe?
EPISODE 34: IS YOUR RISK MANAGEMENT TOAST?
EPISODE 33: Inconvenient Truths: Why Technology Won’t Create The Perfect Customer Experience In Cybersecurity
EPISODE 32: Cybersecurity and The Human Experience: Designing for humans, not robots with John Sills
EPISODE 31: Can Cybersecurity Overcome its PR Problem? Building Your Brand and Social Capital with Sarah Evans, PR and Marketing Specialist
EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES
EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY
EPISODE 28: RULES WITHOUT RELATIONSHIPS CREATE REBELLION: WHY ETHICS MATTER IN CYBERSECURITY
EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems
EPISODE 26: It’s A Wonderful Hack! Building A High Performance Security Team
EPISODE 25: SUPERCONNECTORS: UNLEASHING PURPOSE BEYOND METRICS IN YOUR CYBERSECURITY FUNCTION
EPISODE 24: DATA, DATA EVERYWHERE, BUT HOW DO WE MAKE IT SAFE TO SHARE? EXPLORING THE RELATIONSHIP BETWEEN DATA, CYBERSECURITY AND OUR DESIRE FOR CONVENIENCE
EPISODE 23: Awareness ≠ Behavioural Change - Rethinking Cybersecurity Training
EPISODE 22: Hands Off My Amygdala! The Psychology Behind Cybersecurity
EPISODE 21: Bringing The Curtain Down On Risk Theatre And Applauding Objective-Centred Risk Management
EPISODE 20: Not New, But Novel - Tackling Risk In The Third Sector
EPISODE 19: Fun With Purpose: A Scrum Guide!
EPISODE 18: And The BAFTA For Best Cybersecurity Awareness Training Goes To…
EPISODE 17: F.U.D Off! Cybersecurity Awareness Beyond Compliance and Boredom
EPISODE 16: That’s illuminating! Protecting aberdeen’s iot street lights from cyber attacks!
EPISODE 15: SHIFT HAPPENS: The ART OF NAVIGATING THE SEAS OF CYBER CHANGE
EPISODE 14: HACK THE NEURAL NETWORK - AI and CYBERSECURITY
BACK SOON
EPISODE 13: 5 HOT TAKES ON AI
EPISODE 12: How to Use ChatGPT and AI to Level UP Your Cybersecurity function
EPISODE 11: Are You User Experienced? Applying The Principles of UX & UR To The Cybersecurity Journey
EPISODE 10: It’s Not about the Cookie : THE POWER OF FRAMING INTERACTIONS
Loading reviews...
Loading similar podcasts...