
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Total monthly reach
Estimated from 3 chart positions in 3 markets.
By chart position
- 🇬🇧GB · Technology#1435K to 30K
- 🇨🇿CZ · Technology#3810K to 30K
- 🇬🇷GR · Technology#4410K to 30K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
13K to 45K🎙 Weekly cadence·60 episodes·Last published 1w ago - Monthly Reach
Unique listeners across all episodes (30 days)
25K to 90K🇬🇧33%🇨🇿33%🇬🇷33% - Active Followers
Loyal subscribers who consistently listen
10K to 36K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 11 epsHosts
Recent guests
Recent episodes
EPISODE 59: Chernobyl 40th Anniversary: Are Nuclear Power Plants Safe from A Cyber Attack?
Apr 30, 2026
1h 20m 53s
Compromising Positions Presents: Tech Film Noir - The Terminator (1984)
Apr 16, 2026
1h 00m 00s
EPISODE 58: Self-Driving Cars, Cybersecurity & Trust
Mar 26, 2026
50m 01s
EPISODE 57: SUSPICION BY DESIGN: INSIDE DWP’S UNIVERSAL CREDIT AI FRAUD SYSTEM
Feb 26, 2026
45m 01s
EPISODE 56: From Dark Triads to Patriotic Hackers: Human Maliciousness in Cybersecurity
Jan 29, 2026
45m 34s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 4/30/26 | ![]() EPISODE 59: Chernobyl 40th Anniversary: Are Nuclear Power Plants Safe from A Cyber Attack?✨ | nuclear powercybersecurity+4 | — | EPISODE 59 | Chernobyl | nuclear meltdowncyber attack+4 | — | 1h 20m 53s | |
| 4/16/26 | ![]() Compromising Positions Presents: Tech Film Noir - The Terminator (1984)✨ | film analysistechnology+3 | — | The Terminator | — | The TerminatorJames Cameron+4 | — | 1h 00m 00s | |
| 3/26/26 | ![]() EPISODE 58: Self-Driving Cars, Cybersecurity & Trust✨ | self-driving carscybersecurity+3 | — | Self-Driving CarsCybersecurity | — | self-driving carscybersecurity+3 | — | 50m 01s | |
| 2/26/26 | ![]() EPISODE 57: SUSPICION BY DESIGN: INSIDE DWP’S UNIVERSAL CREDIT AI FRAUD SYSTEM✨ | welfare statetechnology+3 | — | Universal CreditDWP | — | welfare statetechnology+3 | — | 45m 01s | |
| 1/29/26 | ![]() EPISODE 56: From Dark Triads to Patriotic Hackers: Human Maliciousness in Cybersecurity✨ | cybersecurityhuman behavior+4 | — | Characterising and Measuring Maliciousness for Cybersecurity Risk Assessment | — | cybersecuritymaliciousness+4 | — | 45m 34s | |
| 11/21/24 | ![]() EPISODE 55: Hack the Movies! The Best and WorsT Hacker Movies Part 2!✨ | hacker moviesfilm analysis+3 | Simon Painter | Functional Programming with C#The Beekeeper+4 | — | hacker moviesfilm discussion+4 | — | 1h 20m 05s | |
| 11/14/24 | ![]() EPISODE 54: CFO Secrets: How to Secure Your Cybersecurity Budget✨ | cybersecuritybudget negotiation+3 | Scott Robertson | CreateFuture | — | cybersecurity budgetCFO secrets+3 | — | 41m 14s | |
| 11/7/24 | ![]() EPISODE 53: Whose Responsibility Is It To Protect The Data? The Data Team Or The Cybersecurity Team?✨ | data securitydata management+3 | Tim Hatton | AND Digital | — | data protectioncybersecurity+5 | — | 43m 46s | |
| 10/31/24 | ![]() EPISODE 52: People Don’t Follow Companies, They Follow People: How To Build Your Personal Brand On LinkedIN✨ | LinkedInpersonal branding+3 | John Moore | — | — | LinkedInpersonal brand+3 | — | 49m 30s | |
| 10/23/24 | ![]() EPISODE 51: Cha, Cha, Cha, Changes! How to get excited about organisational change (re-release)✨ | organizational changechange management+3 | Paula Cizek | Nobl | — | organizational changechange management+3 | — | 43m 38s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 10/16/24 | ![]() EPISODE 50: Tips On How To Be A Top-Class Cybersecurity Student And Get Your First Cybersecurity Job!✨ | cybersecuritycareer advice+3 | Dr. Thalita Vergilio | Create Future | — | cybersecuritycareer+5 | — | 42m 24s | |
| 10/9/24 | ![]() EPISODE 49: Are Our Cybersecurity Controls Inclusive? Going Beyond Hiring When It Comes To Diversity In Cybersecurity | This episode we are joined by Marcy Charollois. Marcy is a social tech writer, content strategist, and the founder of Merci Marcy and The Safe Place. Her mission is to enable teams to embody a culture of genuine inclusion beyond superficial measures. This week we explore the complex, important, and under-discussed topic of diversity, equity and inclusion in cybersecurity. As an industry, we do an alright job talking about hiring diversity in cyber, but that is not where the topic should end. With more and more people from a wide range of backgrounds and abilities interacting with our security controls, we need to think about whether the security measures we put in place are accessible. We explore how can make a more accessible cybersecurity user journey, design inclusive password patterns, how to be an ally in this space and make sure that we always act ethically when we think about security. This episode is a must-listen for anyone interested in creating a more equitable and effective cybersecurity landscape. | — | ||||||
| 10/2/24 | ![]() EPISODE 48: It’s So Hard To Commit A Crime These Days! Surveillance, Dishonesty, Fraud And Other Pink-Collar Flags | In this Episode we are joined by Kelly Paxton. Kelly Paxton has more than 20 years of investigative experience. Kelly is a Certified Fraud Examiner, author, and podcast host-founder of Fraudish. This week’s episode asks why it is so hard to commit a crime these days! But when people do, what is their motivation behind it! We also look at the nature of surveillance, how it can be used to catch criminals but also the implications of being willing to bring in surveillance devices into your home and life - yes I’m looking at you iPhone! How fraud in the workplace happens, what are the signs to spot for and how to prevent it happening and how sometimes it’s not so pretty in pink, as we explore Kelly’s specialism, Pink Collar Crime! | — | ||||||
| 9/25/24 | ![]() EPISODE 47: Hacking Our Capacity To Think: The Philosophy Of Trust, Cybersecurity And AI | In this Episode we are joined by Dr. Rebekka Reinhard. Dr Reinhard is a philosopher and the founder and editor-in-chief of Human magazine, which aims to holistically address the impact of AI beyond the technical to include the cultural and the human. In this episode, Hacking Our Capacity to Think - The Philosophy of Trust, Cybersecurity and AI, we explore these topics and more within the lens of philosophy. We discuss the importance of an interdisciplinary dialogue between tech experts and humanities experts. How AI is Impacting democracy and our concept of trust and safety within the context of cybersecurity, and new threats like deepfakes and misinformation. | — | ||||||
| 9/18/24 | ![]() EPISODE 46: Sometimes, We Are The Villains: Tech Ethics In Software Development | In this Episode we are joined by Sergès Goma, a Paris-based software developer specialising in JavaScript. In this episode, Sometimes, we are the Villains - Tech ethics in software development, we dive deep into the ethical dilemmas we face as workers and creators of technology. Heroes are few and far between in this tech landscape, even if we don’t like to admit it, and that includes us in cybersecurity! So it is important we have these conversations and look inward at our industry and the impact it has on culture and society. We also talk about why developers always seem to top the leader board when it comes to phishing simulation click rates, the complexity of the word ‘privacy’ in different countries, and ask if we are heading towards a more regulated industry and what that might mean for innovation and creativity. | — | ||||||
| 9/11/24 | ![]() EPISODE 45: Can Cybersecurity Teams Actually Do Scrum? | This episode we are joined by the awesome Steve Trapps. Steve is the co-owner of Scrum Facilitators, an experienced Scrum Master, and a Professional Scrum Trainer with 20 years plus of experience in delivering complex products in many different business sectors. This week we answer that age old question, Can Cybersecurity Teams Actually Do Scrum? To answer that, we do a deep dive into when you should and shouldn’t use scrum in your cybersecurity teams and of course, we will learn exactly what a scrum master does! Together we will explore how scrum can be used to foster better conversations, create transparency and help you achieve your goal; what it takes to be an A1 facilitator, like Steve, as well as how not to get caught up in the dogma of ‘the scrum guide’! | — | ||||||
| 9/4/24 | ![]() EPISODE 44: Embracing Failure in Cybersecurity by Learning Through Trial and Error | This episode we are joined by the brilliant Stefan Gaillard, the co-founder and current chair of the Journal of Trial & Error, a journal dedicated to highlighting the importance of trial and error in scientific practice and scholarship. Trial and error is part of the scientific method but most of us are risk averse because we are so afraid of failure or we take great lengths to cover up anyone finding out that we have failed. There is so much shame around admitting to failure, especially in cybersecurity when, lets face it, most of us will experience the failure of our security controls eventually. But to hide from failure, not only from ourselves but also our peers, means missing out on important learning opportunities. We need to change this! If we don’t think about failure more, we are doomed to keep failing. This episode we explore the importance of removing the stigma from failure, the benefits AND the dangers of tech’s ‘fail-fast’ mentality, what it’s like to live in the information overload age and finally, the importance of trial and error. | — | ||||||
| 8/28/24 | ![]() EPISODE 43: Not Everybody Does It Like US…So Hire Anthropologists in Cybersecurity! | This episode we are joined by the wonderful Jamie Sherman, a cultural anthropologist and principal UX researcher at ESRI. We explore how words like ‘security and privacy’ are slippery and that can lead to a lot of confusion and misunderstanding. How to ask better questions to really understand how to protect the people and our customers in an organisation and how to create the perfect ‘sniff test’ in our organisations so people feel more able to trust their intuition rather than relying on crap passwords. And Finally we unpack the importance of hiring more anthropologists in cybersecurity because not everybody does it like us. | — | ||||||
| 8/21/24 | ![]() EPISODE 42: Mind Science - Cyber Psychology 101 | This Episode we’re heading back into the vaults to bring you the unabridged version of our fantastic and extremely popular interview with Bec McKeown, a chartered psychologist with extensive experience in carrying out applied research for organisations including the UK Ministry of Defence and the founder and director of Mind Science, an independent organisation that works with cybersecurity professionals. Ever wanted to know the psychology behind cybersecurity? Bec takes us an a fascinating journey into the mind as we get acquainted with a smorgasbord of psychological concepts to help you understand your cybersecurity posture - especially during a dreaded cybersecurity incident! | — | ||||||
| 8/14/24 | ![]() EPISODE 41: Empathy Over Ego: Why We're Angry At The Wrong People In Cybersecurity - The Cyber Empathy Podcast | We’re still on a summer break but in the meantime we are delighted to share with you an episode from friend of the show, Cyber Empathy which Lianne appeared on earlier this year. In this episode Lianne discussed how she hates the term ‘weakest link’ when talking about our colleagues, how the language that we use in cybersecurity can be incredibly harmful to our cybersecurity posture, and how she applies her skills as an anthropologist to her organisation. Thank you kindly to Cyber Empathy for giving us permission to share this episode! | — | ||||||
| 8/7/24 | ![]() EPISODE 40: How Do You Protect Your ASS-ets? An Interview On AppSec With The Modern.Net Show | We’re still on a summer break but in the meantime we are delighted to share with you an episode from friend of the show, The Modern.Net Show in which Jeff and Lianne we’re interviewed on. In this discussion we talked about how you protect your ass-ets, your SDLC, and how to overall improve cybersecurity practices within your organisation. Jamie is a great interviewer and we are sure you’ll enjoy his show. And if you do, don’t forget to look him up and subscribe to his channel. We’ve put details of where to find him in the show notes. Enjoy! Thank you kindly to The Modern.Net Show for giving us permission to share this episode! | — | ||||||
| 7/31/24 | ![]() EPISODE 39: Throwback Thursday! I’m Only H.U.M.A.N(S): Hacking the Human OS to Master Cybersecurity Compliance | Welcome to Compromising Positions! The award-winning tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This Episode we’re heading back into the vaults to bring you the unabridged version of our fantastic and extremely popular interview with Christian Hunt, the founder of Human Risk. He's a Behavioural Science expert and author of the award-winning book 'Humanizing Rules'. | — | ||||||
| 7/24/24 | ![]() EPISODE 38: HACK THE PLANET! THE BEST AND WORST HACKER MOVIES REVIEWED! | This Episode we are joined by Simon Painter a senior software engineer with nearly 20 years of experience in the industry and author of the book Functional Programming with C#. In this episode, Hack The Planet! The Best And Worst Hacker Movies Reviewed! Our regular programming has been hijacked to bring you a discussion on the best, and worst, hacker movies! In this episode we cover greats like Hackers, Sneakers, Jurassic Park and War Games, and not so great movies like The Net! So boot up that modem, turn off the lights and enter the deepest darkest web of hacker forums, and try not to accidentally trigger thermonuclear war, as we explore this sometimes brilliant and sometimes bonkers sub-genre! | — | ||||||
| 7/17/24 | ![]() EPISODE 37: There Is No Perfect Cybersecurity, But You Could At Least Put a Padlock On It! | This Episode we are joined by Simon Painter a senior software engineer with nearly 20 years of experience in the industry and author of the book Functional Programming with C#. In this episode, There is no perfect cybersecurity but you could at least put a padlock on it! we look at how to get your first technical book published, what developers really need from the cybersecurity team (hint - its probability more than you are giving!) and what developers really think of security reviews! | — | ||||||
| 7/10/24 | ![]() EPISODE 36: When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"? | This Episode we are joined by Martina Mitz, a UX Psychologist, Strategist and Designer. In this episode, When Perception is Everything: Is it Time to Ditch the name "Cybersecurity"?, we explore how people feel when they see the title ‘cybersecurity’ and ask the question: is the term ‘cybersecurity’ it actually putting people off engaging with us! We also talk about the power of perception, how to learn from failure, and supporting cognitive shifts so people feel like a contributing cog for the securing of our organisations rather than just a spare part! And Martina also shares a story about the time when she got hacked and you won’t believe what the hacker did next! | — | ||||||
Showing 25 of 61
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
3 placements across 3 markets.
Chart Positions
3 placements across 3 markets.

























