• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
EIS

Need Exploring Information Security Podcast Feedback

September 17, 2014

I'm at a bit of a crossroads with the Exploring Information Security podcast. I am trying to decide if it's a project I want to continue doing. I currently have seven episodes on the books and I have ideas for other episodes, but something just doesn't feel right with the episodes.

I'm not sure what it is about the podcast, but I am struggling with getting excited about the podcast. I absolutely love all the interviews I've done and even the preparation I put into each episode leading up to the recording, but after that interview it feels more like a chore to produce the episode. I also feel like I'm not asking the right questions to really dig into a topic. I've thought about tweaking it, but I'm not really sure what to tweak. I haven't put the podcast on iTunes yet because of that reason. I don't want to put something up for a handful of episodes and then have it die off.

So what I am looking for with this post is to garner some feedback of the podcast: Do you like it? do you hate it? Would it be better with some tweaks? or any other nice/awful thing you can say about it. I want to hear it. If you have no idea what I'm talking about click the link below:

Exploring Information Security Podcast

Listen to a few episodes and let me know what you think. You can leave feedback in the comment section below, contact me on Twitter (@TimothyDeBlock) or contact me via email (timothy.deblock[at]gmail[dot]com).

 This post first appeared on Exploring Information Security.

In Media Tags podcast, infosec, EIS
← Longform links September 18, 2014Impressions from BSides Augusta →

Latest PoDCASTS

Featured
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026
Feb 17, 2026
What are the AI Vulnerabilities We Need to Worry About
Feb 17, 2026
Feb 17, 2026
Feb 10, 2026
[RERELEASE] How to make time for a home lab
Feb 10, 2026
Feb 10, 2026
Feb 3, 2026
[RERELEASE] How to build a home lab
Feb 3, 2026
Feb 3, 2026
Jan 27, 2026
How to Build an AI Governance Program with Walter Haydock
Jan 27, 2026
Jan 27, 2026
Jan 20, 2026
Exploring Cribl: Sifting Gold from Data Noise for Cost and Security
Jan 20, 2026
Jan 20, 2026
Jan 13, 2026
What is BSides ICS?
Jan 13, 2026
Jan 13, 2026
Jan 6, 2026
Cybersecurity Career Panel: Transitioning from Technical to Leadership
Jan 6, 2026
Jan 6, 2026

Powered by Squarespace