• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
EIS

Need Exploring Information Security Podcast Feedback

September 17, 2014

I'm at a bit of a crossroads with the Exploring Information Security podcast. I am trying to decide if it's a project I want to continue doing. I currently have seven episodes on the books and I have ideas for other episodes, but something just doesn't feel right with the episodes.

I'm not sure what it is about the podcast, but I am struggling with getting excited about the podcast. I absolutely love all the interviews I've done and even the preparation I put into each episode leading up to the recording, but after that interview it feels more like a chore to produce the episode. I also feel like I'm not asking the right questions to really dig into a topic. I've thought about tweaking it, but I'm not really sure what to tweak. I haven't put the podcast on iTunes yet because of that reason. I don't want to put something up for a handful of episodes and then have it die off.

So what I am looking for with this post is to garner some feedback of the podcast: Do you like it? do you hate it? Would it be better with some tweaks? or any other nice/awful thing you can say about it. I want to hear it. If you have no idea what I'm talking about click the link below:

Exploring Information Security Podcast

Listen to a few episodes and let me know what you think. You can leave feedback in the comment section below, contact me on Twitter (@TimothyDeBlock) or contact me via email (timothy.deblock[at]gmail[dot]com).

 This post first appeared on Exploring Information Security.

In Media Tags podcast, infosec, EIS
← Longform links September 18, 2014Impressions from BSides Augusta →

Latest PoDCASTS

Featured
Apr 28, 2026
[RERELEASE] What is the perception of information security - part 1
Apr 28, 2026
Apr 28, 2026
Apr 21, 2026
Exploring the Quantum Horizon: Why We Need CBOMs Today
Apr 21, 2026
Apr 21, 2026
Apr 14, 2026
Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Apr 14, 2026
Apr 14, 2026
Apr 7, 2026
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Apr 7, 2026
Apr 7, 2026
Mar 31, 2026
[RERELEASE] What is a SIEM?
Mar 31, 2026
Mar 31, 2026
Mar 24, 2026
[RERELEASE] What is threat modeling?
Mar 24, 2026
Mar 24, 2026
Mar 17, 2026
[RERELEASE] What is cryptography?
Mar 17, 2026
Mar 17, 2026
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026

Powered by Squarespace