PodcastsRank #8913
Artwork for 8th Layer Insights

8th Layer Insights

TechnologyPodcastsScienceSocial SciencesENunited-states
5 / 554 ratings
<p>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</p>
Top 17.8% by pitch volume (Rank #8913 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
N/A
Episodes
87
Founded
N/A
Category
Technology
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: 8K–20K / month
Canonical: https://podpitch.com/podcasts/8th-layer-insights
Reply rate: Under 2%

Latest Episodes

Back to top

Cognitive Heists series #7: The Trojan Gift

Mon Sep 29 2025

Listen

Hey folks! It's been a few weeks, but now the gift is here. :) It's the 7th installment of the "Cognitive Heists" series. This one is titled, "The Trojan Gift." 🎁 Not all traps look like traps. Some arrive with a bow on top. The Trojan Horse is the oldest example. But today, the gift often looks like a free service. No charge, no strings… except the ones you don’t see. Because the real price isn’t money. It’s privacy. -- It’s data. -- It’s you. In this issue of Cognitive Heists, we explore: 🔹 How “free” has always been one of the most effective disguises in the con artist’s playbook 🔹 Folklore warnings about cursed gifts that crumble into ash 🔹 Why reciprocity, curiosity, and flattery make us drag danger through our own gates 🔹 And how modern Trojan Gifts hide in inboxes, QR codes, cloud apps, and “free” platforms The cost of convenience is rarely written on the tag. Enjoy! Next up: The Double Agent—where the betrayal sits across the table, smiling like a friend. Learn more about your ad choices. Visit megaphone.fm/adchoices

More

Hey folks! It's been a few weeks, but now the gift is here. :) It's the 7th installment of the "Cognitive Heists" series. This one is titled, "The Trojan Gift." 🎁 Not all traps look like traps. Some arrive with a bow on top. The Trojan Horse is the oldest example. But today, the gift often looks like a free service. No charge, no strings… except the ones you don’t see. Because the real price isn’t money. It’s privacy. -- It’s data. -- It’s you. In this issue of Cognitive Heists, we explore: 🔹 How “free” has always been one of the most effective disguises in the con artist’s playbook 🔹 Folklore warnings about cursed gifts that crumble into ash 🔹 Why reciprocity, curiosity, and flattery make us drag danger through our own gates 🔹 And how modern Trojan Gifts hide in inboxes, QR codes, cloud apps, and “free” platforms The cost of convenience is rarely written on the tag. Enjoy! Next up: The Double Agent—where the betrayal sits across the table, smiling like a friend. Learn more about your ad choices. Visit megaphone.fm/adchoices

Key Metrics

Back to top
Pitches sent
33
From PodPitch users
Rank
#8913
Top 17.8% by pitch volume (Rank #8913 of 50,000)
Average rating
5.0
From 54 ratings
Reviews
16
Written reviews (when available)
Publish cadence
N/A
Episode count
87
Data updated
Feb 10, 2026
Social followers
5.1K

Public Snapshot

Back to top
Country
United States
Language
English
Language (ISO)
Release cadence
N/A
Latest episode date
Mon Sep 29 2025

Audience & Outreach (Public)

Back to top
Audience range
8K–20K / month
Public band
Reply rate band
Under 2%
Public band
Response time band
30+ days
Public band
Replies received
1–5
Public band

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
5.1K
Contact available
Yes
Masked on public pages
Sponsors detected
Yes
Guest format
Yes

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
p***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch 8th Layer Insights

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #8913 by pitch volume, with 33 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
5 / 554 ratings
Ratings54
Written reviews16

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About 8th Layer Insights

Back to top

What is 8th Layer Insights about?

<p>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</p>

How often does 8th Layer Insights publish new episodes?

8th Layer Insights publishes on a variable schedule.

How many listeners does 8th Layer Insights get?

PodPitch shows a public audience band (like "8K–20K / month"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch 8th Layer Insights?

Use PodPitch to access verified outreach details and pitch recommendations for 8th Layer Insights. Start at https://podpitch.com/try/1.

Which podcasts are similar to 8th Layer Insights?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact 8th Layer Insights?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.