All Episodes

Displaying 61 - 80 of 101 in total

Episode 61 — Crypto Tools: VPNs, SSH, GPG, and Disk Encryption

Encryption moves from theory to practice through the tools we use every day, and this episode explores how they work together to protect data in motion and at rest. Yo...

Episode 62 — Web Communication Security I: HTTPS, Cookies, and Sessions

Web traffic security is at the core of modern cyber defense, and this episode unpacks how HTTPS, cookies, and sessions protect—or sometimes expose—data in transit. You...

Episode 63 — Web Communication Security II: Headers and HSTS

The smallest details in web configuration often have the biggest impact on security, and this episode explains how HTTP headers and strict transport policies shape bro...

Episode 64 — Common Web Risks: Injection, XSS, and CSRF

Web applications remain one of the most common attack surfaces, and this episode dives into three of the most critical risks—Injection, Cross-Site Scripting (XSS), and...

Episode 65 — API Security Fundamentals: Keys, Tokens, and Rate-Limits

APIs are the unseen infrastructure of digital communication, and this episode examines how to secure them without slowing innovation. You’ll learn how authentication a...

Episode 66 — Malware I: Types, Vectors, and Evasion

Malware is a constant in cybersecurity, and this episode breaks down its many forms, how it spreads, and how it hides. You’ll learn the defining characteristics of vir...

Episode 67 — Malware II: Prevention, Detection, and Containment

Once you know what malware is, the next step is learning how to stop it. This episode explores preventive measures such as least privilege, patch management, and appli...

Episode 68 — Ransomware: Controls, Backups, and Playbooks

Ransomware has transformed from nuisance to national security issue, and this episode explores how to counter it systematically. You’ll learn how attackers deploy encr...

Episode 69 — Phishing and Social Engineering Countermeasures

Technology can fail, but awareness turns people into active defenders. This episode focuses on phishing and social engineering—the most persistent causes of compromise...

Episode 70 — Vulnerability Management I: Asset Inventory and Scoping

You can’t protect what you don’t know you have, and this episode begins the journey into vulnerability management by focusing on discovery and scoping. You’ll learn ho...

Episode 71 — Vulnerability Management II: Scanners, False Positives, and SLAs

Once assets are identified, the next challenge is analyzing their weaknesses efficiently and accurately. This episode explores how vulnerability scanners operate—probi...

Episode 72 — Pen Testing Basics: Rules, Methods, and Ethics

Penetration testing turns theory into simulation, offering a controlled way to measure defensive strength. This episode explains how pen testing differs from vulnerabi...

Episode 73 — Remediation Planning and Verification Loops

Finding vulnerabilities is only half the equation—fixing them effectively is what truly reduces risk. This episode walks through how remediation planning turns scan re...

Episode 74 — Backup Fundamentals: 3-2-1, Immutability, and Testing

Backups are the ultimate recovery safety net, but only if they’re designed correctly. This episode explains the 3-2-1 backup rule—three copies of data, on two media ty...

Episode 75 — Business Continuity and Disaster Recovery Basics

When incidents scale beyond a single system, organizations rely on Business Continuity (BC) and Disaster Recovery (DR) planning to stay afloat. This episode explains h...

Episode 76 — Change and Configuration Management Controls

Stability and security both depend on disciplined change, and this episode explores how organizations govern that process through Change and Configuration Management. ...

Episode 77 — Secure Baselines: Hardening Guides and Benchmarks

Every secure environment starts with a baseline, and this episode explains how hardening guides and benchmarks create consistency across systems. You’ll learn how stan...

Episode 78 — Cloud Security I: Shared Responsibility Model

The cloud redefines where control ends and trust begins, and this episode introduces the shared responsibility model that governs it. You’ll learn how responsibilities...

Episode 79 — Cloud Security II: IAM, Network, and Storage Controls

Identity, network, and storage security define the heart of cloud defense, and this episode dives deep into each. You’ll learn how cloud IAM policies enforce least pri...

Episode 80 — Cloud Security III: Logging, Keys, and Workload Hygiene

Visibility, key management, and workload upkeep form the operational backbone of secure cloud environments. This episode explains how enabling platform-native logs—lik...

Broadcast by