All Episodes
Bare Metal Cyber — 109 episodes
Certified: Your First Step into Tech with CompTIA Tech+
Concrete and Code: Smart Buildings as the Quiet New Attack Surface
Keeping API Keys, Tokens, and Passwords Out of the Wrong Hands
Certified: Launching Your Project Management Journey with CompTIA Project+
SaaS Chain Reactions: When One App’s Breach Becomes Everyone’s Incident
Insight: Turning SIEM Events Into Actionable Signals
Certified: Hands-On Server Confidence with CompTIA Server+
Multi-Cloud Mirage: More Providers, Same Fragile Backbone
Insight: Third-Party Risk Questions That Actually Matter
Certified: Breaking into Tech from Zero with CompTIA IT Fundamentals (ITF+)
Platform Captivity: Life Inside a Single Cloud’s Walled Garden
Insight: When Source Code Spills Keys, Tokens, and Credentials
Certified: How CompTIA Cloud+ Builds Real-World Cloud Confidence
Machine Identity Riot: Certificates, Tokens, and Bots Gone Wild
Insight: Building Security Into CI/CD Without the Buzzwords
Certified: GIAC Security Essentials (GSEC): A Hands-On Baseline for Early-Career Defenders
Cyber Leadership in the Age of AI Coworkers
Insight: Turning MITRE ATT&CK into a Defense Roadmap
Certified: CompTIA A+ as Your First Real Checkpoint in IT and Cybersecurity
Identity Bankruptcy: When Your Organization Runs Out of Trust
Insight: Triage 101 – What Really Happens After an Alert Fires
Certified: CompTIA Network+ – The Early-Career Guide to Real-World Networking
Copilot or Co-Conspirator? AI Helpdesks and the Next Social Engineering Wave
Insight: Reading Your Environment Through Logs, Events, and Alerts
Certified: Speaking Cloud with AWS Certified Cloud Practitioner
Model Supply Chain Mayhem: Securing the AI You Didn’t Build Yourself
Insight: Making Sense of Security Control Types
Certified: CRISC at the Intersection of Cyber Risk and Business Decisions
Cyber Talks: The Four Ps of Marketing for Cybersecurity: A Cyber Talks Conversation with Tapan Deka
Ghosts in the Training Data: When Old Breaches Poison New AI
Insight: Making Defense in Depth Actually Work
Certified: Building Your Analyst Mindset with CompTIA CySA+
SOC Pager Olympics: Gold Medal in 3 A.M. False Alarms
Network Segmentation Without the Buzzword Fog
Certified: Monday: PCI Professional (PCIP) – Learning to Speak the Language of PCI DSS
SBOM & Chill: You Don’t Need Every Ingredient—Just the Allergens
Insight: Asset Inventory Basics for Real-World Defenders
Certified: How CCISO Signals You’re Ready for Executive Security Leadership
Cyber Talks: Tracking School Swatters and Shooters: Turning Online Leakage Into Action with Detective Richard Wistocki
Tabletop Telenovela: Turning Your IR Plan into a Drama People Remember
Insight: Turning Patch and Update Management into a Strength
Certified: Stepping Into Security Leadership with CISM
Cyber Talks: Phishing in the Age of Agentic AI: Craig Taylor on Culture, Literacy, and the New Human Firewall
Email Is Your Unpatchable Legacy App
Insight: How CVEs and CVSS Turn Vulnerabilities into Decisions
Certified Monday: Seeing Systems Like an Auditor with the CISA Certification
Weekly Cyber News Rollup, December 5th, 2025
Cyber Talks: Excel Is Not Your GRC Solution: Scaling Governance Beyond Spreadsheets
Shadow SaaS: 1,000 Apps, 0 Approvals, Unlimited Risk
Insight: Cyber Kill Chain and Attack Lifecycles
Certified: CompTIA Security+ as Your Cybersecurity Launchpad
Weekly Cyber News Rollup, November 28th, 2025
Zero Trust Theater: We Put a Fancy Gate on a Cardboard Wall
Weekly Update: Cyber News for the Week ending 21 November, 2025
Cyber Talks - Break Things Safely: A High-Value Cyber Exercise Program with Daniel Hammond
XDR, EDR, NDR, MDR, WTF-DR?
Weekly Cyber News Rollup, November 14th, 2025
Phishing ‘Hunger Games’: May the Odds Be Ever in Your Favor (They Aren’t)
Weekly Cyber News Rollup, November 7th, 2025
The Cult of the Dashboard: Vanity Metrics Anonymous
Weekly Cyber News Rollup, October 31st, 2025
Patch Tuesday, Breach Wednesday
Weekly Cyber News Rollup, October 24th, 2025
GenAI Policy Mad Libs: ‘Don’t Paste {Sensitive Thing} into {Cool Bot}’
Weekly Cyber News Rollup, October 17th, 2025
Shrodingers Firewall
Trailer
Weekly Cyber News Rollup, October 10th, 2025
When Zero Trust Meets Zero Patience
Weekly Cyber News Rollup, October 3rd, 2025
Crypto or Consequences
Your MFA Is Not Two-Factor—It’s SMS and a Prayer
Glitched on Arrival: When AI Learns the Wrong Lessons
Will AI trigger the First White Collar Recession?
Keyboard Assassins: Inside the Covert World of State-Sponsored Cyber Sabotage
Ctrl+Alt+Comply: The Wild World of Cyber Regulations
When Smart Gets Sinister: Taming the IoT Rebellion
From LOLs to Lateral Movement: Securing ChatOps
Click Less, Protect More: Building Your Office’s Human Firewall
Firewalls and Frontlines: Cybersecurity in the Age of Digital Warfare
Inside Job: Profiling the Mind of an Insider Threat
Seeing is Deceiving: Preparing for the Deepfake Cyber Threat
Burnout in the SOC: Is Automation the Cure or the Culprit?
Click First, Ask Never: Shadow IT’s Quiet Rebellion
Broken Links: Surviving the Supply Chain Cybertrap
Virtual Reality Check: Cybersecurity in XR’s Wild West
Prompts of Mass Destruction: How Solo Hackers Are Turning Public AI into Weapons
Beyond Passwords: The Future of Secure Identity Management
Industrial Control Systems Under Siege: Battling Advanced Cyber Threats
Cybersecurity on Autopilot: Unlocking the Potential of SOAR
Beyond Passwords: The Future of Secure Identity Management
Off the Record, On the Radar: Why Personal Comms Keep Haunting Government Cybersecurity
Cyber Illusions: How Security Teams Trick and Track Attackers
The Cybersecurity Storm: 5G, IoT, and the Next Wave of Attacks
Ransomware Warfare: Advanced Tactics for Ransomware Response
Beyond Perimeters: Mastering Zero Trust
Hacked by a Human: The Future of Social Engineering and Phishing
Deconstructing Malware: A Deep Dive into Advanced Threat Analysis
Dark Web Intelligence
Bulletproof the Cloud: Building Systems That Survive Outages and Attacks
AI in Cybersecurity (Part 2): Offense
AI in Cybersecurity (Part 1): Defense
Advanced Persistent Threats (APT): There be Dragons
Fortifying the Core: Building an Effective Insider Threat Program for Modern Organizations
Cryptocurrency Security: Advanced exploits of blockchain, smart contracts, and crypto wallets
The Fundamentals of Cybersecurity
Securing the Future: Cryptography in the Age of Quantum Computing
Artificial Intelligence (AI) in Modern Warfare
Understanding Zero-Day Vulnerabilities