Bare Metal Cyber cover art

All Episodes

Bare Metal Cyber — 109 episodes

#
Title
1

Certified: Your First Step into Tech with CompTIA Tech+

2

Concrete and Code: Smart Buildings as the Quiet New Attack Surface

3

Keeping API Keys, Tokens, and Passwords Out of the Wrong Hands

4

Certified: Launching Your Project Management Journey with CompTIA Project+

5

SaaS Chain Reactions: When One App’s Breach Becomes Everyone’s Incident

6

Insight: Turning SIEM Events Into Actionable Signals

7

Certified: Hands-On Server Confidence with CompTIA Server+

8

Multi-Cloud Mirage: More Providers, Same Fragile Backbone

9

Insight: Third-Party Risk Questions That Actually Matter

10

Certified: Breaking into Tech from Zero with CompTIA IT Fundamentals (ITF+)

11

Platform Captivity: Life Inside a Single Cloud’s Walled Garden

12

Insight: When Source Code Spills Keys, Tokens, and Credentials

13

Certified: How CompTIA Cloud+ Builds Real-World Cloud Confidence

14

Machine Identity Riot: Certificates, Tokens, and Bots Gone Wild

15

Insight: Building Security Into CI/CD Without the Buzzwords

16

Certified: GIAC Security Essentials (GSEC): A Hands-On Baseline for Early-Career Defenders

17

Cyber Leadership in the Age of AI Coworkers

18

Insight: Turning MITRE ATT&CK into a Defense Roadmap

19

Certified: CompTIA A+ as Your First Real Checkpoint in IT and Cybersecurity

20

Identity Bankruptcy: When Your Organization Runs Out of Trust

21

Insight: Triage 101 – What Really Happens After an Alert Fires

22

Certified: CompTIA Network+ – The Early-Career Guide to Real-World Networking

23

Copilot or Co-Conspirator? AI Helpdesks and the Next Social Engineering Wave

24

Insight: Reading Your Environment Through Logs, Events, and Alerts

25

Certified: Speaking Cloud with AWS Certified Cloud Practitioner

26

Model Supply Chain Mayhem: Securing the AI You Didn’t Build Yourself

27

Insight: Making Sense of Security Control Types

28

Certified: CRISC at the Intersection of Cyber Risk and Business Decisions

29

Cyber Talks: The Four Ps of Marketing for Cybersecurity: A Cyber Talks Conversation with Tapan Deka

30

Ghosts in the Training Data: When Old Breaches Poison New AI

31

Insight: Making Defense in Depth Actually Work

32

Certified: Building Your Analyst Mindset with CompTIA CySA+

33

SOC Pager Olympics: Gold Medal in 3 A.M. False Alarms

34

Network Segmentation Without the Buzzword Fog

35

Certified: Monday: PCI Professional (PCIP) – Learning to Speak the Language of PCI DSS

36

SBOM & Chill: You Don’t Need Every Ingredient—Just the Allergens

37

Insight: Asset Inventory Basics for Real-World Defenders

38

Certified: How CCISO Signals You’re Ready for Executive Security Leadership

39

Cyber Talks: Tracking School Swatters and Shooters: Turning Online Leakage Into Action with Detective Richard Wistocki

40

Tabletop Telenovela: Turning Your IR Plan into a Drama People Remember

41

Insight: Turning Patch and Update Management into a Strength

42

Certified: Stepping Into Security Leadership with CISM

43

Cyber Talks: Phishing in the Age of Agentic AI: Craig Taylor on Culture, Literacy, and the New Human Firewall

44

Email Is Your Unpatchable Legacy App

45

Insight: How CVEs and CVSS Turn Vulnerabilities into Decisions

46

Certified Monday: Seeing Systems Like an Auditor with the CISA Certification

47

Weekly Cyber News Rollup, December 5th, 2025

48

Cyber Talks: Excel Is Not Your GRC Solution: Scaling Governance Beyond Spreadsheets

49

Shadow SaaS: 1,000 Apps, 0 Approvals, Unlimited Risk

50

Insight: Cyber Kill Chain and Attack Lifecycles

51

Certified: CompTIA Security+ as Your Cybersecurity Launchpad

52

Weekly Cyber News Rollup, November 28th, 2025

53

Zero Trust Theater: We Put a Fancy Gate on a Cardboard Wall

54

Weekly Update: Cyber News for the Week ending 21 November, 2025

55

Cyber Talks - Break Things Safely: A High-Value Cyber Exercise Program with Daniel Hammond

56

XDR, EDR, NDR, MDR, WTF-DR?

57

Weekly Cyber News Rollup, November 14th, 2025

58

Phishing ‘Hunger Games’: May the Odds Be Ever in Your Favor (They Aren’t)

59

Weekly Cyber News Rollup, November 7th, 2025

60

The Cult of the Dashboard: Vanity Metrics Anonymous

61

Weekly Cyber News Rollup, October 31st, 2025

62

Patch Tuesday, Breach Wednesday

63

Weekly Cyber News Rollup, October 24th, 2025

64

GenAI Policy Mad Libs: ‘Don’t Paste {Sensitive Thing} into {Cool Bot}’

65

Weekly Cyber News Rollup, October 17th, 2025

66

Shrodingers Firewall

67

Trailer

68

Weekly Cyber News Rollup, October 10th, 2025

69

When Zero Trust Meets Zero Patience

70

Weekly Cyber News Rollup, October 3rd, 2025

71

Crypto or Consequences

72

Your MFA Is Not Two-Factor—It’s SMS and a Prayer

73

Glitched on Arrival: When AI Learns the Wrong Lessons

74

Will AI trigger the First White Collar Recession?

75

Keyboard Assassins: Inside the Covert World of State-Sponsored Cyber Sabotage

76

Ctrl+Alt+Comply: The Wild World of Cyber Regulations

77

When Smart Gets Sinister: Taming the IoT Rebellion

78

From LOLs to Lateral Movement: Securing ChatOps

79

Click Less, Protect More: Building Your Office’s Human Firewall

80

Firewalls and Frontlines: Cybersecurity in the Age of Digital Warfare

81

Inside Job: Profiling the Mind of an Insider Threat

82

Seeing is Deceiving: Preparing for the Deepfake Cyber Threat

83

Burnout in the SOC: Is Automation the Cure or the Culprit?

84

Click First, Ask Never: Shadow IT’s Quiet Rebellion

85

Broken Links: Surviving the Supply Chain Cybertrap

86

Virtual Reality Check: Cybersecurity in XR’s Wild West

87

Prompts of Mass Destruction: How Solo Hackers Are Turning Public AI into Weapons

88

Beyond Passwords: The Future of Secure Identity Management

89

Industrial Control Systems Under Siege: Battling Advanced Cyber Threats

90

Cybersecurity on Autopilot: Unlocking the Potential of SOAR

91

Beyond Passwords: The Future of Secure Identity Management

92

Off the Record, On the Radar: Why Personal Comms Keep Haunting Government Cybersecurity

93

Cyber Illusions: How Security Teams Trick and Track Attackers

94

The Cybersecurity Storm: 5G, IoT, and the Next Wave of Attacks

95

Ransomware Warfare: Advanced Tactics for Ransomware Response

96

Beyond Perimeters: Mastering Zero Trust

97

Hacked by a Human: The Future of Social Engineering and Phishing

98

Deconstructing Malware: A Deep Dive into Advanced Threat Analysis

99

Dark Web Intelligence

100

Bulletproof the Cloud: Building Systems That Survive Outages and Attacks

101

AI in Cybersecurity (Part 2): Offense

102

AI in Cybersecurity (Part 1): Defense

103

Advanced Persistent Threats (APT): There be Dragons

104

Fortifying the Core: Building an Effective Insider Threat Program for Modern Organizations

105

Cryptocurrency Security: Advanced exploits of blockchain, smart contracts, and crypto wallets

106

The Fundamentals of Cybersecurity

107

Securing the Future: Cryptography in the Age of Quantum Computing

108

Artificial Intelligence (AI) in Modern Warfare

109

Understanding Zero-Day Vulnerabilities