Partner im RedaktionsNetzwerk Deutschland
PodcastsBildungBare Metal Cyber

Bare Metal Cyber

Dr. Jason Edwards
Bare Metal Cyber
Neueste Episode

Verfügbare Folgen

5 von 48
  • Patch Tuesday, Breach Wednesday
    In this episode of Bare Metal Cyber, we break down the monthly ritual every security team knows too well: Patch Tuesday. You’ll learn why the very act of publishing a patch creates a roadmap for attackers, how exploits move from proof-of-concept to widespread weaponization in a matter of hours, and why so many organizations struggle with the dreaded “patch gap.” We’ll also explore the speed advantage of adversaries, the realities of legacy systems, and what a 72-hour response playbook looks like when executed correctly.Beyond awareness, this episode sharpens your practical skills. You’ll gain insight into prioritizing vulnerabilities based on real-world risk, using canary deployments and automation to patch faster with less disruption, and applying compensating controls when immediate fixes aren’t possible. Most importantly, you’ll build the mindset to treat patching as frontline defense rather than routine maintenance—transforming Breach Wednesday from a certainty into just another day.Produced by BareMetalCyber.com.
    --------  
    30:17
  • Weekly Cyber News Rollup, October 24th, 2025
    This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploitation against Oracle E-Business Suite, critical flaws in T P-Link Omada and WatchGuard Fireware, and convincing Microsoft 365 phishing hosted on Azure itself. Add in developer risks—from lagging Chromium inside A I code editors to a high-severity Kestrel bug—and the message is clear: fundamentals matter when everything is connected.You’ll hear crisp, plain-English briefs on each item: how Magento “Session Reaper” drives checkout fraud, what Pwn two Own means for your next patch sprint, why Vidar’s speed boost and Mermaid-based prompt injection change identity defense, and how Polar Edge, ToolShell, and a Rust tar parsing flaw widen the perimeter. We also cover agent abuse, certificate subversion, and an M C P registry leak that exposed thousands of servers and keys. Leaders, defenders, and builders get concrete actions to reduce blast radius, tighten identity, and harden edge and dev tooling—available at daily cyber news dot com.
    --------  
    17:03
  • GenAI Policy Mad Libs: ‘Don’t Paste {Sensitive Thing} into {Cool Bot}’
    In this episode, we unpack why the popular slogan “don’t paste {Sensitive Thing} into {Cool Bot}” has become the lazy default for GenAI policy—and why it fails. Listeners will learn how vague rules fuel shadow AI, create inconsistent behavior, and ultimately increase risk rather than reduce it. We explore how to replace empty slogans with real frameworks: data tier maps, risk-based tool catalogs, guardrails that operate in real time, and a one-page policy template that employees can actually use. By the end, you’ll see why clarity, context, and culture matter more than catchy warnings.Along the way, this episode sharpens your ability to design and evaluate AI governance in practice. You’ll build skills in risk classification, vendor evaluation, and creating guardrails that balance safety with productivity. You’ll also gain insight into cultural adoption—how to move from compliance theater to real trust. The goal isn’t just knowing what not to do, but mastering how to make the safe way the easy way. Produced by BareMetalCyber.com.
    --------  
    30:03
  • Weekly Cyber News Rollup, October 17th, 2025
    The Bare Metal Cyber — Friday Edition is your end-of-week cybersecurity intelligence wrap, turning five days of breaking threats into one fast, actionable update. For the week ending October 17th, 2025, we unpack everything from nation-state intrusions and zero-day exploits to record-setting DDoS attacks, policy moves, and vendor fallout — all explained in plain English for business leaders, defenders, and technology teams alike.This week’s episode dives into F5’s confirmed breach where attackers stole BIG-IP source code and vulnerability data, the UK’s £14-million fine against Capita for poor breach response, and the discovery of a six-billion-record data leak from an unsecured Elasticsearch cluster. You’ll also hear how phishing campaigns spoofed LastPass and Bitwarden to install remote-control tools, why the massive “ClickFix” campaign tricked users into running malicious commands, and how Microsoft’s October patch cycle delivered 172 fixes — including six exploited zero-days — just as Windows 10 reached its support deadline.We’ll explain how Chinese threat groups turned ArcGIS servers into backdoors, why VPNs and backup configurations became attacker blueprints, and how North Korea seeded npm with malicious packages to target developers. Plus, researchers exposed satellite traffic leaking unencrypted calls and telemetry, Apple doubled its bug bounty to $2 million, and the Aisuru botnet reached nearly thirty terabits per second in record-breaking denial-of-service floods.Each story includes three things: what happened, why it matters, and one clear action you can take now. Whether you manage risk, run IT, or lead a security program, you’ll walk away knowing exactly where to focus your attention next week.For more cybersecurity insights, visit BareMetalCyber.com for the full written wrap, or subscribe to the daily newsletter and podcast at DailyCyber.news — news you can use, and a daily podcast you can commute with.
    --------  
    11:21
  • Shrodingers Firewall
    In this episode, we dive into the unsettling paradox of Schrödinger’s Firewall—where your data is both safe and already compromised in the looming quantum era. Listeners will learn why today’s trusted encryption methods like RSA and ECC may soon resemble digital Swiss cheese, how Q-Day could arrive faster than expected, and what industries—from finance to healthcare to defense—stand to lose the most. We also unpack the race to post-quantum cryptography, exploring emerging algorithms, hybrid models, and the global urgency to prepare before attackers unlock decades of encrypted information.Beyond awareness, this episode sharpens critical cybersecurity skills. You’ll gain practical insight into crypto agility, strategies for testing and adopting quantum-safe algorithms, and approaches to educating leadership teams about long-term risks. You’ll also learn how to identify vulnerable systems, evaluate vendors, and build resilience into your security architecture. By the end, you’ll be equipped not only to understand the quantum threat but to act on it with clarity and foresight. Produced by BareMetalCyber.com.
    --------  
    41:30

Weitere Bildung Podcasts

Über Bare Metal Cyber

Welcome to Bare Metal Cyber, the podcast that bridges cybersecurity and education in a way that’s engaging, informative, and practical. Hosted by Dr. Jason Edwards, a seasoned cybersecurity expert and educator, this weekly podcast brings to life the insights, tips, and stories from his widely-read LinkedIn articles. Each episode dives into pressing cybersecurity topics, real-world challenges, and actionable advice to empower professionals, educators, and learners alike. Whether navigating the complexities of cyber defense or looking for ways to integrate cybersecurity into education, Bare Metal Cyber delivers valuable perspectives to help you stay ahead in an ever-evolving digital world. Subscribe and join the thousands already benefiting from Jason’s expertise!
Podcast-Website

Höre Bare Metal Cyber, 6 Minute English und viele andere Podcasts aus aller Welt mit der radio.at-App

Hol dir die kostenlose radio.at App

  • Sender und Podcasts favorisieren
  • Streamen via Wifi oder Bluetooth
  • Unterstützt Carplay & Android Auto
  • viele weitere App Funktionen

Bare Metal Cyber: Zugehörige Podcasts

Rechtliches
Social
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 10/29/2025 - 5:29:44 PM