All Episodes

Displaying 41 - 60 of 137 in total

Episode 41: Virtualization and Cloud Infrastructure Considerations

Virtualization and cloud computing are cornerstones of modern IT, but they also introduce unique security challenges. In this episode, we examine the architecture and ...

Episode 42: Secure Baseline and Configuration Management

Systems don’t stay secure by accident—they stay secure through consistent configuration and control. In this episode, we cover the concepts of secure baselining and co...

Episode 43: Common Security Flaws in Architecture

Flawed architecture is one of the most serious vulnerabilities in any system. In this episode, we explore common architectural security weaknesses, including insecure ...

Episode 44: Cryptographic Concepts: Symmetric and Asymmetric

Cryptography is the backbone of digital security, and understanding its core principles is essential. In this episode, we explain the difference between symmetric and ...

Episode 45: Cryptographic Lifecycle: Algorithms, Strength, Obsolescence

Cryptographic tools aren’t set-and-forget solutions—they require lifecycle management. This episode explores how organizations select, deploy, and eventually retire cr...

Episode 46: Hashing and Message Integrity

Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode, we explore how cryptographic hash functio...

Episode 47: Key Management and Key Escrow

Cryptographic systems are only as secure as the keys they use—and how those keys are managed. In this episode, we delve into key management principles, including gener...

Episode 48: PKI, Digital Certificates, and Trust Models

Public Key Infrastructure (PKI) is essential for enabling secure communication and verifying digital identities. This episode breaks down how PKI works, including the ...

Episode 49: Cryptanalysis and Attacks Against Crypto

No cryptographic system is immune to attack, and CISSPs must understand the methods used to break or weaken them. In this episode, we explore cryptanalysis techniques ...

Episode 50: Security Evaluations: Common Criteria, RMF, ISO/IEC

Security evaluations provide assurance that systems meet defined security requirements. In this episode, we examine key evaluation frameworks including Common Criteria...

Episode 51: Security Boundaries and Isolation Techniques

Security boundaries are essential for creating logical separations between systems, users, and data flows. In this episode, we explore how boundaries are defined and e...

Episode 52: Emerging Technologies and Security Architecture (e.g., IoT, AI)

Technological innovation continues to transform the security landscape. In this episode, we examine how emerging technologies such as the Internet of Things (IoT), Art...

Episode 53: SCADA and Embedded System Security

Supervisory Control and Data Acquisition (SCADA) systems and embedded devices operate some of the most critical infrastructure in the world—from energy grids to transp...

Episode 54: Fault Tolerance, Redundancy, and High Availability

Downtime is not an option for mission-critical systems. In this episode, we dive into fault tolerance, redundancy, and high availability—design strategies that ensure ...

Episode 55: Network Architecture: LAN, WAN, Internet

Understanding how networks are built and connected is foundational for any security professional. In this episode, we review core network architecture concepts, includ...

Episode 56: OSI and TCP/IP Models Refresher

The OSI and TCP/IP models provide a layered approach to understanding how data is transmitted, received, and managed across networks. In this episode, we refresh your ...

Episode 57: Secure Protocols: HTTPS, SSH, SFTP, SNMPv3

Secure communication protocols form the backbone of protected digital environments. In this episode, we explore widely used secure protocols like HTTPS, SSH, SFTP, and...

Episode 58: Network Segmentation and Microsegmentation

Segmentation limits the spread of attacks and improves control over traffic flows within a network. In this episode, we examine both traditional network segmentation a...

Episode 59: Defense in Depth with Firewalls and DMZs

Layered security—known as defense in depth—is a core concept in cybersecurity architecture. This episode focuses on how firewalls and demilitarized zones (DMZs) serve ...

Episode 60: Intrusion Detection and Prevention Systems

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial for identifying and stopping threats in real time. This episode explores how these...

Broadcast by