All Episodes

Displaying 121 - 137 of 137 in total

Episode 121: OWASP Top 10 Threats and Controls

The OWASP Top 10 is a widely recognized list of the most critical security risks to web applications. In this episode, we walk through each entry—from injection and br...

Episode 122: Buffer Overflows, SQL Injection, and Common Flaws

Many devastating cyberattacks originate from well-known coding flaws. This episode examines classic vulnerabilities including buffer overflows, SQL injection, and othe...

Episode 123: Security Testing: SAST, DAST, IAST

Security testing helps ensure software behaves as intended under hostile conditions. In this episode, we explore different application security testing methodologies, ...

Episode 124: Code Repositories and Access Controls

Source code repositories are central to modern software development—and to software security. This episode covers the security considerations for using platforms like ...

Episode 125: Configuration Management and CI/CD Pipelines

Secure development doesn't stop at writing code—it includes how that code is built, tested, and deployed. In this episode, we explore configuration management and cont...

Episode 126: Version Control and Code Integrity

Version control systems track changes to code—but they also need to be protected themselves. This episode explores how tools like Git help enforce code integrity, coll...

Episode 127: Application Whitelisting and Sandboxing

Not all applications should be allowed to run in your environment. This episode explores application control mechanisms like whitelisting and sandboxing. You'll learn ...

Episode 128: Mobile Application Security and Reverse Engineering

Mobile apps introduce unique risks due to their widespread use, diverse platforms, and limited control over user devices. In this episode, we explore mobile app securi...

Episode 129: Secure APIs and Service Integration

APIs enable system integration but can expose your infrastructure to serious vulnerabilities if not secured properly. This episode focuses on how to design and manage ...

Episode 130: DevSecOps Culture and Continuous Assurance

DevSecOps is not just a toolset—it’s a culture that integrates security into every phase of the software development lifecycle. In this episode, we explore how DevSecO...

Episode 131: Top 10 Hardest CISSP Concepts Demystified

Some CISSP topics consistently challenge even experienced professionals. In this episode, we break down ten of the most difficult concepts on the exam—ranging from cry...

Episode 135: Memory Tricks and Mnemonics for the CISSP

With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym exp...

Episode 136: How to Deconstruct CISSP Questions

CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find th...

Episode 137: Understanding "Best", "First", and "Most Likely" Wording

CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropri...

Episode 138: Adaptive Testing Tips and Time Management

The CISSP exam uses Computerized Adaptive Testing (CAT), which means question difficulty and test length vary based on your performance. In this episode, we demystify ...

Episode 139: What Comes After the CISSP: Career and Certification Roadmap

Earning your CISSP opens new doors—but where you go next depends on your goals. In this episode, we explore the post-CISSP landscape, including leadership roles like C...

Episode 140: What to Do If You Fail the CISSP

Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass th...

Broadcast by