Powered by RND
PodcastsEducationBare Metal Cyber

Bare Metal Cyber

Dr. Jason Edwards
Bare Metal Cyber
Latest episode

Available Episodes

5 of 62
  • Cyber Talks: Excel Is Not Your GRC Solution: Scaling Governance Beyond Spreadsheets
    Excel is great for many things — but it is not a governance, risk, and compliance (GRC) platform. In this Cyber Talk developed by BareMetalCyber.com, Dr. Jason Edwards sits down with Dean Charlton, Managing Director of DC CyberTech, to unpack why even the most well-intentioned GRC programs stall out when they live in spreadsheets.Dean walks through the real-world pain points of “Excel-driven” GRC, from version chaos and manual updates to audit gaps and poor visibility for leadership. He then shows how automated, AI-driven GRC solutions can support organizations of all sizes, giving you cleaner data, clearer accountability, and a living view of risk instead of static files.If you’re still managing controls, risks, and audits in Excel — or you’re afraid a full-blown platform is “too big” for your team — this session will give you practical ways to think differently about tooling, scalability, and where AI can actually help.
    --------  
    48:26
  • Shadow SaaS: 1,000 Apps, 0 Approvals, Unlimited Risk
    In this episode, we pull back the curtain on Shadow SaaS—the hidden world of unsanctioned apps quietly multiplying across the enterprise. You’ll learn how a single “Sign in with Google” click can spawn a durable, invisible connection, why OAuth tokens never seem to die, and how browser extensions and plug-ins form entire shadow ecosystems. We trace the blast radius from data leaks to compliance failures, and show how discovery pipelines, technical guardrails, and smart workflows can expose the sprawl without slowing innovation.By listening, you’ll sharpen your ability to spot the signs of Shadow SaaS in your own environment, build stronger instincts around risk-based discovery, and gain practical strategies for token management, data protection, and cultural alignment. You’ll walk away with skills to govern SaaS without becoming the “department of no,” turning hidden risk into managed resilience. This episode equips you to secure speed and innovation hand in hand.Produced by BareMetalCyber.com.
    --------  
    28:32
  • Insight: Cyber Kill Chain and Attack Lifecycles
    This narrated Insight walks through the Cyber Kill Chain (CKC) and broader cyber attack lifecycle models as practical tools for real-world defenders. You’ll hear how CKC breaks an intrusion into recognizable stages, from reconnaissance to actions on objectives, and how that gives analysts and engineers a common storyline for messy, real-world incidents. The audio stays vendor-neutral and plain-language, focusing on how to connect alerts, logs, and behaviors to a clear sense of “where in the attacker’s journey are we right now?”You’ll also explore everyday use cases, from tuning detections and building playbooks to running more realistic tabletops and making smarter architecture and budget decisions. Along the way, the episode examines benefits, trade-offs, and common failure modes, like treating the Cyber Kill Chain as a slideware checkbox instead of an operational lens. This narration is developed from the Tuesday “Insights” feature in Bare Metal Cyber Magazine, giving you a concise, audio-first way to absorb the full breakdown.
    --------  
    10:37
  • Certified: CompTIA Security+ as Your Cybersecurity Launchpad
    Step into the world of CompTIA Security+ (Security+) with this narrated guide designed for early-career technologists and career-changers. This episode explains what Security+ actually covers, who it is really for, and why so many entry-level security and IT roles call it out by name. You will hear how the exam objectives translate into real skills around threats, defenses, secure design, and day-to-day operations, all in clear, plain English. The narration is based on my Monday “Certified” feature from Bare Metal Cyber Magazine, adapted for audio so you can follow along without needing the article in front of you. We also explore where Security+ fits in a broader certification and career path, from help desk and junior admin roles through security analyst and SOC positions. You will learn how the exam rewards applied understanding over flashcard memorization, what common misconceptions trip up candidates, and how to think about your next steps once you pass. If you are ready to go deeper and follow a structured, step-by-step study plan, you can continue with the full audio course for Security+ inside the Bare Metal Cyber Audio Academy.
    --------  
    12:11
  • Weekly Cyber News Rollup, November 28th, 2025
    This is your weekly cyber news roll-up for the week ending November 27th, 2025. This week revolves around quiet dependencies turning into loud problems, from abandoned calendar links that can be hijacked to analytics and customer platforms leaking sensitive context. You will hear about a breach at an OpenAI analytics vendor that exposes who is building on artificial intelligence, A I, projects and a ransomware hit on Asahi and Iberia that mixes large data leaks with operational disruption and reputational damage. Developers face a heavy supply chain week as poisoned npm packages, GitHub workflows, and a self spreading JavaScript worm target build systems and secrets. At the same time, flaws in logging agents, emergency alert platforms, and Ray powered A I clusters show how core infrastructure can be hijacked for stealth access, cryptomining, or simply going dark when people need it most. Across the full set of stories, the focus is on how attackers exploit trusted tools and identity layers that many teams treat as background plumbing. You will hear how spyware vendors are turning secure messaging users into targets, how years of pasting code into online tools has quietly exposed live credentials, and how flaws in Oracle identity, Azure Bastion, and Grafana can hand over powerful access with a few crafted requests. Website and endpoint risks also feature, from W three Total Cache and FortiWeb to seven zip, reminding teams that small utilities and plugins can still open big doors. The episode is designed for executives, security teams, builders, and students who need a fast weekly sweep of the real attack surface, stitched across cloud, identity, and software factories, available at DailyCyber.news. By the end, you will have a clear sense of where your own quiet dependencies might be hiding.
    --------  
    19:10

More Education podcasts

About Bare Metal Cyber

Welcome to Bare Metal Cyber, the podcast that bridges cybersecurity and education in a way that’s engaging, informative, and practical. Hosted by Dr. Jason Edwards, a seasoned cybersecurity expert and educator, this weekly podcast brings to life the insights, tips, and stories from his widely-read LinkedIn articles. Each episode dives into pressing cybersecurity topics, real-world challenges, and actionable advice to empower professionals, educators, and learners alike. Whether navigating the complexities of cyber defense or looking for ways to integrate cybersecurity into education, Bare Metal Cyber delivers valuable perspectives to help you stay ahead in an ever-evolving digital world. Subscribe and join the thousands already benefiting from Jason’s expertise!
Podcast website

Listen to Bare Metal Cyber, The Rich Roll Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Bare Metal Cyber: Podcasts in Family

  • Podcast Certified - The CompTIA A+ Audio Course
    Certified - The CompTIA A+ Audio Course
    Technology, Education, Courses
Social
v8.0.7 | © 2007-2025 radio.de GmbH
Generated: 12/5/2025 - 8:11:02 AM