Cyber Talks: Phishing in the Age of Agentic AI: Craig Taylor on Culture, Literacy, and the New Human Firewall
In my Cyber Talks conversation with Craig Taylor the co-founder and CEO of CyberHoot, we dive into a problem that is evolving faster than most organizations can keep up: phishing in the age of agentic AI. Cyber Talks, developed by BareMetalCyber.com, is all about learning from practitioners who are pushing the field forward, and Craig has spent three decades on the front lines of security, risk, and cyber literacy. If you lead security, IT, or risk, the video above is worth a careful watch—because the phishing problem you think you have is not the one you’re actually facing today.
--------
55:35
--------
55:35
Email Is Your Unpatchable Legacy App
In this episode, we explore why email is both the oldest and most dangerous application in your enterprise. You’ll learn how protocols built in the 1970s still carry modern business logic, why attackers thrive on its openness, and how Business Email Compromise has evolved into one of the most profitable cybercrimes in history. The discussion traces the history of email’s insecure DNA, the patchwork of fixes that never quite solve it, and the cultural and regulatory anchors that make it impossible to abandon.Listeners will come away with sharper skills in evaluating email risk, recognizing the tactics adversaries use to exploit trust, and applying pragmatic controls that actually reduce exposure. You’ll understand how to treat email like a critical application, design workflows that resist fraud, and build governance that prevents small compromises from becoming catastrophic losses. This is not just theory—it’s a roadmap for defending the unpatchable app every organization depends on.Produced by BareMetalCyber.com.
--------
28:28
--------
28:28
Insight: How CVEs and CVSS Turn Vulnerabilities into Decisions
Understanding vulnerability data can feel like learning a new language, especially when every report is packed with identifiers and scores. In this narrated Insight, we walk through the relationship between software vulnerabilities, Common Vulnerabilities and Exposures (CVE), and the Common Vulnerability Scoring System (CVSS). You will hear how vulnerabilities move from discovery to public CVE records, how CVSS scores are calculated, and why those numbers show up in dashboards, tickets, and board reports. The narration is based on the Tuesday “Insights” feature from Bare Metal Cyber Magazine and is designed for working security and IT professionals who want clear, vendor-neutral explanations. We then shift to everyday practice: how teams actually use CVE and CVSS in vulnerability management, where these tools genuinely help, and where they can mislead if treated as the whole story. You will hear practical examples of quick-win prioritization for smaller teams, as well as more advanced ways to combine scores with asset criticality and threat activity. We also explore common failure modes, such as chasing scores instead of real risk, and highlight healthier signals that show your vulnerability data is driving better decisions. By the end, you will have a grounded mental model for reading those lists of IDs and scores with more confidence.
--------
14:38
--------
14:38
Certified Monday: Seeing Systems Like an Auditor with the CISA Certification
This episode walks through the Certified Information Systems Auditor (CISA) certification in clear, beginner-friendly language, focusing on what it really means to think like an IT auditor. You will hear how CISA frames technology in terms of controls, evidence, and risk, and why that perspective matters if you want to move closer to audit, governance, or technology risk roles. The narration is based on my Monday “Certified” feature from Bare Metal Cyber Magazine, so you get the same structured breakdown in an audio format that fits into a busy day. We will cover who CISA is really for, what the exam emphasizes, and how it fits into a broader career and certification path for early-career cyber and IT professionals. You will also hear practical ideas on preparing for the exam, from understanding the domains and question style to building a simple, sustainable study plan that fits around work and life. If you want to go deeper, you can continue your journey with the full audio course for this certification inside the Bare Metal Cyber Audio Academy.
--------
11:25
--------
11:25
Weekly Cyber News Rollup, December 5th, 2025
This is your weekly cyber news roll-up for the week ending December 5th, 2025. Holiday shopping dominates the threat landscape, with industrial scale fake Christmas and Cyber Monday stores siphoning card data while a massive breach at Korean retail giant Coupang exposes tens of millions of shoppers. At the same time, attackers are burrowing into the software factory, from exposed secrets in cloud code repositories and malicious developer packages to tainted browser extensions that quietly spy on everyday work in customer relationship, finance, and human resources tools. Law enforcement’s takedown of a major crypto mixer shows real pressure on ransomware cash washing, even as mobile devices and airport Wi Fi remind leaders how fragile everyday access can be.Across the episode, you will hear how attackers exploit hurry, convenience, and shared platforms in very different settings, from North Korean software supply chain campaigns and steganography tools built for espionage, to vendor breaches at financial data providers and cross tenant flaws in cloud services. We explore how weak artificial intelligence governance and powerful low code workflows can be twisted into ransomware launchers, how fake ChatGPT style browsers steal passwords at scale, and why critical bugs in React based web stacks demand rapid attention from builders. Executives, security teams, engineers, and students all get practical context on where trust is eroding and which signals to watch in logs, workflows, and vendor relationships. This weekly roll-up is designed to help you decide what to act on first, and it is available at DailyCyber.news.
Welcome to Bare Metal Cyber, the podcast that bridges cybersecurity and education in a way that’s engaging, informative, and practical. Hosted by Dr. Jason Edwards, a seasoned cybersecurity expert and educator, this weekly podcast brings to life the insights, tips, and stories from his widely-read LinkedIn articles. Each episode dives into pressing cybersecurity topics, real-world challenges, and actionable advice to empower professionals, educators, and learners alike. Whether navigating the complexities of cyber defense or looking for ways to integrate cybersecurity into education, Bare Metal Cyber delivers valuable perspectives to help you stay ahead in an ever-evolving digital world. Subscribe and join the thousands already benefiting from Jason’s expertise!