Powered by RND
PodcastsEducationBare Metal Cyber

Bare Metal Cyber

Dr. Jason Edwards
Bare Metal Cyber
Latest episode

Available Episodes

5 of 55
  • Cyber Talks - Break Things Safely: A High-Value Cyber Exercise Program with Daniel Hammond
    Don’t wait to learn the fire drill while the building’s on fire. In this Cyber Talk developed by BareMetalCyber.com, Army veteran and cyber resilience strategist Daniel Hammond shows how to move past check-the-box drills and turn exercises into a core learning culture. He walks through goal-driven planning (so every exercise serves a sponsor’s real need), the HSEEP spectrum from seminars and workshops to tabletops, drills, and full-scale events, plus when to go operations-based, run no-notice tests, and invite regulators, comms, and third-party partners into the room. Daniel shares hard-won lessons from building programs at Fortune 500s: validating response playbooks, avoiding “single-layer defense” with purple teaming, closing gaps regulators spot across your industry, and using board briefings to turn findings into funding. If you lead incident response, risk, or compliance—and you want confident teams that discover blind spots before adversaries do—this talk is for you. Join us, bring questions, and leave with practical patterns you can run this quarter.
    --------  
    48:05
  • XDR, EDR, NDR, MDR, WTF-DR?
    In this episode, we cut through the alphabet soup of cybersecurity—EDR, NDR, XDR, MDR, and even the tongue-in-cheek WTF-DR. You’ll learn what each of these acronyms really means, how they differ, and where they overlap. More importantly, you’ll gain clarity on how they fit together in practice, why no single tool is enough, and how to build a layered defense without wasting budget on hype. Through clear explanations and vivid scenarios, the episode brings order to the chaos of detection and response technologies.Listening will sharpen your ability to evaluate tools, vendors, and services with confidence. You’ll improve your skills in mapping security investments to real outcomes, spotting hidden gaps in coverage, and asking the right questions about integration, costs, and response workflows. Whether you’re a security leader, analyst, or simply navigating the jargon jungle, this episode equips you to separate buzzwords from business value.Produced by BareMetalCyber.com.
    --------  
    29:01
  • Weekly Cyber News Rollup, November 14th, 2025
    This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under pressure from well funded attackers who prefer to move quietly. You will hear how new spyware campaigns abuse Samsung devices and WhatsApp features, while hotel and travel scams blend real booking details with fresh malware delivery. The episode also walks through developer and infrastructure risks, from poisoned code editor extensions to critical flaws in firewalls and container platforms that can turn one foothold into broad access. It all adds up to a week where leaders and defenders need to rethink how personal devices, travel workflows, and cloud control planes intersect in daily operations.Across these stories you will move from data exposure at an artificial intelligence company ecosystem to massive breach data feeds landing in tracking services, and from long running espionage inside a policy nonprofit to new tools that help small businesses fight review extortion. Executives will gain a faster sense of which threats can disrupt revenue and trust, while security teams hear where to focus monitoring, patching, and multi factor authentication, M F A, improvements right now. Builders and cloud operators get practical insight into container escape flaws, risky extensions, and identity platform weaknesses that change how they should think about shared environments. Students and early career defenders can use the narrative to map how scams, espionage, and infrastructure bugs all connect in real attacks. Listen in to get the full story arc in one pass, available at DailyCyber.news.
    --------  
    12:15
  • Phishing ‘Hunger Games’: May the Odds Be Ever in Your Favor (They Aren’t)
    In this episode, we explore phishing as a rigged arena where attackers decide the rules and employees become the unwilling contestants. You’ll learn how phishing has evolved from clumsy spam into precision-engineered deception powered by AI, reverse proxies, and multi-channel choreography. We unpack the psychology that adversaries exploit—urgency, authority, and scarcity—and show how identity protections, layered defenses, and cultural shifts can flip the script. From role-specific vulnerabilities to the industrialization of phishing kits, this episode equips you with a clear view of the battlefield and the tools needed to navigate it.Listening also sharpens practical skills that directly improve resilience. You’ll gain insight into recognizing subtle red flags across devices and platforms, understanding the tactics that bypass traditional MFA, and adopting verification habits that make the safe path the easiest one. Beyond individual awareness, the episode builds leadership and organizational skills: how to embed verification into workflows, design effective simulations, and foster a culture where reporting is rewarded. By the end, you’ll see how to shift the odds, not by chance, but by readiness. Produced by BareMetalCyber.com.
    --------  
    31:06
  • Weekly Cyber News Rollup, November 7th, 2025
    This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed backup theft, and Conduent revealed exposure of over ten million personal records. From telecom networks to government mail servers, the week showed how attackers are targeting both the perimeter and the core of modern systems.Listeners will hear twenty-five stories that define the shifting threat landscape — from router implants and cloud misconfigurations to insider indictments and major ransomware playbooks. Each segment stays focused on what happened, who was affected, and why it matters to defenders and decision-makers. The narrated version of this full report is available anytime at DailyCyber.news.
    --------  
    16:03

More Education podcasts

About Bare Metal Cyber

Welcome to Bare Metal Cyber, the podcast that bridges cybersecurity and education in a way that’s engaging, informative, and practical. Hosted by Dr. Jason Edwards, a seasoned cybersecurity expert and educator, this weekly podcast brings to life the insights, tips, and stories from his widely-read LinkedIn articles. Each episode dives into pressing cybersecurity topics, real-world challenges, and actionable advice to empower professionals, educators, and learners alike. Whether navigating the complexities of cyber defense or looking for ways to integrate cybersecurity into education, Bare Metal Cyber delivers valuable perspectives to help you stay ahead in an ever-evolving digital world. Subscribe and join the thousands already benefiting from Jason’s expertise!
Podcast website

Listen to Bare Metal Cyber, The Mel Robbins Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Bare Metal Cyber: Podcasts in Family

Social
v7.23.13 | © 2007-2025 radio.de GmbH
Generated: 11/21/2025 - 8:35:00 AM