All Episodes

Displaying 61 - 80 of 222 in total

Episode 61: Patching and Encryption (Domain 2)

Patching and encryption are two of the most basic yet essential components of any security strategy—one protects against known vulnerabilities, the other safeguards da...

Episode 62: Monitoring and Least Privilege (Domain 2)

Monitoring and the principle of least privilege are two complementary pillars of proactive cybersecurity, enabling both visibility and access limitation. In this episo...

Episode 63: Configuration Enforcement and Decommissioning (Domain 2)

Keeping systems secure isn’t just about building them right—it’s about making sure they stay that way, and knowing how to shut them down properly when they’re no longe...

Episode 64: System Hardening Techniques (Part 1) (Domain 2)

System hardening is about reducing the attack surface by eliminating unnecessary features, closing open ports, and enforcing strict policies across endpoints, servers,...

Episode 65: System Hardening Techniques (Part 2) (Domain 2)

Continuing our exploration of system hardening, this episode focuses on host-based firewalls and intrusion prevention systems (HIPS), which defend individual devices b...

Episode 66: System Hardening Techniques (Part 3) (Domain 2)

In the final part of our system hardening series, we tackle some of the most overlooked but impactful practices: disabling unnecessary ports and services, replacing de...

Episode 67: Introduction to Domain Three — Security Architecture

Cybersecurity isn’t just about stopping threats as they happen—it’s also about designing systems that are harder to attack in the first place. And that’s the focus of ...

Episode 68: Cloud Architecture and Responsibilities (Domain 3)

Cloud computing changes the game for infrastructure design and security responsibility, requiring organizations to understand not just how services work—but who is acc...

Episode 69: Network Infrastructure Security Models (Domain 3)

Modern networks are no longer simple, flat environments—they are segmented, layered, and increasingly software-defined. In this episode, we explore different infrastru...

Episode 70: On-Premises, Centralized, and Decentralized Architectures (Domain 3)

Security must adapt to the architecture of the environment it protects, and that starts with understanding how infrastructure is organized. In this episode, we compare...

Episode 71: Specialized Architecture Models (Domain 3)

Some systems require specialized architectural models due to their operational roles, legacy constraints, or real-time performance needs. In this episode, we examine s...

Episode 72: High Availability Architectures (Domain 3)

Availability is one of the core tenets of cybersecurity, and in mission-critical environments, downtime is simply not an option. In this episode, we focus on high avai...

Episode 73: Architecture Security Considerations (Part 1) (Domain 3)

Designing secure systems means weighing a variety of architectural considerations, and in this episode, we begin by focusing on availability, resilience, and cost. We ...

Episode 74: Architecture Security Considerations (Part 2) (Domain 3)

Responsiveness, scalability, and ease of deployment are three more pillars that heavily influence secure architecture decisions, especially in environments where adapt...

Episode 75: Architecture Security Considerations (Part 3) (Domain 3)

In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compu...

Episode 76: Infrastructure Security Foundations (Domain 3)

Securing infrastructure starts with design decisions about where and how devices are placed, how data flows, and where trust boundaries begin and end. In this episode,...

Episode 77: Connectivity and Failure Modes (Domain 3)

Connectivity powers modern organizations, but with it comes risk—especially when failure modes are not considered in the security design. In this episode, we explore w...

Episode 78: Device Attributes and Network Appliances (Domain 3)

Security isn’t just about policies and firewalls—it’s also about the capabilities and placement of the physical and virtual devices enforcing them. In this episode, we...

Episode 79: Load Balancers and Sensors (Domain 3)

Load balancers and network sensors are often associated with performance and visibility—but they are just as critical to your security architecture. In this episode, w...

Episode 80: Port Security and Authentication Protocols (Domain 3)

Every port on your network is a potential doorway, and port security ensures those doors stay locked unless explicitly authorized. In this episode, we examine how tech...

Broadcast by