All Episodes
Displaying 81 - 100 of 222 in total
Episode 81: Firewalls and Security Gateways (Domain 3)
Firewalls are one of the oldest and most trusted tools in network defense, but today’s environments require more than just simple packet filtering. In this episode, we...
Episode 82: Secure Communication and Remote Access (Domain 3)
As remote work and distributed systems become the norm, securing communication across potentially hostile networks is more important than ever. In this episode, we exp...
Episode 83: Advanced Secure Access Solutions (Domain 3)
Traditional perimeter security isn’t enough in a world of mobile users, cloud resources, and third-party integrations. In this episode, we explore advanced secure acce...
Episode 84: Selecting Effective Security Controls (Domain 3)
Choosing the right security controls is not about applying everything—it’s about applying the right things, in the right places, at the right time. This episode guides...
Episode 85: Data Types and Their Protection (Domain 3)
Data is not monolithic—its classification and context determine how it should be secured. In this episode, we explore different types of data, including regulated data...
Episode 86: Human vs. Non-human Readable Data (Domain 3)
Not all data is meant for human eyes, and in cybersecurity, understanding the distinction between human-readable and non-human-readable data formats is vital for apply...
Episode 87: Data Classification Strategies (Part 1) (Domain 3)
Data classification provides the foundation for applying security controls based on risk and sensitivity, and in this episode, we examine the first part of a two-part ...
Episode 88: Data Classification Strategies (Part 2) (Domain 3)
Building on the foundation from part one, this episode explores public and private data categories, the importance of policy-driven classification, and how to implemen...
Episode 89: General Data Considerations – States of Data (Domain 3)
Data security isn’t just about what kind of data you’re protecting—it’s also about when and where that data is at any given time. In this episode, we explore the three...
Episode 90: Data Sovereignty and Geolocation (Domain 3)
Where data physically resides has become a legal and operational priority for organizations operating in an increasingly globalized and regulated world. In this episod...
Episode 91: Methods to Secure Data (Part 1) (Domain 3)
Protecting data effectively starts with strong core methods that control access and visibility, and in this episode, we focus on geographic restrictions and encryption...
Episode 92: Methods to Secure Data (Part 2) (Domain 3)
Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In th...
Episode 93: Methods to Secure Data (Part 2) (Domain 3)
Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In th...
Episode 94: Methods to Secure Data (Part 3) (Domain 3)
In this final installment on data protection methods, we focus on segmentation and permission restrictions—two strategic approaches that limit both exposure and access...
Episode 95: High Availability and System Resilience (Domain 3)
Security isn’t just about keeping attackers out—it’s also about keeping services running when they try to bring you down. In this episode, we examine high availability...
Episode 96: Disaster Recovery Site Considerations (Domain 3)
Disaster recovery planning ensures that when critical infrastructure goes offline—whether due to cyberattack, natural disaster, or hardware failure—business operations...
Episode 97: Platform Diversity and Multi-cloud Architecture (Domain 3)
Relying on a single technology stack or vendor can introduce systemic risk, and in this episode, we explore how platform diversity and multi-cloud strategies enhance b...
Episode 98: Continuity of Operations and Capacity Planning (Domain 3)
Even the most secure systems are useless if they can’t operate under pressure, and this episode explores the intersection of cybersecurity with business resilience thr...
Episode 99: Comprehensive Testing for Resilience (Domain 3)
Preparation is only as good as its ability to withstand the unexpected, and resilience testing is how you find out whether your systems, processes, and people are trul...
Episode 100: Backup Strategies and Best Practices (Part 1) (Domain 3)
Backups form the last line of defense when everything else fails, and a good strategy turns potential disaster into a recoverable event. In this episode, we discuss co...