All Episodes
Displaying 101 - 120 of 222 in total
Episode 101: Backup Strategies and Best Practices (Part 2) (Domain 3)
Continuing our discussion on backups, this episode explores encryption, snapshots, and backup lifecycle management—three critical components of a secure, efficient, an...
Episode 102: Data Recovery Techniques (Domain 3)
Backups are only half of the story—the other half is how effectively you can recover from them. In this episode, we focus on data recovery techniques that turn dormant...
Episode 103: Power Resilience and Continuity (Domain 3)
Without reliable power, even the most secure systems are at risk of failure—and in many environments, loss of power is both a security and safety issue. In this episod...
Episode 104: Introduction to Domain Four — Security Operations
If Domains One through Three are about understanding the principles and design of cybersecurity, then Domain Four is about the actual day-to-day work that keeps system...
Episode 105: Secure Baselines and System Management (Domain 4)
Establishing a secure baseline is one of the most fundamental—and often overlooked—steps in managing system security. In this episode, we explain how baselines define ...
Episode 106: Hardening Computing Resources (Part 1) (Domain 4)
Hardening is the practice of stripping down systems to only what they need to function securely, and this episode focuses on doing just that for mobile devices, workst...
Episode 107: Hardening Computing Resources (Part 2) (Domain 4)
Continuing our discussion on hardening, this episode shifts focus to cloud infrastructure, servers, and industrial systems—each of which requires a tailored approach b...
Episode 108: Hardening Embedded Systems and IoT Devices (Domain 4)
Embedded systems and IoT devices often operate in environments where security is either underprioritized or extremely difficult to implement, making them prime targets...
Episode 109: Securing Wireless Networks (Part 1) (Domain 4)
Wireless networks offer convenience, but they also expand the attack surface by broadcasting connectivity beyond physical boundaries, making them inherently riskier th...
Episode 110: Securing Mobile Solutions (Domain 4)
Mobile devices have become indispensable for productivity, but they also introduce unique security challenges due to their portability, connectivity, and often persona...
Episode 111: Securing Mobile Connectivity (Domain 4)
Mobile devices connect through a variety of channels—cellular networks, Wi-Fi, and Bluetooth—each with its own risks and requirements for secure operation. In this epi...
Episode 112: Advanced Wireless Security Techniques (Domain 4)
As wireless threats become more sophisticated, organizations must move beyond basic security measures and implement advanced techniques to protect access points and us...
Episode 113: Application Security Essentials (Domain 4)
Applications are often the most exposed layer of an organization’s attack surface, and defending them requires both proactive development practices and reactive protec...
Episode 114: Isolation and Monitoring Techniques (Domain 4)
Isolation and monitoring form a defensive pairing that not only limits the spread of threats but enables rapid detection and response. In this episode, we discuss isol...
Episode 115: Acquisition and Procurement Security (Domain 4)
Security doesn’t start when a system is installed—it begins during the procurement process. In this episode, we examine how secure acquisition strategies reduce long-t...
Episode 116: Assignment, Ownership, and Classification (Domain 4)
To manage risk effectively, organizations must know what they own, who is responsible for it, and how critical it is—this is the basis of asset assignment, ownership, ...
Episode 117: Asset Monitoring and Tracking (Domain 4)
Security begins with visibility, and that means knowing what devices, systems, and software exist within your environment at all times. In this episode, we dive into a...
Episode 118: Secure Asset Disposal and Decommissioning (Domain 4)
When assets reach the end of their lifecycle, they don’t just disappear—they become potential liabilities if not securely decommissioned. In this episode, we explore t...
Episode 119: Data Retention and Secure Management Practices (Domain 4)
Data retention policies define what data must be kept, for how long, and under what security controls—and when they’re done right, they strike a balance between legal ...
Episode 120: Vulnerability Identification Methods (Part 1) (Domain 4)
Finding vulnerabilities before attackers do is a core function of modern cybersecurity, and this episode explores the technical methods used to identify them early and...