Bare Metal Cyber
Episodes
SOC Pager Olympics: Gold Medal in 3 A.M. False Alarms
31 Dec 2025
Contributed by Lukas
In this episode, we break down the reality of the SOC Pager Olympics—the endless cycle of 3 a.m. wake-ups triggered by false alarms. You’ll hear h...
Network Segmentation Without the Buzzword Fog
30 Dec 2025
Contributed by Lukas
When your network still feels like one big open floor plan, a single compromised device can turn into a building-wide fire. In this audio companion to...
Certified: Monday: PCI Professional (PCIP) – Learning to Speak the Language of PCI DSS
29 Dec 2025
Contributed by Lukas
This episode walks you through the PCI Professional (PCIP) certification in clear, everyday language. We start with what PCIP is designed to prove, wh...
SBOM & Chill: You Don’t Need Every Ingredient—Just the Allergens
24 Dec 2025
Contributed by Lukas
In this episode, we strip away the noise surrounding Software Bills of Materials and reframe them through a fresh lens: allergens. Instead of drowning...
Insight: Asset Inventory Basics for Real-World Defenders
23 Dec 2025
Contributed by Lukas
In this narrated Insight, we unpack cyber asset inventory as the quiet backbone of a modern security program. You will hear what cyber asset inventory...
Certified: How CCISO Signals You’re Ready for Executive Security Leadership
22 Dec 2025
Contributed by Lukas
The Certified Chief Information Security Officer (CCISO) exam is built for security leaders who are ready to move from running tools to running a prog...
Cyber Talks: Tracking School Swatters and Shooters: Turning Online Leakage Into Action with Detective Richard Wistocki
18 Dec 2025
Contributed by Lukas
In my conversation with Detective Richard Wistocki (Ret.), we talked candidly about a reality that many school leaders and law enforcement professio...
Tabletop Telenovela: Turning Your IR Plan into a Drama People Remember
17 Dec 2025
Contributed by Lukas
In this episode, you’ll learn how to transform a traditional, forgettable tabletop exercise into something unforgettable: a telenovela. We explore h...
Insight: Turning Patch and Update Management into a Strength
16 Dec 2025
Contributed by Lukas
Patch and update management rarely makes headlines, but it quietly determines how exposed your environment really is. In this audio Insight, we walk t...
Certified: Stepping Into Security Leadership with CISM
15 Dec 2025
Contributed by Lukas
This episode takes you inside the world of the Certified Information Security Manager (CISM), a certification that helps professionals grow from hands...
Cyber Talks: Phishing in the Age of Agentic AI: Craig Taylor on Culture, Literacy, and the New Human Firewall
11 Dec 2025
Contributed by Lukas
In my Cyber Talks conversation with Craig Taylor the co-founder and CEO of CyberHoot, we dive into a problem that is evolving faster than most organiz...
Email Is Your Unpatchable Legacy App
10 Dec 2025
Contributed by Lukas
In this episode, we explore why email is both the oldest and most dangerous application in your enterprise. You’ll learn how protocols built in the ...
Insight: How CVEs and CVSS Turn Vulnerabilities into Decisions
09 Dec 2025
Contributed by Lukas
Understanding vulnerability data can feel like learning a new language, especially when every report is packed with identifiers and scores. In this na...
Certified Monday: Seeing Systems Like an Auditor with the CISA Certification
08 Dec 2025
Contributed by Lukas
This episode walks through the Certified Information Systems Auditor (CISA) certification in clear, beginner-friendly language, focusing on what it re...
Weekly Cyber News Rollup, December 5th, 2025
05 Dec 2025
Contributed by Lukas
This is your weekly cyber news roll-up for the week ending December 5th, 2025. Holiday shopping dominates the threat landscape, with industrial scale ...
Cyber Talks: Excel Is Not Your GRC Solution: Scaling Governance Beyond Spreadsheets
04 Dec 2025
Contributed by Lukas
Excel is great for many things — but it is not a governance, risk, and compliance (GRC) platform. In this Cyber Talk developed by BareMetalCyber.com...
Shadow SaaS: 1,000 Apps, 0 Approvals, Unlimited Risk
03 Dec 2025
Contributed by Lukas
In this episode, we pull back the curtain on Shadow SaaS—the hidden world of unsanctioned apps quietly multiplying across the enterprise. You’ll l...
Insight: Cyber Kill Chain and Attack Lifecycles
02 Dec 2025
Contributed by Lukas
This narrated Insight walks through the Cyber Kill Chain (CKC) and broader cyber attack lifecycle models as practical tools for real-world defenders. ...
Certified: CompTIA Security+ as Your Cybersecurity Launchpad
01 Dec 2025
Contributed by Lukas
Step into the world of CompTIA Security+ (Security+) with this narrated guide designed for early-career technologists and career-changers. This episod...
Weekly Cyber News Rollup, November 28th, 2025
28 Nov 2025
Contributed by Lukas
This is your weekly cyber news roll-up for the week ending November 27th, 2025. This week revolves around quiet dependencies turning into loud problem...
Zero Trust Theater: We Put a Fancy Gate on a Cardboard Wall
26 Nov 2025
Contributed by Lukas
In this episode, we uncover the reality of “Zero Trust theater”—where organizations invest in flashy front gates like MFA prompts, dashboards, a...
Weekly Update: Cyber News for the Week ending 21 November, 2025
21 Nov 2025
Contributed by Lukas
This is your weekly cyber news roll-up for the week ending November 21st, 2025. We track a crippling cyberattack on a major automaker that shut factor...
Cyber Talks - Break Things Safely: A High-Value Cyber Exercise Program with Daniel Hammond
20 Nov 2025
Contributed by Lukas
Don’t wait to learn the fire drill while the building’s on fire. In this Cyber Talk developed by BareMetalCyber.com, Army veteran and cyber resili...
XDR, EDR, NDR, MDR, WTF-DR?
19 Nov 2025
Contributed by Lukas
In this episode, we cut through the alphabet soup of cybersecurity—EDR, NDR, XDR, MDR, and even the tongue-in-cheek WTF-DR. You’ll learn what each...
Weekly Cyber News Rollup, November 14th, 2025
14 Nov 2025
Contributed by Lukas
This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under p...
Phishing ‘Hunger Games’: May the Odds Be Ever in Your Favor (They Aren’t)
12 Nov 2025
Contributed by Lukas
In this episode, we explore phishing as a rigged arena where attackers decide the rules and employees become the unwilling contestants. You’ll learn...
Weekly Cyber News Rollup, November 7th, 2025
08 Nov 2025
Contributed by Lukas
This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge in...
The Cult of the Dashboard: Vanity Metrics Anonymous
05 Nov 2025
Contributed by Lukas
In this episode, The Cult of the Dashboard: Vanity Metrics Anonymous, we expose the seductive world of flashy dashboards and meaningless numbers. List...
Weekly Cyber News Rollup, October 31st, 2025
31 Oct 2025
Contributed by Lukas
This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency f...
Patch Tuesday, Breach Wednesday
29 Oct 2025
Contributed by Lukas
In this episode of Bare Metal Cyber, we break down the monthly ritual every security team knows too well: Patch Tuesday. You’ll learn why the very a...
Weekly Cyber News Rollup, October 24th, 2025
24 Oct 2025
Contributed by Lukas
This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under ...
GenAI Policy Mad Libs: ‘Don’t Paste {Sensitive Thing} into {Cool Bot}’
22 Oct 2025
Contributed by Lukas
In this episode, we unpack why the popular slogan “don’t paste {Sensitive Thing} into {Cool Bot}” has become the lazy default for GenAI policy—...
Weekly Cyber News Rollup, October 17th, 2025
17 Oct 2025
Contributed by Lukas
The Bare Metal Cyber — Friday Edition is your end-of-week cybersecurity intelligence wrap, turning five days of breaking threats into one fast, acti...
Shrodingers Firewall
15 Oct 2025
Contributed by Lukas
In this episode, we dive into the unsettling paradox of Schrödinger’s Firewall—where your data is both safe and already compromised in the loomin...
Trailer
14 Oct 2025
Contributed by Lukas
Weekly Cyber News Rollup, October 10th, 2025
10 Oct 2025
Contributed by Lukas
This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion ...
When Zero Trust Meets Zero Patience
08 Oct 2025
Contributed by Lukas
In this episode, we take on the fatigue that often comes with Zero Trust—those endless logins, rigid rules, and culture-draining compliance routines...
Weekly Cyber News Rollup, October 3rd, 2025
03 Oct 2025
Contributed by Lukas
This is the Friday Rollup for September 29th through October 3rd, 2025. It was a week of edge-device pressure, identity weak spots, and evolving email...
Crypto or Consequences
01 Oct 2025
Contributed by Lukas
Ransomware is no longer just about malicious code—it’s about business models, negotiation tactics, and the psychology of fear. In this episode, we...
Your MFA Is Not Two-Factor—It’s SMS and a Prayer
24 Sep 2025
Contributed by Lukas
In this episode, we expose the illusion of security created by SMS-based multi-factor authentication. Listeners will learn why text-message codes fail...
Glitched on Arrival: When AI Learns the Wrong Lessons
27 Aug 2025
Contributed by Lukas
In this episode, we explore the strange yet critical world of adversarial machine learning—where tiny, unseen manipulations can fool AI systems into...
Will AI trigger the First White Collar Recession?
20 Aug 2025
Contributed by Lukas
Will AI trigger the first white-collar recession—or just change what those jobs look like? This episode follows the quiet early tells—executive hi...
Keyboard Assassins: Inside the Covert World of State-Sponsored Cyber Sabotage
13 Aug 2025
Contributed by Lukas
In this episode of BareMetalCyber, we delve into the shadowy world of state-sponsored cyber sabotage, examining how nations increasingly leverage digi...
Ctrl+Alt+Comply: The Wild World of Cyber Regulations
06 Aug 2025
Contributed by Lukas
In this episode of BareMetalCyber, we narrate the article Ctrl+Alt+Comply: The Wild World of Cyber Regulations, taking you through the tangled web of ...
When Smart Gets Sinister: Taming the IoT Rebellion
30 Jul 2025
Contributed by Lukas
In today's episode, we dive into the dark side of our increasingly connected world, exploring how ordinary IoT devices—like coffee makers, fish tank...
From LOLs to Lateral Movement: Securing ChatOps
23 Jul 2025
Contributed by Lukas
In today's episode, we explore how ChatOps—the integration of collaboration and operations through platforms like Slack and Teams—has reshaped mod...
Click Less, Protect More: Building Your Office’s Human Firewall
16 Jul 2025
Contributed by Lukas
In today's episode, we're tackling one of cybersecurity's biggest challenges: the human factor. Employees, often considered the weakest link in an org...
Firewalls and Frontlines: Cybersecurity in the Age of Digital Warfare
09 Jul 2025
Contributed by Lukas
In this episode of BareMetalCyber, we dive deep into the emerging frontlines of digital warfare, where traditional weapons have given way to malicious...
Inside Job: Profiling the Mind of an Insider Threat
02 Jul 2025
Contributed by Lukas
In today's episode, we explore one of the most challenging cybersecurity issues organizations face—the insider threat. Unlike external cyberattacks,...
Seeing is Deceiving: Preparing for the Deepfake Cyber Threat
25 Jun 2025
Contributed by Lukas
In today's episode, we dive deep into the sinister and rapidly evolving world of deepfake cybercrime. Once relegated to harmless internet pranks, deep...
Burnout in the SOC: Is Automation the Cure or the Culprit?
18 Jun 2025
Contributed by Lukas
In today's episode of the Bare Metal Cyber podcast, we dive deep into an often-overlooked crisis in cybersecurity: analyst burnout in the Security Ope...
Click First, Ask Never: Shadow IT’s Quiet Rebellion
11 Jun 2025
Contributed by Lukas
In today’s episode, we dive deep into the hidden realm of Shadow IT—those unsanctioned technologies quietly spreading through nearly every modern ...
Broken Links: Surviving the Supply Chain Cybertrap
04 Jun 2025
Contributed by Lukas
Third-party cybersecurity breaches are rapidly becoming one of the most serious threats facing organizations today. Attackers exploit vendor vulnerabi...
Virtual Reality Check: Cybersecurity in XR’s Wild West
28 May 2025
Contributed by Lukas
In this episode of the Bare Metal Cyber podcast, we explore the cybersecurity challenges facing Extended Reality—everything from hijacked avatars to...
Prompts of Mass Destruction: How Solo Hackers Are Turning Public AI into Weapons
21 May 2025
Contributed by Lukas
In this episode of BareMetalCyber, we explore the dark side of artificial intelligence and reveal how solo hackers are turning publicly available AI t...
Beyond Passwords: The Future of Secure Identity Management
14 May 2025
Contributed by Lukas
In this episode, we take a deep dive into the future of identity management and why passwordless authentication is gaining traction. Passwords have lo...
Industrial Control Systems Under Siege: Battling Advanced Cyber Threats
07 May 2025
Contributed by Lukas
In this episode, we dive deep into the growing cyber threats targeting Industrial Control Systems (ICS) and SCADA environments—critical infrastructu...
Cybersecurity on Autopilot: Unlocking the Potential of SOAR
30 Apr 2025
Contributed by Lukas
In this episode, I take you through the world of Security Orchestration, Automation, and Response—Security Orchestration, Automation, and Response—...
Beyond Passwords: The Future of Secure Identity Management
23 Apr 2025
Contributed by Lukas
In this episode, I take a deep dive into the future of identity management and why passwordless authentication is gaining traction. Passwords have lon...
Off the Record, On the Radar: Why Personal Comms Keep Haunting Government Cybersecurity
22 Apr 2025
Contributed by Lukas
In this podcast episode, I explore the persistent cybersecurity issue involving U.S. government officials using personal communication methods—like ...
Cyber Illusions: How Security Teams Trick and Track Attackers
16 Apr 2025
Contributed by Lukas
In this episode, I dive into the fascinating world of cyber deception—where security teams use honeypots, honeytokens, and other digital traps to lu...
The Cybersecurity Storm: 5G, IoT, and the Next Wave of Attacks
09 Apr 2025
Contributed by Lukas
In this podcast episode, I take a deep dive into the evolving cybersecurity threats brought on by the rapid expansion of five gee and Eye oh tee. With...
Ransomware Warfare: Advanced Tactics for Ransomware Response
02 Apr 2025
Contributed by Lukas
In this episode of BareMetalCyber, we dive into the evolving world of ransomware—breaking down how these attacks have transformed from simple lock-a...
Beyond Perimeters: Mastering Zero Trust
26 Mar 2025
Contributed by Lukas
In this podcast episode, I take a deep dive into Zero Trust Architecture, breaking down why the traditional security perimeter is no longer enough and...
Hacked by a Human: The Future of Social Engineering and Phishing
19 Mar 2025
Contributed by Lukas
In this episode, Hacked by a Human: The Future of Social Engineering and Phishing, breaking down how cybercriminals are evolving their tactics to mani...
Deconstructing Malware: A Deep Dive into Advanced Threat Analysis
12 Mar 2025
Contributed by Lukas
Malware is the backbone of modern cyber threats, evolving rapidly to outsmart security defenses and infiltrate systems undetected. In this episode of ...
Dark Web Intelligence
05 Mar 2025
Contributed by Lukas
The dark web isn’t just a hidden corner of the internet—it’s a thriving underground economy where cybercriminals buy and sell stolen data, hacki...
Bulletproof the Cloud: Building Systems That Survive Outages and Attacks
26 Feb 2025
Contributed by Lukas
In this gripping episode of Bulletproof the Cloud, Dr. Jason Edwards, a cybersecurity veteran and cloud resilience expert, takes listeners on a journe...
AI in Cybersecurity (Part 2): Offense
19 Feb 2025
Contributed by Lukas
AI is no longer just a tool for cyber defense—it has become a powerful weapon for attackers, automating and scaling threats in ways we’ve never se...
AI in Cybersecurity (Part 1): Defense
12 Feb 2025
Contributed by Lukas
In this episode, I take a deep dive into how AI is transforming cybersecurity, from machine learning-driven anomaly detection to real-time automated t...
Advanced Persistent Threats (APT): There be Dragons
06 Feb 2025
Contributed by Lukas
Advanced Persistent Threats (APTs) aren’t your typical cyber threats—they are sophisticated, highly organized, and built for long-term infiltratio...
Fortifying the Core: Building an Effective Insider Threat Program for Modern Organizations
30 Jan 2025
Contributed by Lukas
Insider threats are one of the most underestimated challenges in cybersecurity. These threats arise from individuals within an organization—employee...
Cryptocurrency Security: Advanced exploits of blockchain, smart contracts, and crypto wallets
23 Jan 2025
Contributed by Lukas
This episode explores the intricate world of smart contract exploits, detailing how vulnerabilities like reentrancy attacks, arithmetic bugs, front-ru...
The Fundamentals of Cybersecurity
21 Jan 2025
Contributed by Lukas
In this bonus episode of the BareMetalCyber podcast, I dive into cybersecurity fundamentals, exploring what it means to protect digital systems, netwo...
Securing the Future: Cryptography in the Age of Quantum Computing
17 Jan 2025
Contributed by Lukas
In this episode of Baremetalcyber, we explore the groundbreaking advancements in quantum computing and their profound impact on modern cryptography. D...
Artificial Intelligence (AI) in Modern Warfare
16 Jan 2025
Contributed by Lukas
In this special crossover episode of Baremetalcyber and Trackpads, we dive into the transformative role of Artificial Intelligence (AI) in modern warf...
Understanding Zero-Day Vulnerabilities
11 Jan 2025
Contributed by Lukas
In the inaugural episode of the Bare Metal Cyber Podcast for 2025, I take you into one of the most pressing challenges in cybersecurity: zero-day vuln...