Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfoSec Bites

Technology

Episodes

Showing 101-142 of 142
«« ← Prev Page 2 of 2

Secure Hash Algorithm (SHA): A Comprehensive Analysis-Foundations, Evolution, Applications, and Post-Quantum Resilience

08 Sep 2025

Contributed by Lukas

This podcast offers a comprehensive overview of the **Secure Hash Algorithm (SHA)** family, detailing its **evolution from SHA-0 to SHA-3** and its cr...

Vulnerability Management: Understanding CVE, CVSS, and NVD

07 Sep 2025

Contributed by Lukas

This Podcast primarily discusses cybersecurity vulnerabilities and the Common Vulnerability Scoring System (CVSS), an open framework for rating their ...

Navigating Cryptographic Agility: A Deep Dive into Resilient Security

07 Sep 2025

Contributed by Lukas

This podcast comprehensively discusses cryptographic agility, defining it as the essential ability of digital systems to seamlessly and rapidly adapt ...

Quantum Computing's Rapid Ascent in 2025: Milestones and Dual Impact

06 Sep 2025

Contributed by Lukas

The dicussion in this podcast portrays 2025 as a pivotal year for quantum computing, marked by its transition from theoretical promise to practical ap...

Australia's Post-Quantum Cryptography(PQC) Readiness: Challenges and Imperatives

06 Sep 2025

Contributed by Lukas

This Podcast discusses Australia's preparedness for post-quantum cryptography (PQC), which is essential to secure digital systems against the emerging...

Threats, Vulnerabilities, and Risk: A Comprehensive Guide

06 Sep 2025

Contributed by Lukas

In this podcast we discuss cybersecurity risk management and vulnerability management, outlining systematic approaches to identify, assess, and addres...

OSI Model: Your Data's Journey through the invisible layers of the Internet!

06 Sep 2025

Contributed by Lukas

The podcast discusses the OSI (Open Systems Interconnection) model, a conceptual framework that standardizes how data communicates across networks. Th...

RSA Encryption: The silent guardian facing quantum revolution!

06 Sep 2025

Contributed by Lukas

Discussion in this Podcast offers a comprehensive overview of RSA encryption, a foundational public-key cryptosystem invented by Rivest, Shamir, and A...

Mosca's Theorem: Are you ready for Quantum threat(Q-Day)?

06 Sep 2025

Contributed by Lukas

The podcast discusses Mosca's Theorem, a critical framework for assessing and mitigating the cybersecurity risks posed by future quantum computers. Th...

Elliptic Curve Cryptography: Foundations, Applications, and Quantum Future

06 Sep 2025

Contributed by Lukas

Discussion in this podcast provides a comprehensive overview of Elliptic Curve Cryptography (ECC), a modern public-key encryption method. They explain...

Cryptographic Agility: A Strategic Imperative for Cybersecurity Resilience

06 Sep 2025

Contributed by Lukas

This podcast thoroughly explain cryptographic agility as a vital, proactive cybersecurity strategy, defining it as a system's ability to swiftly and s...

Unveiling Blockchains: Beyond Bitcoins, True Power in our world!

06 Sep 2025

Contributed by Lukas

The discussion in this podcast explores blockchain technology's expanding influence beyond cryptocurrencies, presenting it as a foundational shift in ...

AES Encryption Explained: Your invisible online guardian!

06 Sep 2025

Contributed by Lukas

This Podcast offers a comprehensive overview of the Advanced Encryption Standard (AES), detailing its origins, technical mechanics, and paramount impo...

IPv6: Unpacking the Internet's infinite future and why we need it NOW!

06 Sep 2025

Contributed by Lukas

The discussion in this Podcast offers a comprehensive overview of Internet Protocol Version 6 (IPv6), detailing its origin, features, and implementati...

Web3: Allure, Abyss, and the Decentralized Wild West

06 Sep 2025

Contributed by Lukas

In this Podcast we explore Web3, describing it as the next generation of the internet that aims for decentralization through blockchain technology, cr...

Phishing: The Art of Digital Deception

06 Sep 2025

Contributed by Lukas

"Phishing: The Art of Digital Deception," Podcast offers a comprehensive overview of phishing attacks, explaining this prevalent form of cybercrime wh...

Google Chrome: Capabilities, Security, and Vulnerabilities

06 Sep 2025

Contributed by Lukas

The podcast dicusses comprehensive overview of Google Chrome's architecture, security mechanisms, and vulnerabilities. It highlights Chrome's multi-pr...

The Quantum Internet: A Hybrid Frontier

06 Sep 2025

Contributed by Lukas

In this podcast we discuss comprehensive overview of the quantum internet, describing it as a transformative evolution of global communication that wi...

Quantum Crossroads: Securing Our Digital Future from Distributed Quantum Computing Threats

06 Sep 2025

Contributed by Lukas

Lets explores the challenges and opportunities presented by quantum computing, particularly focusing on the urgent need for Post-Quantum Cryptography ...

Homomorphic Encryption: Securing Data in Use

06 Sep 2025

Contributed by Lukas

In this Podcast we introduce and explain homomorphic encryption (HE), a groundbreaking cryptographic method that permits computations directly on encr...

Unravelling TLS 1.2: Security, Handshake, and Vulnerabilities

06 Sep 2025

Contributed by Lukas

In this Podcast we discuss, "Exploiting SSL/TLS Vulnerabilities in Modern Technologies" by Simreen Kaur Matharu, comprehensively examines cryptography...

Email Forensics: Uncovering Digital Evidences

06 Sep 2025

Contributed by Lukas

This podcast collectively provides a comprehensive overview of email forensics, defining it as a specialized discipline within digital forensics cruci...

Data Breach & Spill: PII & PHI Explained

06 Sep 2025

Contributed by Lukas

This podcast comprehensively explains the critical differences between data breaches and data spills, highlighting how both expose sensitive informati...

Zero Trust: Digital Survival Guide in a Treacherous Online World

06 Sep 2025

Contributed by Lukas

In this podcast, discussing Zero Trust, a cybersecurity framework that operates on the principle of "never trust, always verify." It highlights how th...

Confidentiality Integrity Availability(CIA Triad): The ultimate guide

06 Sep 2025

Contributed by Lukas

This podcast offers an extensive and often humorous exploration of the CIA Triad, a foundational concept in information security comprising Confidenti...

Authentication Authorisation & Accounting: Digital fortress of Information Security

06 Sep 2025

Contributed by Lukas

This podcast explains the three core pillars of digital security: Authentication, Authorisation, and Accounting (AAA). Authentication involves verifyi...

Trusted Platform Module(TPM): Invisible Hardware Guardian Against Cyber Threats

06 Sep 2025

Contributed by Lukas

In this podcast we offer a comprehensive overview of the Trusted Platform Module (TPM), a specialised hardware chip crucial for modern computer securi...

Quantum Computing: A Deep Dive, from spooky action to world changing technology

06 Sep 2025

Contributed by Lukas

This podcast collectively offers a comprehensive overview of quantum computing, explaining its fundamental principles and future implications. They cl...

The Harvest Now, Decrypt Later Threat and Quantum computing: What we must do today?

06 Sep 2025

Contributed by Lukas

In this podcast we discuss the "Harvest Now, Decrypt Later" (HNDL) threat, a critical and immediate cyber security risk where adversaries, primarily n...

Governance Risk & Compliance(GRC): Study Guide

06 Sep 2025

Contributed by Lukas

This podcast about "Risk and Information Systems Control ," provides a comprehensive overview of risk management and information system controls, prim...

OWASP Top 10 A01 -Broken Access Control: A Comprehensive Guide, why the #1 Web vulnerability threatens your digital security

06 Sep 2025

Contributed by Lukas

In this guide we examine Broken Access Control, identified by OWASP as the number one security risk in 2021, due to its widespread occurrence and seve...

2025's Top Cyber Incident

06 Sep 2025

Contributed by Lukas

In this podcast we outline four major cybersecurity incidents from 2025, highlighting the diverse and evolving threat landscape. It details attacks ra...

The Explainer: AWS WAF, Shield and Firewall Manager

06 Sep 2025

Contributed by Lukas

In this podcast we provide a comprehensive overview of AWS WAF, a web application firewall that helps protect web applications from common web exploit...

Essential Eight Cybersecurity Maturity Model

06 Sep 2025

Contributed by Lukas

In this podcast we collectively outline the Australian Signals Directorate's (ASD) Essential Eight cybersecurity mitigation strategies, designed to pr...

Browser: The New Cybersecurity Battleground

06 Sep 2025

Contributed by Lukas

In this episode we are discussing a fundamental shift in cybersecurity from "How the Browser Became the Main Cyber Battleground", where attackers incr...

Quantum AI: Future Computing and Its Impacts

06 Sep 2025

Contributed by Lukas

In this podcast lets discuss the intersection of quantum computing and artificial intelligence, exploring their individual capabilities and combined i...

Quantum Threat to Cryptography

06 Sep 2025

Contributed by Lukas

This podcast collectively explore the profound impact of quantum computing on information security, examining both threats and solutions. They consist...

OWASP Top 10 (2021) Comprehensive Guide

06 Sep 2025

Contributed by Lukas

The OWASP Top 10 (2021) Comprehensive Guide provides a detailed overview of the ten most critical web application security risks, identifying prevalen...

Information Security Manual(ISM): Principles and Guidelines

06 Sep 2025

Contributed by Lukas

This podcast present two distinct perspectives on success and security. The first source, an Information Security Manual (ISM), outlines a comprehensi...

MITRE ATT&CK Matrices: Decoding a Cyberattack's Playbook

06 Sep 2025

Contributed by Lukas

This Podcast offers a comprehensive overview of the MITRE ATT&CK framework, a standardised model for understanding cyber adversary behaviours. It ...

Post-Quantum Cryptography(PQC): Preparing for the Quantum Menace

06 Sep 2025

Contributed by Lukas

Post-Quantum Cryptography (PQC), highlighting its critical role in safeguarding digital security against the imminent threat of quantum computers. The...

AI's role in Cyber Security

06 Sep 2025

Contributed by Lukas

The provided text summarises Nimeshkumar Patel's 2025 book, "Securing the Future: Harnessing AI in Cybersecurity," which explores the cr...

«« ← Prev Page 2 of 2