InfoSec Bites
Episodes
Secure Hash Algorithm (SHA): A Comprehensive Analysis-Foundations, Evolution, Applications, and Post-Quantum Resilience
08 Sep 2025
Contributed by Lukas
This podcast offers a comprehensive overview of the **Secure Hash Algorithm (SHA)** family, detailing its **evolution from SHA-0 to SHA-3** and its cr...
Vulnerability Management: Understanding CVE, CVSS, and NVD
07 Sep 2025
Contributed by Lukas
This Podcast primarily discusses cybersecurity vulnerabilities and the Common Vulnerability Scoring System (CVSS), an open framework for rating their ...
Navigating Cryptographic Agility: A Deep Dive into Resilient Security
07 Sep 2025
Contributed by Lukas
This podcast comprehensively discusses cryptographic agility, defining it as the essential ability of digital systems to seamlessly and rapidly adapt ...
Quantum Computing's Rapid Ascent in 2025: Milestones and Dual Impact
06 Sep 2025
Contributed by Lukas
The dicussion in this podcast portrays 2025 as a pivotal year for quantum computing, marked by its transition from theoretical promise to practical ap...
Australia's Post-Quantum Cryptography(PQC) Readiness: Challenges and Imperatives
06 Sep 2025
Contributed by Lukas
This Podcast discusses Australia's preparedness for post-quantum cryptography (PQC), which is essential to secure digital systems against the emerging...
Threats, Vulnerabilities, and Risk: A Comprehensive Guide
06 Sep 2025
Contributed by Lukas
In this podcast we discuss cybersecurity risk management and vulnerability management, outlining systematic approaches to identify, assess, and addres...
OSI Model: Your Data's Journey through the invisible layers of the Internet!
06 Sep 2025
Contributed by Lukas
The podcast discusses the OSI (Open Systems Interconnection) model, a conceptual framework that standardizes how data communicates across networks. Th...
RSA Encryption: The silent guardian facing quantum revolution!
06 Sep 2025
Contributed by Lukas
Discussion in this Podcast offers a comprehensive overview of RSA encryption, a foundational public-key cryptosystem invented by Rivest, Shamir, and A...
Mosca's Theorem: Are you ready for Quantum threat(Q-Day)?
06 Sep 2025
Contributed by Lukas
The podcast discusses Mosca's Theorem, a critical framework for assessing and mitigating the cybersecurity risks posed by future quantum computers. Th...
Elliptic Curve Cryptography: Foundations, Applications, and Quantum Future
06 Sep 2025
Contributed by Lukas
Discussion in this podcast provides a comprehensive overview of Elliptic Curve Cryptography (ECC), a modern public-key encryption method. They explain...
Cryptographic Agility: A Strategic Imperative for Cybersecurity Resilience
06 Sep 2025
Contributed by Lukas
This podcast thoroughly explain cryptographic agility as a vital, proactive cybersecurity strategy, defining it as a system's ability to swiftly and s...
Unveiling Blockchains: Beyond Bitcoins, True Power in our world!
06 Sep 2025
Contributed by Lukas
The discussion in this podcast explores blockchain technology's expanding influence beyond cryptocurrencies, presenting it as a foundational shift in ...
AES Encryption Explained: Your invisible online guardian!
06 Sep 2025
Contributed by Lukas
This Podcast offers a comprehensive overview of the Advanced Encryption Standard (AES), detailing its origins, technical mechanics, and paramount impo...
IPv6: Unpacking the Internet's infinite future and why we need it NOW!
06 Sep 2025
Contributed by Lukas
The discussion in this Podcast offers a comprehensive overview of Internet Protocol Version 6 (IPv6), detailing its origin, features, and implementati...
Web3: Allure, Abyss, and the Decentralized Wild West
06 Sep 2025
Contributed by Lukas
In this Podcast we explore Web3, describing it as the next generation of the internet that aims for decentralization through blockchain technology, cr...
Phishing: The Art of Digital Deception
06 Sep 2025
Contributed by Lukas
"Phishing: The Art of Digital Deception," Podcast offers a comprehensive overview of phishing attacks, explaining this prevalent form of cybercrime wh...
Google Chrome: Capabilities, Security, and Vulnerabilities
06 Sep 2025
Contributed by Lukas
The podcast dicusses comprehensive overview of Google Chrome's architecture, security mechanisms, and vulnerabilities. It highlights Chrome's multi-pr...
The Quantum Internet: A Hybrid Frontier
06 Sep 2025
Contributed by Lukas
In this podcast we discuss comprehensive overview of the quantum internet, describing it as a transformative evolution of global communication that wi...
Quantum Crossroads: Securing Our Digital Future from Distributed Quantum Computing Threats
06 Sep 2025
Contributed by Lukas
Lets explores the challenges and opportunities presented by quantum computing, particularly focusing on the urgent need for Post-Quantum Cryptography ...
Homomorphic Encryption: Securing Data in Use
06 Sep 2025
Contributed by Lukas
In this Podcast we introduce and explain homomorphic encryption (HE), a groundbreaking cryptographic method that permits computations directly on encr...
Unravelling TLS 1.2: Security, Handshake, and Vulnerabilities
06 Sep 2025
Contributed by Lukas
In this Podcast we discuss, "Exploiting SSL/TLS Vulnerabilities in Modern Technologies" by Simreen Kaur Matharu, comprehensively examines cryptography...
Email Forensics: Uncovering Digital Evidences
06 Sep 2025
Contributed by Lukas
This podcast collectively provides a comprehensive overview of email forensics, defining it as a specialized discipline within digital forensics cruci...
Data Breach & Spill: PII & PHI Explained
06 Sep 2025
Contributed by Lukas
This podcast comprehensively explains the critical differences between data breaches and data spills, highlighting how both expose sensitive informati...
Zero Trust: Digital Survival Guide in a Treacherous Online World
06 Sep 2025
Contributed by Lukas
In this podcast, discussing Zero Trust, a cybersecurity framework that operates on the principle of "never trust, always verify." It highlights how th...
Confidentiality Integrity Availability(CIA Triad): The ultimate guide
06 Sep 2025
Contributed by Lukas
This podcast offers an extensive and often humorous exploration of the CIA Triad, a foundational concept in information security comprising Confidenti...
Authentication Authorisation & Accounting: Digital fortress of Information Security
06 Sep 2025
Contributed by Lukas
This podcast explains the three core pillars of digital security: Authentication, Authorisation, and Accounting (AAA). Authentication involves verifyi...
Trusted Platform Module(TPM): Invisible Hardware Guardian Against Cyber Threats
06 Sep 2025
Contributed by Lukas
In this podcast we offer a comprehensive overview of the Trusted Platform Module (TPM), a specialised hardware chip crucial for modern computer securi...
Quantum Computing: A Deep Dive, from spooky action to world changing technology
06 Sep 2025
Contributed by Lukas
This podcast collectively offers a comprehensive overview of quantum computing, explaining its fundamental principles and future implications. They cl...
The Harvest Now, Decrypt Later Threat and Quantum computing: What we must do today?
06 Sep 2025
Contributed by Lukas
In this podcast we discuss the "Harvest Now, Decrypt Later" (HNDL) threat, a critical and immediate cyber security risk where adversaries, primarily n...
Governance Risk & Compliance(GRC): Study Guide
06 Sep 2025
Contributed by Lukas
This podcast about "Risk and Information Systems Control ," provides a comprehensive overview of risk management and information system controls, prim...
OWASP Top 10 A01 -Broken Access Control: A Comprehensive Guide, why the #1 Web vulnerability threatens your digital security
06 Sep 2025
Contributed by Lukas
In this guide we examine Broken Access Control, identified by OWASP as the number one security risk in 2021, due to its widespread occurrence and seve...
2025's Top Cyber Incident
06 Sep 2025
Contributed by Lukas
In this podcast we outline four major cybersecurity incidents from 2025, highlighting the diverse and evolving threat landscape. It details attacks ra...
The Explainer: AWS WAF, Shield and Firewall Manager
06 Sep 2025
Contributed by Lukas
In this podcast we provide a comprehensive overview of AWS WAF, a web application firewall that helps protect web applications from common web exploit...
Essential Eight Cybersecurity Maturity Model
06 Sep 2025
Contributed by Lukas
In this podcast we collectively outline the Australian Signals Directorate's (ASD) Essential Eight cybersecurity mitigation strategies, designed to pr...
Browser: The New Cybersecurity Battleground
06 Sep 2025
Contributed by Lukas
In this episode we are discussing a fundamental shift in cybersecurity from "How the Browser Became the Main Cyber Battleground", where attackers incr...
Quantum AI: Future Computing and Its Impacts
06 Sep 2025
Contributed by Lukas
In this podcast lets discuss the intersection of quantum computing and artificial intelligence, exploring their individual capabilities and combined i...
Quantum Threat to Cryptography
06 Sep 2025
Contributed by Lukas
This podcast collectively explore the profound impact of quantum computing on information security, examining both threats and solutions. They consist...
OWASP Top 10 (2021) Comprehensive Guide
06 Sep 2025
Contributed by Lukas
The OWASP Top 10 (2021) Comprehensive Guide provides a detailed overview of the ten most critical web application security risks, identifying prevalen...
Information Security Manual(ISM): Principles and Guidelines
06 Sep 2025
Contributed by Lukas
This podcast present two distinct perspectives on success and security. The first source, an Information Security Manual (ISM), outlines a comprehensi...
MITRE ATT&CK Matrices: Decoding a Cyberattack's Playbook
06 Sep 2025
Contributed by Lukas
This Podcast offers a comprehensive overview of the MITRE ATT&CK framework, a standardised model for understanding cyber adversary behaviours. It ...
Post-Quantum Cryptography(PQC): Preparing for the Quantum Menace
06 Sep 2025
Contributed by Lukas
Post-Quantum Cryptography (PQC), highlighting its critical role in safeguarding digital security against the imminent threat of quantum computers. The...
AI's role in Cyber Security
06 Sep 2025
Contributed by Lukas
The provided text summarises Nimeshkumar Patel's 2025 book, "Securing the Future: Harnessing AI in Cybersecurity," which explores the cr...