Épisodes

  • Cyber Talks - Break Things Safely: A High-Value Cyber Exercise Program with Daniel Hammond
    Nov 20 2025

    Don’t wait to learn the fire drill while the building’s on fire. In this Cyber Talk developed by BareMetalCyber.com, Army veteran and cyber resilience strategist Daniel Hammond shows how to move past check-the-box drills and turn exercises into a core learning culture. He walks through goal-driven planning (so every exercise serves a sponsor’s real need), the HSEEP spectrum from seminars and workshops to tabletops, drills, and full-scale events, plus when to go operations-based, run no-notice tests, and invite regulators, comms, and third-party partners into the room.

    Daniel shares hard-won lessons from building programs at Fortune 500s: validating response playbooks, avoiding “single-layer defense” with purple teaming, closing gaps regulators spot across your industry, and using board briefings to turn findings into funding. If you lead incident response, risk, or compliance—and you want confident teams that discover blind spots before adversaries do—this talk is for you. Join us, bring questions, and leave with practical patterns you can run this quarter.

    Voir plus Voir moins
    48 min
  • XDR, EDR, NDR, MDR, WTF-DR?
    Nov 19 2025

    In this episode, we cut through the alphabet soup of cybersecurity—EDR, NDR, XDR, MDR, and even the tongue-in-cheek WTF-DR. You’ll learn what each of these acronyms really means, how they differ, and where they overlap. More importantly, you’ll gain clarity on how they fit together in practice, why no single tool is enough, and how to build a layered defense without wasting budget on hype. Through clear explanations and vivid scenarios, the episode brings order to the chaos of detection and response technologies.

    Listening will sharpen your ability to evaluate tools, vendors, and services with confidence. You’ll improve your skills in mapping security investments to real outcomes, spotting hidden gaps in coverage, and asking the right questions about integration, costs, and response workflows. Whether you’re a security leader, analyst, or simply navigating the jargon jungle, this episode equips you to separate buzzwords from business value.

    Produced by BareMetalCyber.com.

    Voir plus Voir moins
    29 min
  • Weekly Cyber News Rollup, November 14th, 2025
    Nov 14 2025

    This is your weekly cyber news roll-up for the week ending November 14th, 2025. This week centers on phones, clouds, and core identity systems under pressure from well funded attackers who prefer to move quietly. You will hear how new spyware campaigns abuse Samsung devices and WhatsApp features, while hotel and travel scams blend real booking details with fresh malware delivery. The episode also walks through developer and infrastructure risks, from poisoned code editor extensions to critical flaws in firewalls and container platforms that can turn one foothold into broad access. It all adds up to a week where leaders and defenders need to rethink how personal devices, travel workflows, and cloud control planes intersect in daily operations.

    Across these stories you will move from data exposure at an artificial intelligence company ecosystem to massive breach data feeds landing in tracking services, and from long running espionage inside a policy nonprofit to new tools that help small businesses fight review extortion. Executives will gain a faster sense of which threats can disrupt revenue and trust, while security teams hear where to focus monitoring, patching, and multi factor authentication, M F A, improvements right now. Builders and cloud operators get practical insight into container escape flaws, risky extensions, and identity platform weaknesses that change how they should think about shared environments. Students and early career defenders can use the narrative to map how scams, espionage, and infrastructure bugs all connect in real attacks. Listen in to get the full story arc in one pass, available at DailyCyber.news.

    Voir plus Voir moins
    12 min
  • Phishing ‘Hunger Games’: May the Odds Be Ever in Your Favor (They Aren’t)
    Nov 12 2025

    In this episode, we explore phishing as a rigged arena where attackers decide the rules and employees become the unwilling contestants. You’ll learn how phishing has evolved from clumsy spam into precision-engineered deception powered by AI, reverse proxies, and multi-channel choreography. We unpack the psychology that adversaries exploit—urgency, authority, and scarcity—and show how identity protections, layered defenses, and cultural shifts can flip the script. From role-specific vulnerabilities to the industrialization of phishing kits, this episode equips you with a clear view of the battlefield and the tools needed to navigate it.

    Listening also sharpens practical skills that directly improve resilience. You’ll gain insight into recognizing subtle red flags across devices and platforms, understanding the tactics that bypass traditional MFA, and adopting verification habits that make the safe path the easiest one. Beyond individual awareness, the episode builds leadership and organizational skills: how to embed verification into workflows, design effective simulations, and foster a culture where reporting is rewarded. By the end, you’ll see how to shift the odds, not by chance, but by readiness. Produced by BareMetalCyber.com.

    Voir plus Voir moins
    31 min
  • Weekly Cyber News Rollup, November 7th, 2025
    Nov 8 2025

    This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed backup theft, and Conduent revealed exposure of over ten million personal records. From telecom networks to government mail servers, the week showed how attackers are targeting both the perimeter and the core of modern systems.

    Listeners will hear twenty-five stories that define the shifting threat landscape — from router implants and cloud misconfigurations to insider indictments and major ransomware playbooks. Each segment stays focused on what happened, who was affected, and why it matters to defenders and decision-makers. The narrated version of this full report is available anytime at DailyCyber.news.

    Voir plus Voir moins
    16 min
  • The Cult of the Dashboard: Vanity Metrics Anonymous
    Nov 5 2025

    In this episode, The Cult of the Dashboard: Vanity Metrics Anonymous, we expose the seductive world of flashy dashboards and meaningless numbers. Listeners will learn why organizations cling to vanity metrics, how executive reports can hide more than they reveal, and what truly matters when measuring security. From the psychological pull of green stoplights to the perverse incentives that reward compliance theater, the discussion unpacks how activity counts distract from the real goal: reducing risk in the face of determined adversaries.

    Beyond awareness, this episode sharpens practical skills for security leaders and practitioners. You’ll gain insight into building outcome-driven measurement programs, creating metrics that highlight exposure and effectiveness, and framing results in ways that drive decisions. The episode also helps refine executive communication, teaching how to transform numbers into narratives that motivate action instead of applause. By the end, you’ll be better equipped to design metrics that measure what attackers care about—not what looks good on a slide. Produced by BareMetalCyber.com.

    Voir plus Voir moins
    29 min
  • Weekly Cyber News Rollup, October 31st, 2025
    Oct 31 2025

    This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands of resolvers. A live Chrome exploit tied to a surveillance vendor kept risk high for targeted users, and a rebuilt ransomware toolkit reappeared with broader reach. Together, these stories show how core plumbing, business systems, and user browsers can all become first-impact points.

    You will hear how agencies were ordered to patch exploited virtualization paths, how developer tokens were stolen via look-alike packages, and how a polished board-invite lure harvested executive credentials. We cover a Windows Subsystem for Linux encryptor tactic, active attacks on shop-floor software added to the K E V list, and hands-on tampering of exposed industrial controls. Also in the mix: a global identity outage, mass exploitation of abandoned plugins, near-field payment relay kits, an enclave side-channel, a crash-looping link, rumor control, and account-security policy changes. Leaders, defenders, and builders get practical takeaways, with the narrated episode available at DailyCyber.news.

    Voir plus Voir moins
    12 min
  • Patch Tuesday, Breach Wednesday
    Oct 29 2025

    In this episode of Bare Metal Cyber, we break down the monthly ritual every security team knows too well: Patch Tuesday. You’ll learn why the very act of publishing a patch creates a roadmap for attackers, how exploits move from proof-of-concept to widespread weaponization in a matter of hours, and why so many organizations struggle with the dreaded “patch gap.” We’ll also explore the speed advantage of adversaries, the realities of legacy systems, and what a 72-hour response playbook looks like when executed correctly.

    Beyond awareness, this episode sharpens your practical skills. You’ll gain insight into prioritizing vulnerabilities based on real-world risk, using canary deployments and automation to patch faster with less disruption, and applying compensating controls when immediate fixes aren’t possible. Most importantly, you’ll build the mindset to treat patching as frontline defense rather than routine maintenance—transforming Breach Wednesday from a certainty into just another day.

    Produced by BareMetalCyber.com.

    Voir plus Voir moins
    30 min