Épisodes

  • Navigating the MITER ATTACK Matrix
    Nov 18 2025

    Many people first meeting cybersecurity feel lost in a storm of disconnected tools, rules, and scary headlines about breaches. Without a shared map of attacker behavior, every new term or alert can feel random and hard to compare meaningfully. The MITER ATTACK matrix gives that shared map by organizing real attacker behaviors into a picture that people across roles can read together. In this episode we stay with the beginner viewpoint and slowly unpack what that matrix actually is in very simple language. You will hear how the columns and cells of the matrix describe attacker goals and concrete moves rather than magic or mystery. We will separate tactics, which are high level goals, from techniques, which are specific methods, so the pattern becomes easier to recognize. Along the way we walk through one or two short attack stories and keep tying each step back to the matrix layout. Then we show how defenders on blue teams, ethical hackers on red teams, and nontechnical managers all use this same picture differently. By the end, the wall of boxes feels less like an exam cheat sheet and more like a useful everyday reference for understanding threats. The goal is simple, because you finish feeling able to open the ATT&CK matrix and describe what you are seeing with real confidence.

    Voir plus Voir moins
    13 min
  • Cyber Insights — NIST CSF 2.0 in Plain English
    Nov 11 2025

    The Cyber Insights podcast breaks down NIST Cybersecurity Framework 2.0 in plain English so first-time learners and busy leaders can act with confidence. In this episode, we translate the big shifts—especially the new Govern function—into everyday decisions: who owns risk, how to map what the business relies on, and how to turn outcomes into habits people actually follow. You’ll hear clear examples across Identify, Protect, Detect, Respond, and Recover, with practical language you can reuse in plans, policies, and board updates.

    Expect a calm, no-hype walkthrough designed for audio: simple definitions, concrete scenarios, and takeaways you can apply this week. Tuesdays are for Cyber Insights & Education at Bare Metal Cyber, and this episode keeps that promise—short, useful, and focused on results. Developed and produced by BareMetalCyber.com.

    Voir plus Voir moins
    18 min
  • Trailer
    Oct 14 2025
    1 min
  • Designing & Defending Secure Systems
    Sep 19 2025

    The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO 27001, FAIR, and OWASP are revisited as guides for aligning technical measures with organizational priorities.

    Case studies contrast failures of design—flat networks, poor identity controls—with examples of resilient architectures that contained damage and supported rapid recovery. Governance, communication, and humility are emphasized as traits of effective leadership. Learners finish the course prepared to explain trade-offs, design layered defenses, and lead with adaptability. The ultimate outcome of secure design is trust—confidence that systems will function reliably even under attack.
    Produced by BareMetalCyber.com

    Voir plus Voir moins
    21 min
  • Emerging Threats & Defensive Strategies
    Sep 19 2025

    This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending against misuse of legitimate credentials. Frameworks such as MITRE ATT&CK, STRIDE, and DREAD provide structured ways to map adversary behavior and anticipate weaknesses.

    Students examine case studies including ransomware attacks on healthcare and the SolarWinds compromise, illustrating the systemic and human consequences of modern campaigns. Defensive strategies such as zero trust, microsegmentation, threat hunting, and layered defense are explored, alongside the challenges of cost and complexity. By the end of the week, learners will recognize that adaptability is the defining characteristic of resilience, requiring continuous monitoring, cultural change, and leadership commitment.
    Produced by BareMetalCyber.com

    Voir plus Voir moins
    22 min
  • Application and API Security
    Sep 19 2025

    Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Peloton highlight how weak APIs expose sensitive data, while the persistence of SQL injection shows that technical knowledge alone is not enough—cultural and organizational discipline are required.

    Attention is also given to testing methodologies such as static, dynamic, and interactive analysis, as well as runtime protections. Learners explore the secure software development lifecycle, where security is embedded from design through deployment. By the end of this week, students will appreciate that application security is both technical and cultural, demanding governance, training, and communication alongside tools and frameworks.
    Produced by BareMetalCyber.com

    Voir plus Voir moins
    23 min
  • Infrastructure, Cloud, and Supply Chain Security
    Sep 19 2025

    Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities propagating across environments at unprecedented speed. The rise of the software supply chain as a critical risk vector, highlighted by SolarWinds, Log4j, and the XZ backdoor, demonstrates the systemic nature of modern threats.

    Students examine supply chain visibility through tools such as Software Bills of Materials, as well as verification practices like digital signatures and reproducible builds. Frameworks including NIST SP 800-204D and OWASP pipeline guidance are introduced to provide structure. By the end of this week, learners will understand that resilience depends on both governance and technology, and that securing supply chains requires coordinated responsibility across developers, leaders, and regulators.
    Produced by BareMetalCyber.com

    Voir plus Voir moins
    22 min
  • Secure Systems & Network Architecture
    Sep 19 2025

    This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The rise of zero trust architecture reframes trust as something to be earned continuously rather than assumed, while the lifecycle of SSL and TLS illustrates how protocols evolve to meet new demands.

    Learners explore architectural trade-offs, where gains in performance or convenience often come at the expense of visibility and control. Case studies of Heartbleed and DigiNotar demonstrate how shared components and certificate authorities create systemic risks. By the end of the week, students will understand that secure design is about resilience and adaptability, balancing usability, cost, and complexity while embedding monitoring, redundancy, and recovery at the core.
    Produced by BareMetalCyber.com

    Voir plus Voir moins
    23 min