All Episodes

Displaying 1 - 20 of 44 in total

Shrodingers Firewall

In this episode, we dive into the unsettling paradox of Schrödinger’s Firewall—where your data is both safe and already compromised in the looming quantum era. Listene...

Trailer

Weekly Cyber News Rollup, October 10th, 2025

This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion wave targeting custom...

When Zero Trust Meets Zero Patience

In this episode, we take on the fatigue that often comes with Zero Trust—those endless logins, rigid rules, and culture-draining compliance routines. Listeners will di...

Weekly Cyber News Rollup, October 3rd, 2025

This is the Friday Rollup for September 29th through October 3rd, 2025. It was a week of edge-device pressure, identity weak spots, and evolving email tradecraft. We c...

Crypto or Consequences

Ransomware is no longer just about malicious code—it’s about business models, negotiation tactics, and the psychology of fear. In this episode, we break down how ranso...

Your MFA Is Not Two-Factor—It’s SMS and a Prayer

In this episode, we expose the illusion of security created by SMS-based multi-factor authentication. Listeners will learn why text-message codes fail to deliver true ...

Glitched on Arrival: When AI Learns the Wrong Lessons

In this episode, we explore the strange yet critical world of adversarial machine learning—where tiny, unseen manipulations can fool AI systems into making dangerous a...

Will AI trigger the First White Collar Recession?

Will AI trigger the first white-collar recession—or just change what those jobs look like? This episode follows the quiet early tells—executive hiring freezes, six-fig...

Keyboard Assassins: Inside the Covert World of State-Sponsored Cyber Sabotage

In this episode of BareMetalCyber, we delve into the shadowy world of state-sponsored cyber sabotage, examining how nations increasingly leverage digital attacks for e...

Ctrl+Alt+Comply: The Wild World of Cyber Regulations

In this episode of BareMetalCyber, we narrate the article Ctrl+Alt+Comply: The Wild World of Cyber Regulations, taking you through the tangled web of international cyb...

When Smart Gets Sinister: Taming the IoT Rebellion

In today's episode, we dive into the dark side of our increasingly connected world, exploring how ordinary IoT devices—like coffee makers, fish tanks, and even printer...

From LOLs to Lateral Movement: Securing ChatOps

In today's episode, we explore how ChatOps—the integration of collaboration and operations through platforms like Slack and Teams—has reshaped modern workplaces, deliv...

Click Less, Protect More: Building Your Office’s Human Firewall

In today's episode, we're tackling one of cybersecurity's biggest challenges: the human factor. Employees, often considered the weakest link in an organization's cyber...

Firewalls and Frontlines: Cybersecurity in the Age of Digital Warfare

In this episode of BareMetalCyber, we dive deep into the emerging frontlines of digital warfare, where traditional weapons have given way to malicious code and covert ...

Inside Job: Profiling the Mind of an Insider Threat

In today's episode, we explore one of the most challenging cybersecurity issues organizations face—the insider threat. Unlike external cyberattacks, these threats emer...

Seeing is Deceiving: Preparing for the Deepfake Cyber Threat

In today's episode, we dive deep into the sinister and rapidly evolving world of deepfake cybercrime. Once relegated to harmless internet pranks, deepfake technology n...

Burnout in the SOC: Is Automation the Cure or the Culprit?

In today's episode of the Bare Metal Cyber podcast, we dive deep into an often-overlooked crisis in cybersecurity: analyst burnout in the Security Operations Center. W...

Click First, Ask Never: Shadow IT’s Quiet Rebellion

In today’s episode, we dive deep into the hidden realm of Shadow IT—those unsanctioned technologies quietly spreading through nearly every modern organization. While t...

Broken Links: Surviving the Supply Chain Cybertrap

Third-party cybersecurity breaches are rapidly becoming one of the most serious threats facing organizations today. Attackers exploit vendor vulnerabilities, bypassing...

Broadcast by