Episodios

  • Concrete and Code: Smart Buildings as the Quiet New Attack Surface
    Mar 11 2026

    Smart buildings used to be a facilities concern; now they behave like distributed systems that can be probed, abused, or ransomed. In this narrated edition of “Concrete and Code: Smart Buildings as the Quiet New Attack Surface,” we walk through how access control, building management systems, cloud dashboards, and vendor VPNs have converged into a single, often unowned, cyber-physical domain. You’ll hear why leaders need to treat operational technology (OT) and smart building stacks with the same architectural seriousness as cloud and identity, and how long-lived capital decisions quietly shape your risk posture for decades.

    Across the episode, we unpack the core sections of the Wednesday “Headline” feature from Bare Metal Cyber Magazine: the evolution from static buildings to software-defined environments, the real anatomy of smart building stacks, the ways buildings become ransom assets, and the governance vacuum that often surrounds them. We finish with pragmatic leadership moves: reference architectures for campuses, non-negotiables for vendor access and segmentation, and procurement levers that turn vague “smart” upgrades into defensible, testable systems. If you’re responsible for risk, resilience, or technology strategy, this is a chance to rethink how you see the walls around your data and people.

    Más Menos
    17 m
  • Keeping API Keys, Tokens, and Passwords Out of the Wrong Hands
    Mar 10 2026

    Secrets management for API keys, tokens, and passwords is often the quiet difference between a minor configuration mistake and a major breach. In this narrated audio version of my Tuesday “Insights” feature from Bare Metal Cyber Magazine, we walk through what secrets management really means in day-to-day work. You will hear how vaults, runtime retrieval, rotation, and access policies fit together, and why they matter for developers, operators, and security teams trying to keep up with modern cloud-native environments.

    The episode also explores where secrets management shows up in real workflows, from CI pipelines and microservices to admin tools and support processes. We unpack quick wins like removing hard-coded credentials from source control, as well as deeper patterns such as dynamic credentials and just-in-time access. Along the way, you will get a clear view of the benefits, trade-offs, common failure modes, and healthy signals that show secrets are being treated as real operational assets, not just background details.

    Más Menos
    13 m
  • Certified: Launching Your Project Management Journey with CompTIA Project+
    Mar 9 2026

    This episode walks through CompTIA Project+ (Project+) as a practical first step into project leadership for early-career IT and cybersecurity professionals. You will hear what the certification actually covers, who it is designed for, and how it helps you move from “just doing tasks” to guiding real projects with scope, timelines, risks, and stakeholders. The narration is based on my Monday “Certified” feature from Bare Metal Cyber Magazine and keeps the focus on clear, real-world language instead of heavy jargon or rigid frameworks.

    You will also get a grounded look at what the exam really tests, how it feels in terms of scenarios and decision-making, and where Project+ fits in a broader career and certification path. That includes how hiring managers tend to view it, why it pairs well with technical certifications, and when it makes sense to pursue more advanced project credentials. If you want to go deeper, there is a full audio course for CompTIA Project+ inside the Bare Metal Cyber Audio Academy that expands on these ideas and supports a more structured study plan.

    Más Menos
    12 m
  • SaaS Chain Reactions: When One App’s Breach Becomes Everyone’s Incident
    Mar 4 2026

    This narrated episode explores what happens when a “small” tool in your Software as a Service (SaaS) estate becomes the catalyst for everyone’s incident. You will hear a breach story unfold from the war room perspective and then step back into the deeper architecture and governance patterns that made the chain reaction possible. The focus is on how integrations, identity providers, and automation platforms quietly accumulate risk, and why traditional vendor risk approaches that look at each provider in isolation are no longer enough for senior security and technology leaders. The narration is based on my Wednesday “Headline” feature from Bare Metal Cyber Magazine.

    From there, the episode walks through the key sections of the article in clear, leader-friendly language. It examines how the SaaS mesh forms, how blast radius is effectively “designed in” through common OAuth patterns and tenant-wide permissions, and how procurement and ownership models can leave security holding the bill when a partner is breached. It then turns to pragmatic moves: shaping your SaaS architecture for containment, using SaaS security posture management (SSPM) and identity tools to expose risky integrations, and building playbooks for third-party incidents that cross organizational boundaries. The goal is to leave you with a sharper mental model, better questions, and a concrete way to pressure-test your own environment.

    Más Menos
    17 m
  • Insight: Turning SIEM Events Into Actionable Signals
    Mar 3 2026

    If your Security Information and Event Management (SIEM) platform feels like a wall of noise, this episode is for you. We walk through what SIEM use cases really are, how they differ from generic rules or vendor content packs, and where they sit inside your detection and response workflow. You will hear how a good use case flows from a concrete risk scenario to specific log signals, correlation logic, and an alert that an analyst can actually act on, instead of yet another item to close as “noise.”

    We also explore everyday SIEM use cases teams lean on, from quick-win detections around authentication and admin activity to deeper, strategic patterns that tie identity, endpoint, and cloud data together. Along the way, we talk through the benefits, trade-offs, and limits of investing in SIEM use case design, plus the red flags and healthy signals that show whether your current content is working. This narration is developed from my Tuesday “Insights” feature in Bare Metal Cyber Magazine.

    Más Menos
    13 m
  • Certified: Hands-On Server Confidence with CompTIA Server+
    Mar 2 2026

    This narrated edition of our Monday “Certified” feature from Bare Metal Cyber Magazine walks you through CompTIA Server+ (Server+) in clear, practical language. You’ll hear what the certification is designed to prove, who it’s really for, and how it fits between entry-level support work and more advanced infrastructure roles. Along the way, we connect the dots between physical hardware, virtualization, storage, networking, and troubleshooting so you can picture the environments Server+ expects you to understand.

    In this episode, we also break down what the Server+ exam really tests, how the questions feel, and how the credential fits into a bigger career path that might include security, cloud, or platform-specific certifications. If you want to go beyond a single walkthrough, you can dive into the full audio course for Server+ inside the Bare Metal Cyber Audio Academy for deeper, step-by-step exam prep.

    Más Menos
    12 m
  • Multi-Cloud Mirage: More Providers, Same Fragile Backbone
    Feb 25 2026

    This narrated edition of “Multi-Cloud Mirage: More Providers, Same Fragile Backbone” digs into the gap between the slideware story of multi-cloud resilience and the reality of how most environments are actually built. You will hear how identity, connectivity, automation, and data paths quietly converge into a single fragile spine, even as logos multiply. We walk through why adding providers often does less for concentration risk than boards, regulators, and insurers believe, and why the real conversation needs to shift toward failure domains and control planes instead of marketing diagrams. This audio is developed from my Wednesday “Headline” feature in Bare Metal Cyber Magazine.

    In the second half, the narration takes you through the key sections of the article in practical, leader-focused language. We explore hidden shared backbones, failure domains that are not truly independent, and the way centralized control planes turn into elegant single points of failure. From there, we move into what real isolation looks like in architectures and operations, and how to own the trade-offs honestly in the boardroom. By the end, you will have a clearer mental model for deciding where multi-cloud genuinely adds resilience, where single-cloud plus strong recovery is enough, and how to explain those choices with confidence.

    Más Menos
    19 m
  • Insight: Third-Party Risk Questions That Actually Matter
    Feb 24 2026

    This audio episode explores Third-Party Risk Management (TPRM) as a practical, everyday part of how your organization works with vendors, cloud platforms, and service providers. In clear language, it walks through what TPRM is, where it fits in your governance and technical stack, and why “we’re secure” is never enough when a third party wants access to your data or systems. You will hear how TPRM turns vague assurances into specific questions about data flows, access paths, and incident responsibilities before any new connection goes live.

    Building on that foundation, the episode then walks through how TPRM works in practice, with real-world use cases that range from approving new SaaS tools to managing high-privilege service providers and renewals. It unpacks the major benefits and trade-offs, the limits of what you can realistically know about a vendor, and the failure modes that turn TPRM into paperwork instead of decision support. The narration is developed from my Tuesday “Insights” feature in Bare Metal Cyber Magazine, giving you a structured but accessible way to strengthen how your organization plugs vendors into its world.

    Más Menos
    13 m