Billede af showet InfoSec Bites

InfoSec Bites

Podcast af HelloInfoSec

engelsk

Videnskab & teknologi

Begrænset tilbud

2 måneder kun 19 kr.

Derefter 99 kr. / månedOpsig når som helst.

  • 20 lydbogstimer pr. måned
  • Podcasts kun på Podimo
  • Gratis podcasts
Kom i gang

Læs mere InfoSec Bites

Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec

Alle episoder

145 episoder

episode NIST Container Security and Compliance Frameworks Guide cover

NIST Container Security and Compliance Frameworks Guide

In this podcast we discuss NIST Special Publication 800-190, a comprehensive federal guide dedicated to application container security. This publication defines containers as a form of operating system virtualization that enables the portable and efficient packaging of software. The podcast details a multi-tiered architecture comprising images, registries, orchestrators, and host operating systems, identifying specific security risks inherent to each layer. To mitigate these threats, the guide proposes practical countermeasures, such as using minimalist host operating systems and automated vulnerability management. Ultimately, the documentation provides a lifecycle framework to help organisations securely plan, implement, and maintain containerised environments.

21. maj 2026 - 40 min
episode A Guide to the NIST Risk Management Framework cover

A Guide to the NIST Risk Management Framework

The NIST Risk Management Framework (RMF), primarily detailed in Special Publication 800-37, serves as a comprehensive methodology for securing information systems throughout their entire functional lifespan. This structured process guides organisations through seven essential stages: preparing the enterprise, categorising data based on impact, selecting and implementing safeguards, and then assessing, authorising, and monitoring those protections. The updated Revision 2 specifically integrates privacy management and supply chain security to address modern digital threats and complex global vulnerabilities. By aligning with the NIST Cybersecurity Framework, it ensures that senior leadership and operational staff maintain clear communication regarding institutional risks. Furthermore, the framework encourages the use of automation and continuous monitoring to create a more efficient, cost-effective path toward maintaining a secure Authority to Operate. Ultimately, the RMF provides a flexible, risk-based approach applicable to any technology or organisation seeking to protect its assets and individual privacy.

14. maj 2026 - 45 min
episode Logging Monitoring and Audit in Cloud Environment cover

Logging Monitoring and Audit in Cloud Environment

In this episode we explore the critical role of monitoring and logging solutions in maintaining the security and performance of modern cloud infrastructures. We will discuss the functionality of Azure Monitor activity logs, explaining how they track management operations and facilitate auditing or alerting for resource changes. A case study from the Cloud Security Alliance examines the 2024 Snowflake data breach, highlighting how failures in identity management and baseline security monitoring can lead to massive exfiltration. Research from the International Journal for Multidisciplinary Research provides empirical data on the benefits of centralised logging, showing that machine learning and automation significantly improve anomaly detection and reduce troubleshooting time. Together, these it emphasise that real-time visibility and scalable diagnostic tools are indispensable for identifying threats and ensuring operational resilience in complex digital environments.

7. maj 2026 - 59 min
episode Risk Assessment in Cyber Security cover

Risk Assessment in Cyber Security

The discussion in this podcast explores cybersecurity risk assessment as a vital strategic capability for modern organizational resilience. It centers on three primary global frameworks: NIST SP 800-53, which provides granular technical controls; ISO 27005/31000, offering principles-based international standards; and COBIT 2019, which focuses on enterprise IT governance. By examining these methodologies, it illustrates how they converge to transform abstract threats into measurable business risks that inform executive decision-making. High-profile case studies, such as the SolarWinds and Equifax breaches, are analyzed to demonstrate the catastrophic operational and financial costs of failing to maintain rigorous assessment practices. Ultimately, the hosts argues that a mature, framework-aligned approach goes beyond mere regulatory compliance to create a genuine competitive advantage through enhanced trust and business continuity. The discussion serves as a guide for security professionals to align technical security measures with overarching corporate strategy.

30. apr. 2026 - 36 min
episode Risk Governance in Cyber Security: Foundations and Frameworks cover

Risk Governance in Cyber Security: Foundations and Frameworks

The discussions in this podcast serves as a comprehensive manual on cybersecurity risk governance, emphasizing its role as the strategic blueprint for resilient enterprise security. It explores the historical evolution of the field, tracing its growth from simple physical server protection to a critical board-level imperative driven by global regulations. The discussion provides a meticulous deep dive into the world’s "gold standard" frameworks—NIST, ISO, and COBIT—analyzing how they overlap and where they diverge in technical granularity. Detailed case studies of major breaches, such as Equifax and SolarWinds, illustrate how specific governance failures lead to catastrophic financial and operational loss. Ultimately, the hosts argues that structured risk management transcends mere compliance, creating a mature security culture that is essential for navigating modern geopolitical and digital threats.

23. apr. 2026 - 45 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Vælg dit abonnement

Mest populære

Begrænset tilbud

Premium

20 timers lydbøger

  • Podcasts kun på Podimo

  • Ingen reklamer i podcasts fra Podimo

  • Opsig når som helst

2 måneder kun 19 kr.
Derefter 99 kr. / måned

Kom i gang

Premium Plus

100 timers lydbøger

  • Podcasts kun på Podimo

  • Ingen reklamer i podcasts fra Podimo

  • Opsig når som helst

Prøv gratis i 7 dage
Derefter 129 kr. / måned

Prøv gratis

Kun på Podimo

Populære lydbøger

Kom i gang

2 måneder kun 19 kr. Derefter 99 kr. / måned. Opsig når som helst.