Imagen de portada del programa InfoSec Bites

InfoSec Bites

Podcast de HelloInfoSec

inglés

Tecnología y ciencia

Empieza 7 días de prueba

$99 / mes después de la prueba.Cancela cuando quieras.

  • 20 horas de audiolibros al mes
  • Podcasts solo en Podimo
  • Podcast gratuitos
Prueba gratis

Acerca de InfoSec Bites

Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec

Todos los episodios

145 episodios

episode NIST Container Security and Compliance Frameworks Guide artwork

NIST Container Security and Compliance Frameworks Guide

In this podcast we discuss NIST Special Publication 800-190, a comprehensive federal guide dedicated to application container security. This publication defines containers as a form of operating system virtualization that enables the portable and efficient packaging of software. The podcast details a multi-tiered architecture comprising images, registries, orchestrators, and host operating systems, identifying specific security risks inherent to each layer. To mitigate these threats, the guide proposes practical countermeasures, such as using minimalist host operating systems and automated vulnerability management. Ultimately, the documentation provides a lifecycle framework to help organisations securely plan, implement, and maintain containerised environments.

21 de may de 2026 - 40 min
episode A Guide to the NIST Risk Management Framework artwork

A Guide to the NIST Risk Management Framework

The NIST Risk Management Framework (RMF), primarily detailed in Special Publication 800-37, serves as a comprehensive methodology for securing information systems throughout their entire functional lifespan. This structured process guides organisations through seven essential stages: preparing the enterprise, categorising data based on impact, selecting and implementing safeguards, and then assessing, authorising, and monitoring those protections. The updated Revision 2 specifically integrates privacy management and supply chain security to address modern digital threats and complex global vulnerabilities. By aligning with the NIST Cybersecurity Framework, it ensures that senior leadership and operational staff maintain clear communication regarding institutional risks. Furthermore, the framework encourages the use of automation and continuous monitoring to create a more efficient, cost-effective path toward maintaining a secure Authority to Operate. Ultimately, the RMF provides a flexible, risk-based approach applicable to any technology or organisation seeking to protect its assets and individual privacy.

14 de may de 2026 - 45 min
episode Logging Monitoring and Audit in Cloud Environment artwork

Logging Monitoring and Audit in Cloud Environment

In this episode we explore the critical role of monitoring and logging solutions in maintaining the security and performance of modern cloud infrastructures. We will discuss the functionality of Azure Monitor activity logs, explaining how they track management operations and facilitate auditing or alerting for resource changes. A case study from the Cloud Security Alliance examines the 2024 Snowflake data breach, highlighting how failures in identity management and baseline security monitoring can lead to massive exfiltration. Research from the International Journal for Multidisciplinary Research provides empirical data on the benefits of centralised logging, showing that machine learning and automation significantly improve anomaly detection and reduce troubleshooting time. Together, these it emphasise that real-time visibility and scalable diagnostic tools are indispensable for identifying threats and ensuring operational resilience in complex digital environments.

7 de may de 2026 - 59 min
episode Risk Assessment in Cyber Security artwork

Risk Assessment in Cyber Security

The discussion in this podcast explores cybersecurity risk assessment as a vital strategic capability for modern organizational resilience. It centers on three primary global frameworks: NIST SP 800-53, which provides granular technical controls; ISO 27005/31000, offering principles-based international standards; and COBIT 2019, which focuses on enterprise IT governance. By examining these methodologies, it illustrates how they converge to transform abstract threats into measurable business risks that inform executive decision-making. High-profile case studies, such as the SolarWinds and Equifax breaches, are analyzed to demonstrate the catastrophic operational and financial costs of failing to maintain rigorous assessment practices. Ultimately, the hosts argues that a mature, framework-aligned approach goes beyond mere regulatory compliance to create a genuine competitive advantage through enhanced trust and business continuity. The discussion serves as a guide for security professionals to align technical security measures with overarching corporate strategy.

30 de abr de 2026 - 36 min
episode Risk Governance in Cyber Security: Foundations and Frameworks artwork

Risk Governance in Cyber Security: Foundations and Frameworks

The discussions in this podcast serves as a comprehensive manual on cybersecurity risk governance, emphasizing its role as the strategic blueprint for resilient enterprise security. It explores the historical evolution of the field, tracing its growth from simple physical server protection to a critical board-level imperative driven by global regulations. The discussion provides a meticulous deep dive into the world’s "gold standard" frameworks—NIST, ISO, and COBIT—analyzing how they overlap and where they diverge in technical granularity. Detailed case studies of major breaches, such as Equifax and SolarWinds, illustrate how specific governance failures lead to catastrophic financial and operational loss. Ultimately, the hosts argues that structured risk management transcends mere compliance, creating a mature security culture that is essential for navigating modern geopolitical and digital threats.

23 de abr de 2026 - 45 min
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Fantástica aplicación. Yo solo uso los podcast. Por un precio módico los tienes variados y cada vez más.
Me encanta la app, concentra los mejores podcast y bueno ya era ora de pagarles a todos estos creadores de contenido

Elige tu suscripción

Más populares

Premium

20 horas de audiolibros

  • Podcasts solo en Podimo

  • Disfruta los shows de Podimo sin anuncios

  • Cancela cuando quieras

Empieza 7 días de prueba
Después $99 / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares

Prueba gratis

Empieza 7 días de prueba. $99 / mes después de la prueba. Cancela cuando quieras.