Forsidebilde av showet InfoSec Bites

InfoSec Bites

Podkast av HelloInfoSec

engelsk

Teknologi og vitenskap

Tidsbegrenset tilbud

2 Måneder for 19 kr

Deretter 99 kr / MånedAvslutt når som helst.

  • 20 timer lydbøker i måneden
  • Eksklusive podkaster
  • Gratis podkaster
Kom i gang

Les mer InfoSec Bites

Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec

Alle episoder

145 Episoder

episode NIST Container Security and Compliance Frameworks Guide cover

NIST Container Security and Compliance Frameworks Guide

In this podcast we discuss NIST Special Publication 800-190, a comprehensive federal guide dedicated to application container security. This publication defines containers as a form of operating system virtualization that enables the portable and efficient packaging of software. The podcast details a multi-tiered architecture comprising images, registries, orchestrators, and host operating systems, identifying specific security risks inherent to each layer. To mitigate these threats, the guide proposes practical countermeasures, such as using minimalist host operating systems and automated vulnerability management. Ultimately, the documentation provides a lifecycle framework to help organisations securely plan, implement, and maintain containerised environments.

21. mai 2026 - 40 min
episode A Guide to the NIST Risk Management Framework cover

A Guide to the NIST Risk Management Framework

The NIST Risk Management Framework (RMF), primarily detailed in Special Publication 800-37, serves as a comprehensive methodology for securing information systems throughout their entire functional lifespan. This structured process guides organisations through seven essential stages: preparing the enterprise, categorising data based on impact, selecting and implementing safeguards, and then assessing, authorising, and monitoring those protections. The updated Revision 2 specifically integrates privacy management and supply chain security to address modern digital threats and complex global vulnerabilities. By aligning with the NIST Cybersecurity Framework, it ensures that senior leadership and operational staff maintain clear communication regarding institutional risks. Furthermore, the framework encourages the use of automation and continuous monitoring to create a more efficient, cost-effective path toward maintaining a secure Authority to Operate. Ultimately, the RMF provides a flexible, risk-based approach applicable to any technology or organisation seeking to protect its assets and individual privacy.

14. mai 2026 - 45 min
episode Logging Monitoring and Audit in Cloud Environment cover

Logging Monitoring and Audit in Cloud Environment

In this episode we explore the critical role of monitoring and logging solutions in maintaining the security and performance of modern cloud infrastructures. We will discuss the functionality of Azure Monitor activity logs, explaining how they track management operations and facilitate auditing or alerting for resource changes. A case study from the Cloud Security Alliance examines the 2024 Snowflake data breach, highlighting how failures in identity management and baseline security monitoring can lead to massive exfiltration. Research from the International Journal for Multidisciplinary Research provides empirical data on the benefits of centralised logging, showing that machine learning and automation significantly improve anomaly detection and reduce troubleshooting time. Together, these it emphasise that real-time visibility and scalable diagnostic tools are indispensable for identifying threats and ensuring operational resilience in complex digital environments.

7. mai 2026 - 59 min
episode Risk Assessment in Cyber Security cover

Risk Assessment in Cyber Security

The discussion in this podcast explores cybersecurity risk assessment as a vital strategic capability for modern organizational resilience. It centers on three primary global frameworks: NIST SP 800-53, which provides granular technical controls; ISO 27005/31000, offering principles-based international standards; and COBIT 2019, which focuses on enterprise IT governance. By examining these methodologies, it illustrates how they converge to transform abstract threats into measurable business risks that inform executive decision-making. High-profile case studies, such as the SolarWinds and Equifax breaches, are analyzed to demonstrate the catastrophic operational and financial costs of failing to maintain rigorous assessment practices. Ultimately, the hosts argues that a mature, framework-aligned approach goes beyond mere regulatory compliance to create a genuine competitive advantage through enhanced trust and business continuity. The discussion serves as a guide for security professionals to align technical security measures with overarching corporate strategy.

30. april 2026 - 36 min
episode Risk Governance in Cyber Security: Foundations and Frameworks cover

Risk Governance in Cyber Security: Foundations and Frameworks

The discussions in this podcast serves as a comprehensive manual on cybersecurity risk governance, emphasizing its role as the strategic blueprint for resilient enterprise security. It explores the historical evolution of the field, tracing its growth from simple physical server protection to a critical board-level imperative driven by global regulations. The discussion provides a meticulous deep dive into the world’s "gold standard" frameworks—NIST, ISO, and COBIT—analyzing how they overlap and where they diverge in technical granularity. Detailed case studies of major breaches, such as Equifax and SolarWinds, illustrate how specific governance failures lead to catastrophic financial and operational loss. Ultimately, the hosts argues that structured risk management transcends mere compliance, creating a mature security culture that is essential for navigating modern geopolitical and digital threats.

23. april 2026 - 45 min
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Liker at det er både Podcaster (godt utvalg) og lydbøker i samme app, pluss at man kan holde Podcaster og lydbøker atskilt i biblioteket.
Bra app. Oversiktlig og ryddig. MYE bra innhold⭐️⭐️⭐️

Velg abonnementet ditt

Mest populær

Tidsbegrenset tilbud

Premium

20 timer lydbøker

  • Eksklusive podkaster

  • Ingen annonser i Podimo shows

  • Avslutt når som helst

2 Måneder for 19 kr
Deretter 99 kr / Måned

Kom i gang

Premium Plus

100 timer lydbøker

  • Eksklusive podkaster

  • Ingen annonser i Podimo shows

  • Avslutt når som helst

Prøv gratis i 14 dager
Deretter 169 kr / måned

Prøv gratis

Bare på Podimo

Populære lydbøker

Kom i gang

2 Måneder for 19 kr. Deretter 99 kr / Måned. Avslutt når som helst.