InfoSec Bites

By HelloInfoSec

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by HelloInfoSec

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 1
Reviews: 0
Episodes: 143

Description

Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSec

Episode Date
Logging Monitoring and Audit in Cloud Environment
May 07, 2026
Risk Assessment in Cyber Security
Apr 30, 2026
Risk Governance in Cyber Security: Foundations and Frameworks
Apr 23, 2026
Cloud Forensic : Trustworthiness of Digital Evidence in Cloud Environments
Apr 16, 2026
VM Escape in Cloud: Hypervisor Security and the Evolution of Virtual Isolation
Apr 09, 2026
VM and Resource Sprawl: Mastering Cloud Efficiency
Apr 02, 2026
Zero-Click Attacks: The Invisible Cyber Threats
Mar 26, 2026
Crypto-Shredding: Cloud Data Sanitization and Quantum Security Strategies
Mar 20, 2026
Cloud Data Governance: Life Cycle, Global Regulations, and Compliance Frameworks
Mar 13, 2026
Cloud eDiscovery and Jurisdictional Conflicts
Mar 06, 2026
GDPR vs The CLOUD Act: Navigating Global Data Sovereignty
Feb 27, 2026
Hypervisor - Security and Architecture : AWS, GCP, Azure
Feb 20, 2026
Confidential Computing and Trusted Execution Environments (TEEs) in the Cloud
Feb 13, 2026
Cloud Security Alliance's Governance Frameworks: Cloud Control Matrix and STAR
Feb 07, 2026
Well Architected Framework :The Architecture of Resilience
Feb 06, 2026
Engineering Resilience: The Netflix Chaos Framework
Feb 02, 2026
The Architecture of Isolation: Virtualization Security and Cloud Exploits
Jan 28, 2026
SS7 Attacks: Decade Old Flow In Your Phone, Vulnerabilities, Exploitation, and Remediation
Jan 23, 2026
Security Architectures: Zero Trust vs Defence in Depth
Jan 16, 2026
Salesforce/Salesloft Cyber Incident 2025: Identity and API Crisis Analysis
Jan 09, 2026
MFA Fatigue and Social Engineering Cyber Incidents
Dec 26, 2025
Willow Processor: Fault Tolerance and Verifiable Quantum Advantage
Dec 19, 2025
Cybersecurity Strategies 2025: Attack, Defence, and Future Trends
Dec 12, 2025
Federal Information Processing Standards(FIPS): Security, Adoption, and Key Standards
Dec 05, 2025
FIDO2: Deep Dive into The New Passwordless Authentication Standard
Nov 28, 2025
Virtualisation and VDI: Architecture, Security, Exploitation, and Resilience
Nov 21, 2025
Eternal Blue & WannaCry: How NSA secret leaked & Cost the world $10B
Nov 14, 2025
Cozy Bear's(APT29) Quiet Espionage Against the DNC
Nov 07, 2025
Due Diligence and Due Care in Security Governance
Nov 03, 2025
Jaguar Land Rover 2025 Cyber Failure: Resilience and IT/OT Breakdown
Nov 01, 2025
SIEM, SOAR, EDR, and DLP: The Integrated Cybersecurity Ecosystem
Oct 30, 2025
Single Sign-On(SSO) Protocols: Kerberos, SAML, OAuth, and OpenID Connect
Oct 29, 2025
Overflow, RCE, and MITM Attacks: Advanced Cyber Threats
Oct 27, 2025
Australia's Cyber Security Act 2024: Analysis and Impact
Oct 26, 2025
AWS US-EAST-1 Outage: Cascading Failure and Systemic Fragility
Oct 25, 2025
OAIC and ACSC: Australian Cyber Preparedness and Response Benchmarks
Oct 24, 2025
Quantum World Congress 2025: Summary and Key Themes
Oct 22, 2025
Optus Data Breach: A Deep Analysis of Broken API & Corporate Negligence
Oct 21, 2025
Medibank Cyber Incident 2022: Analysis and Lessons Learned
Oct 20, 2025
Qantas 2025 Cyber Attack: Supply Chain Attack and Incident Response
Oct 19, 2025
REST APIs and Webhooks: Architecture and Security Deep Dive
Oct 18, 2025
OAIC vs Australian Clinical Labs: Establishment of Australia's Privacy Enforcement Benchmark
Oct 18, 2025
The AI Crawler Bots Arms Race: Threat Report
Oct 17, 2025
NIST PQC: The Race for Post-Quantum Standards
Oct 16, 2025
Active Directory, EntraID, Azure AD: MS Identity Services Architecture, Security & Incidents
Oct 15, 2025
OpenSSL: Architecture, Agility, and Quantum Resilience
Oct 14, 2025
AWS Security: An Exhaustive Analysis of its Defense in Depth Architecture
Oct 13, 2025
HTTP/2 Deep Dive: Architecture, Security, Vulnerabilities & Quantum Threat
Oct 12, 2025
ISO 27001: Strategic Information Security Framework
Oct 11, 2025
AWS ELB, Route 53, and CloudFront Deep Dive
Oct 10, 2025
SolarWind's Supply Chain Espionage: How Sunburst Attack Shattered Digital Trust
Oct 09, 2025
Pillars of Cyber Risk : Vectors, Surface, Appetite, Tolerance
Oct 06, 2025
CISSP Domain-8: Software Development Security
Oct 05, 2025
Capital One Cloud Breach: Misconfigured WAF and Least Privilege Principle Violation
Oct 04, 2025
JFrog Artifactory: DevSecOps, Binary Repository Management and Image Security
Oct 02, 2025
CISSP Domain-7: Security Operations
Oct 01, 2025
CISSP Domain-6: Security Assessment and Testing
Sep 30, 2025
Australian Privacy Principles: Deep Dive for InfoSec Professionals
Sep 29, 2025
CISSP Domain-5: Identity and Access Management (IAM)
Sep 28, 2025
ISO 27005: A Strategic Deep Dive into Information Security Risk Management
Sep 27, 2025
CISSP Domain-4: Communication and Network Security
Sep 27, 2025
CISSP Domain-3: Architectures, Cryptography, and Physical Security.
Sep 27, 2025
CISSP Domain-2: Asset Security
Sep 27, 2025
CISSP Domain-1: Security, Risk, and Compliance Management
Sep 27, 2025
AWS GuardDuty: Threat Hunting Beyond Alerts, Architecture and Incidents
Sep 25, 2025
XSS, CSRF, and SSRF Analysis: Web Application Forgeries.
Sep 24, 2025
AWS Security Incident Lessons: Customer Failure Archetypes
Sep 20, 2025
AWS IAM: Architecture, Security, and Incident Analysis
Sep 19, 2025
NIST Privacy Framework: Enterprise Risk Management for the Digital Age
Sep 19, 2025
AWS Container Security, Architecture and Incident Response
Sep 19, 2025
NIST Risk Management Framework: Cybersecurity's Gold Standard
Sep 18, 2025
Uber 2022 Data Breach: How an 18 Year Old Hacker Exploited Human Nature
Sep 18, 2025
NIST Cybersecurity Framework: A Guide to Digital Resilience
Sep 17, 2025
IPv6 on AWS: Architecture, Benefits, and Security
Sep 16, 2025
Quantum Supremacy: Reshaping the Future
Sep 16, 2025
Digital Forensics: Unmasking the secret world of digital ghost
Sep 15, 2025
AWS API Gateway: Architecture, Use Cases, and Security
Sep 14, 2025
Deep Dive: Mobile Apps and Unpacking Its Hidden Security
Sep 14, 2025
OWASP API Security Top-10(2023): Essential Deep Dive
Sep 14, 2025
Vulnerability Management and Scoring Systems
Sep 13, 2025
Lattice-Based Post-Quantum Cryptography: A Comprehensive Guide
Sep 13, 2025
Session Cookies: The Digital Passport to Your Online Life
Sep 13, 2025
Microservices Unpacked: Architecture, Principles, Security, and Strategic Implications
Sep 13, 2025
APIs & Gateways: The Invisible Digital Backbone
Sep 13, 2025
OWASP Top-10 A02 Cryptographic Failures: The Encryption Exploit
Sep 13, 2025
Passkeys: Passwordless future and its hidden traps
Sep 12, 2025
OSI Layer-7 Application Layer Incident Response
Sep 12, 2025
OSI Layer-6 Presentation Layer: Incident Response
Sep 12, 2025
Heartbleed CVE-2014-0160: The invisible flaw that bled the internet dry
Sep 12, 2025
AI Powered OSINT
Sep 12, 2025
The Invisibe Web: Your Public Digital Footprint
Sep 12, 2025
OSINT(Open Source Intelligence): Threats & Digital Self-Defense
Sep 12, 2025
Public Key Infrastructure(PKI): Invisible Architect of Digital Trust
Sep 12, 2025
IPsec Deep Dive: Security, Vulnerabilities, and Quantum Evolution
Sep 12, 2025
S/MIME, PGP, and GPG: Securing Digital Communication for True Privacy
Sep 10, 2025
Injection Vulnerabilities: A Comprehensive Guide
Sep 09, 2025
OSI Presentation Layer: Security, Exploits, and Defenses
Sep 08, 2025
Invisible Frontline: Decoding OSI Layer-7 Application Layer Incident Response
Sep 08, 2025
OSI Application Layer 7 Security: Exploits and Defense
Sep 08, 2025
Open Source Intelligence(OSINT): Real-World Applications and Case Studies
Sep 08, 2025
Advanced Persistant Threat(APT): Who are they? What do they want?
Sep 08, 2025
Secure Hash Algorithm (SHA): A Comprehensive Analysis-Foundations, Evolution, Applications, and Post-Quantum Resilience
Sep 08, 2025
Vulnerability Management: Understanding CVE, CVSS, and NVD
Sep 07, 2025
Navigating Cryptographic Agility: A Deep Dive into Resilient Security
Sep 07, 2025
Quantum Computing's Rapid Ascent in 2025: Milestones and Dual Impact
Sep 06, 2025
Australia's Post-Quantum Cryptography(PQC) Readiness: Challenges and Imperatives
Sep 06, 2025
Threats, Vulnerabilities, and Risk: A Comprehensive Guide
Sep 06, 2025
OSI Model: Your Data's Journey through the invisible layers of the Internet!
Sep 06, 2025
RSA Encryption: The silent guardian facing quantum revolution!
Sep 06, 2025
Mosca's Theorem: Are you ready for Quantum threat(Q-Day)?
Sep 06, 2025
Elliptic Curve Cryptography: Foundations, Applications, and Quantum Future
Sep 06, 2025
Cryptographic Agility: A Strategic Imperative for Cybersecurity Resilience
Sep 06, 2025
Unveiling Blockchains: Beyond Bitcoins, True Power in our world!
Sep 06, 2025
AES Encryption Explained: Your invisible online guardian!
Sep 06, 2025
IPv6: Unpacking the Internet's infinite future and why we need it NOW!
Sep 06, 2025
Web3: Allure, Abyss, and the Decentralized Wild West
Sep 06, 2025
Phishing: The Art of Digital Deception
Sep 06, 2025
Google Chrome: Capabilities, Security, and Vulnerabilities
Sep 06, 2025
The Quantum Internet: A Hybrid Frontier
Sep 06, 2025
Quantum Crossroads: Securing Our Digital Future from Distributed Quantum Computing Threats
Sep 06, 2025
Homomorphic Encryption: Securing Data in Use
Sep 06, 2025
Unravelling TLS 1.2: Security, Handshake, and Vulnerabilities
Sep 06, 2025
Email Forensics: Uncovering Digital Evidences
Sep 06, 2025
Data Breach & Spill: PII & PHI Explained
Sep 06, 2025
Zero Trust: Digital Survival Guide in a Treacherous Online World
Sep 06, 2025
Confidentiality Integrity Availability(CIA Triad): The ultimate guide
Sep 06, 2025
Authentication Authorisation & Accounting: Digital fortress of Information Security
Sep 06, 2025
Trusted Platform Module(TPM): Invisible Hardware Guardian Against Cyber Threats
Sep 06, 2025
Quantum Computing: A Deep Dive, from spooky action to world changing technology
Sep 06, 2025
The Harvest Now, Decrypt Later Threat and Quantum computing: What we must do today?
Sep 06, 2025
Governance Risk & Compliance(GRC): Study Guide
Sep 06, 2025
OWASP Top 10 A01 -Broken Access Control: A Comprehensive Guide, why the #1 Web vulnerability threatens your digital security
Sep 06, 2025
2025's Top Cyber Incident
Sep 06, 2025
The Explainer: AWS WAF, Shield and Firewall Manager
Sep 06, 2025
Essential Eight Cybersecurity Maturity Model
Sep 06, 2025
Browser: The New Cybersecurity Battleground
Sep 06, 2025
Quantum AI: Future Computing and Its Impacts
Sep 06, 2025
Quantum Threat to Cryptography
Sep 06, 2025
OWASP Top 10 (2021) Comprehensive Guide
Sep 06, 2025
Information Security Manual(ISM): Principles and Guidelines
Sep 06, 2025
MITRE ATT&CK Matrices: Decoding a Cyberattack's Playbook
Sep 06, 2025
Post-Quantum Cryptography(PQC): Preparing for the Quantum Menace
Sep 06, 2025
AI's role in Cyber Security
Sep 06, 2025