Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Logging Monitoring and Audit in Cloud Environment
|
May 07, 2026 |
|
Risk Assessment in Cyber Security
|
Apr 30, 2026 |
|
Risk Governance in Cyber Security: Foundations and Frameworks
|
Apr 23, 2026 |
|
Cloud Forensic : Trustworthiness of Digital Evidence in Cloud Environments
|
Apr 16, 2026 |
|
VM Escape in Cloud: Hypervisor Security and the Evolution of Virtual Isolation
|
Apr 09, 2026 |
|
VM and Resource Sprawl: Mastering Cloud Efficiency
|
Apr 02, 2026 |
|
Zero-Click Attacks: The Invisible Cyber Threats
|
Mar 26, 2026 |
|
Crypto-Shredding: Cloud Data Sanitization and Quantum Security Strategies
|
Mar 20, 2026 |
|
Cloud Data Governance: Life Cycle, Global Regulations, and Compliance Frameworks
|
Mar 13, 2026 |
|
Cloud eDiscovery and Jurisdictional Conflicts
|
Mar 06, 2026 |
|
GDPR vs The CLOUD Act: Navigating Global Data Sovereignty
|
Feb 27, 2026 |
|
Hypervisor - Security and Architecture : AWS, GCP, Azure
|
Feb 20, 2026 |
|
Confidential Computing and Trusted Execution Environments (TEEs) in the Cloud
|
Feb 13, 2026 |
|
Cloud Security Alliance's Governance Frameworks: Cloud Control Matrix and STAR
|
Feb 07, 2026 |
|
Well Architected Framework :The Architecture of Resilience
|
Feb 06, 2026 |
|
Engineering Resilience: The Netflix Chaos Framework
|
Feb 02, 2026 |
|
The Architecture of Isolation: Virtualization Security and Cloud Exploits
|
Jan 28, 2026 |
|
SS7 Attacks: Decade Old Flow In Your Phone, Vulnerabilities, Exploitation, and Remediation
|
Jan 23, 2026 |
|
Security Architectures: Zero Trust vs Defence in Depth
|
Jan 16, 2026 |
|
Salesforce/Salesloft Cyber Incident 2025: Identity and API Crisis Analysis
|
Jan 09, 2026 |
|
MFA Fatigue and Social Engineering Cyber Incidents
|
Dec 26, 2025 |
|
Willow Processor: Fault Tolerance and Verifiable Quantum Advantage
|
Dec 19, 2025 |
|
Cybersecurity Strategies 2025: Attack, Defence, and Future Trends
|
Dec 12, 2025 |
|
Federal Information Processing Standards(FIPS): Security, Adoption, and Key Standards
|
Dec 05, 2025 |
|
FIDO2: Deep Dive into The New Passwordless Authentication Standard
|
Nov 28, 2025 |
|
Virtualisation and VDI: Architecture, Security, Exploitation, and Resilience
|
Nov 21, 2025 |
|
Eternal Blue & WannaCry: How NSA secret leaked & Cost the world $10B
|
Nov 14, 2025 |
|
Cozy Bear's(APT29) Quiet Espionage Against the DNC
|
Nov 07, 2025 |
|
Due Diligence and Due Care in Security Governance
|
Nov 03, 2025 |
|
Jaguar Land Rover 2025 Cyber Failure: Resilience and IT/OT Breakdown
|
Nov 01, 2025 |
|
SIEM, SOAR, EDR, and DLP: The Integrated Cybersecurity Ecosystem
|
Oct 30, 2025 |
|
Single Sign-On(SSO) Protocols: Kerberos, SAML, OAuth, and OpenID Connect
|
Oct 29, 2025 |
|
Overflow, RCE, and MITM Attacks: Advanced Cyber Threats
|
Oct 27, 2025 |
|
Australia's Cyber Security Act 2024: Analysis and Impact
|
Oct 26, 2025 |
|
AWS US-EAST-1 Outage: Cascading Failure and Systemic Fragility
|
Oct 25, 2025 |
|
OAIC and ACSC: Australian Cyber Preparedness and Response Benchmarks
|
Oct 24, 2025 |
|
Quantum World Congress 2025: Summary and Key Themes
|
Oct 22, 2025 |
|
Optus Data Breach: A Deep Analysis of Broken API & Corporate Negligence
|
Oct 21, 2025 |
|
Medibank Cyber Incident 2022: Analysis and Lessons Learned
|
Oct 20, 2025 |
|
Qantas 2025 Cyber Attack: Supply Chain Attack and Incident Response
|
Oct 19, 2025 |
|
REST APIs and Webhooks: Architecture and Security Deep Dive
|
Oct 18, 2025 |
|
OAIC vs Australian Clinical Labs: Establishment of Australia's Privacy Enforcement Benchmark
|
Oct 18, 2025 |
|
The AI Crawler Bots Arms Race: Threat Report
|
Oct 17, 2025 |
|
NIST PQC: The Race for Post-Quantum Standards
|
Oct 16, 2025 |
|
Active Directory, EntraID, Azure AD: MS Identity Services Architecture, Security & Incidents
|
Oct 15, 2025 |
|
OpenSSL: Architecture, Agility, and Quantum Resilience
|
Oct 14, 2025 |
|
AWS Security: An Exhaustive Analysis of its Defense in Depth Architecture
|
Oct 13, 2025 |
|
HTTP/2 Deep Dive: Architecture, Security, Vulnerabilities & Quantum Threat
|
Oct 12, 2025 |
|
ISO 27001: Strategic Information Security Framework
|
Oct 11, 2025 |
|
AWS ELB, Route 53, and CloudFront Deep Dive
|
Oct 10, 2025 |
|
SolarWind's Supply Chain Espionage: How Sunburst Attack Shattered Digital Trust
|
Oct 09, 2025 |
|
Pillars of Cyber Risk : Vectors, Surface, Appetite, Tolerance
|
Oct 06, 2025 |
|
CISSP Domain-8: Software Development Security
|
Oct 05, 2025 |
|
Capital One Cloud Breach: Misconfigured WAF and Least Privilege Principle Violation
|
Oct 04, 2025 |
|
JFrog Artifactory: DevSecOps, Binary Repository Management and Image Security
|
Oct 02, 2025 |
|
CISSP Domain-7: Security Operations
|
Oct 01, 2025 |
|
CISSP Domain-6: Security Assessment and Testing
|
Sep 30, 2025 |
|
Australian Privacy Principles: Deep Dive for InfoSec Professionals
|
Sep 29, 2025 |
|
CISSP Domain-5: Identity and Access Management (IAM)
|
Sep 28, 2025 |
|
ISO 27005: A Strategic Deep Dive into Information Security Risk Management
|
Sep 27, 2025 |
|
CISSP Domain-4: Communication and Network Security
|
Sep 27, 2025 |
|
CISSP Domain-3: Architectures, Cryptography, and Physical Security.
|
Sep 27, 2025 |
|
CISSP Domain-2: Asset Security
|
Sep 27, 2025 |
|
CISSP Domain-1: Security, Risk, and Compliance Management
|
Sep 27, 2025 |
|
AWS GuardDuty: Threat Hunting Beyond Alerts, Architecture and Incidents
|
Sep 25, 2025 |
|
XSS, CSRF, and SSRF Analysis: Web Application Forgeries.
|
Sep 24, 2025 |
|
AWS Security Incident Lessons: Customer Failure Archetypes
|
Sep 20, 2025 |
|
AWS IAM: Architecture, Security, and Incident Analysis
|
Sep 19, 2025 |
|
NIST Privacy Framework: Enterprise Risk Management for the Digital Age
|
Sep 19, 2025 |
|
AWS Container Security, Architecture and Incident Response
|
Sep 19, 2025 |
|
NIST Risk Management Framework: Cybersecurity's Gold Standard
|
Sep 18, 2025 |
|
Uber 2022 Data Breach: How an 18 Year Old Hacker Exploited Human Nature
|
Sep 18, 2025 |
|
NIST Cybersecurity Framework: A Guide to Digital Resilience
|
Sep 17, 2025 |
|
IPv6 on AWS: Architecture, Benefits, and Security
|
Sep 16, 2025 |
|
Quantum Supremacy: Reshaping the Future
|
Sep 16, 2025 |
|
Digital Forensics: Unmasking the secret world of digital ghost
|
Sep 15, 2025 |
|
AWS API Gateway: Architecture, Use Cases, and Security
|
Sep 14, 2025 |
|
Deep Dive: Mobile Apps and Unpacking Its Hidden Security
|
Sep 14, 2025 |
|
OWASP API Security Top-10(2023): Essential Deep Dive
|
Sep 14, 2025 |
|
Vulnerability Management and Scoring Systems
|
Sep 13, 2025 |
|
Lattice-Based Post-Quantum Cryptography: A Comprehensive Guide
|
Sep 13, 2025 |
|
Session Cookies: The Digital Passport to Your Online Life
|
Sep 13, 2025 |
|
Microservices Unpacked: Architecture, Principles, Security, and Strategic Implications
|
Sep 13, 2025 |
|
APIs & Gateways: The Invisible Digital Backbone
|
Sep 13, 2025 |
|
OWASP Top-10 A02 Cryptographic Failures: The Encryption Exploit
|
Sep 13, 2025 |
|
Passkeys: Passwordless future and its hidden traps
|
Sep 12, 2025 |
|
OSI Layer-7 Application Layer Incident Response
|
Sep 12, 2025 |
|
OSI Layer-6 Presentation Layer: Incident Response
|
Sep 12, 2025 |
|
Heartbleed CVE-2014-0160: The invisible flaw that bled the internet dry
|
Sep 12, 2025 |
|
AI Powered OSINT
|
Sep 12, 2025 |
|
The Invisibe Web: Your Public Digital Footprint
|
Sep 12, 2025 |
|
OSINT(Open Source Intelligence): Threats & Digital Self-Defense
|
Sep 12, 2025 |
|
Public Key Infrastructure(PKI): Invisible Architect of Digital Trust
|
Sep 12, 2025 |
|
IPsec Deep Dive: Security, Vulnerabilities, and Quantum Evolution
|
Sep 12, 2025 |
|
S/MIME, PGP, and GPG: Securing Digital Communication for True Privacy
|
Sep 10, 2025 |
|
Injection Vulnerabilities: A Comprehensive Guide
|
Sep 09, 2025 |
|
OSI Presentation Layer: Security, Exploits, and Defenses
|
Sep 08, 2025 |
|
Invisible Frontline: Decoding OSI Layer-7 Application Layer Incident Response
|
Sep 08, 2025 |
|
OSI Application Layer 7 Security: Exploits and Defense
|
Sep 08, 2025 |
|
Open Source Intelligence(OSINT): Real-World Applications and Case Studies
|
Sep 08, 2025 |
|
Advanced Persistant Threat(APT): Who are they? What do they want?
|
Sep 08, 2025 |
|
Secure Hash Algorithm (SHA): A Comprehensive Analysis-Foundations, Evolution, Applications, and Post-Quantum Resilience
|
Sep 08, 2025 |
|
Vulnerability Management: Understanding CVE, CVSS, and NVD
|
Sep 07, 2025 |
|
Navigating Cryptographic Agility: A Deep Dive into Resilient Security
|
Sep 07, 2025 |
|
Quantum Computing's Rapid Ascent in 2025: Milestones and Dual Impact
|
Sep 06, 2025 |
|
Australia's Post-Quantum Cryptography(PQC) Readiness: Challenges and Imperatives
|
Sep 06, 2025 |
|
Threats, Vulnerabilities, and Risk: A Comprehensive Guide
|
Sep 06, 2025 |
|
OSI Model: Your Data's Journey through the invisible layers of the Internet!
|
Sep 06, 2025 |
|
RSA Encryption: The silent guardian facing quantum revolution!
|
Sep 06, 2025 |
|
Mosca's Theorem: Are you ready for Quantum threat(Q-Day)?
|
Sep 06, 2025 |
|
Elliptic Curve Cryptography: Foundations, Applications, and Quantum Future
|
Sep 06, 2025 |
|
Cryptographic Agility: A Strategic Imperative for Cybersecurity Resilience
|
Sep 06, 2025 |
|
Unveiling Blockchains: Beyond Bitcoins, True Power in our world!
|
Sep 06, 2025 |
|
AES Encryption Explained: Your invisible online guardian!
|
Sep 06, 2025 |
|
IPv6: Unpacking the Internet's infinite future and why we need it NOW!
|
Sep 06, 2025 |
|
Web3: Allure, Abyss, and the Decentralized Wild West
|
Sep 06, 2025 |
|
Phishing: The Art of Digital Deception
|
Sep 06, 2025 |
|
Google Chrome: Capabilities, Security, and Vulnerabilities
|
Sep 06, 2025 |
|
The Quantum Internet: A Hybrid Frontier
|
Sep 06, 2025 |
|
Quantum Crossroads: Securing Our Digital Future from Distributed Quantum Computing Threats
|
Sep 06, 2025 |
|
Homomorphic Encryption: Securing Data in Use
|
Sep 06, 2025 |
|
Unravelling TLS 1.2: Security, Handshake, and Vulnerabilities
|
Sep 06, 2025 |
|
Email Forensics: Uncovering Digital Evidences
|
Sep 06, 2025 |
|
Data Breach & Spill: PII & PHI Explained
|
Sep 06, 2025 |
|
Zero Trust: Digital Survival Guide in a Treacherous Online World
|
Sep 06, 2025 |
|
Confidentiality Integrity Availability(CIA Triad): The ultimate guide
|
Sep 06, 2025 |
|
Authentication Authorisation & Accounting: Digital fortress of Information Security
|
Sep 06, 2025 |
|
Trusted Platform Module(TPM): Invisible Hardware Guardian Against Cyber Threats
|
Sep 06, 2025 |
|
Quantum Computing: A Deep Dive, from spooky action to world changing technology
|
Sep 06, 2025 |
|
The Harvest Now, Decrypt Later Threat and Quantum computing: What we must do today?
|
Sep 06, 2025 |
|
Governance Risk & Compliance(GRC): Study Guide
|
Sep 06, 2025 |
|
OWASP Top 10 A01 -Broken Access Control: A Comprehensive Guide, why the #1 Web vulnerability threatens your digital security
|
Sep 06, 2025 |
|
2025's Top Cyber Incident
|
Sep 06, 2025 |
|
The Explainer: AWS WAF, Shield and Firewall Manager
|
Sep 06, 2025 |
|
Essential Eight Cybersecurity Maturity Model
|
Sep 06, 2025 |
|
Browser: The New Cybersecurity Battleground
|
Sep 06, 2025 |
|
Quantum AI: Future Computing and Its Impacts
|
Sep 06, 2025 |
|
Quantum Threat to Cryptography
|
Sep 06, 2025 |
|
OWASP Top 10 (2021) Comprehensive Guide
|
Sep 06, 2025 |
|
Information Security Manual(ISM): Principles and Guidelines
|
Sep 06, 2025 |
|
MITRE ATT&CK Matrices: Decoding a Cyberattack's Playbook
|
Sep 06, 2025 |
|
Post-Quantum Cryptography(PQC): Preparing for the Quantum Menace
|
Sep 06, 2025 |
|
AI's role in Cyber Security
|
Sep 06, 2025 |