<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-giac-gcld-audio-course" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The GIAC GCLD Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-giac-gcld-audio-course</itunes:new-feed-url>
    <description>This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late. You’ll build a practical, defensible security posture across compute, containers, storage, and managed services by using hardened baselines, policy enforcement, continuous validation, and clear ownership. Along the way, you’ll learn how to reduce attack surface with immutable deployment patterns, least privilege workload identities, safe sharing defaults, and recovery-focused controls like versioning and lifecycle rules.

You’ll also strengthen detection and response by choosing high-signal monitoring that reveals attacker movement, correlating identity abuse across logins, tokens, and privilege changes, and tuning alerts so responders focus on what actually matters. The course includes actionable playbooks for investigating cloud alerts, preventing data leakage with blocking controls and step-up authentication for risky actions, and preparing audit-ready evidence that aligns logs, configurations, access reviews, and exceptions. The result is a cloud security approach that is operational, repeatable, and built for teams who need measurable risk reduction—not just best-practice slogans.
</description>
    <copyright>2026 Bare Metal Cyber</copyright>
    <podcast:guid>a7158aa6-9413-5ab4-bc40-e1944b3987d9</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="506cc512-6361-5285-8cdf-7de14a0f5a64" feedUrl="https://feeds.transistor.fm/certified-aws-certified-cloud-practitioner"/>
      <podcast:remoteItem feedGuid="e22138d1-f567-5f24-bec2-72e7ba690bfe" feedUrl="https://feeds.transistor.fm/certified-the-giac-gpcs-audio-course"/>
      <podcast:remoteItem feedGuid="a0397309-9940-5e31-a4f8-b9c822b9212a" feedUrl="https://feeds.transistor.fm/framework-nist-800-53-audio-course-05bccba8-c74c-4b5e-a5eb-93af7b049a3b"/>
      <podcast:remoteItem feedGuid="3d181116-9f44-5698-bfe8-31035d41873c" feedUrl="https://feeds.transistor.fm/certified-azure-az-900-microsoft-azure-fundamentals"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="c49aa2e8-58e4-500c-a099-75a61254f4a8" feedUrl="https://feeds.transistor.fm/certified-ccsp-45cbf1dc-9b01-46bc-834e-830acbcf637b"/>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="6b71639e-04bb-5242-a4af-377bc46b4eae" feedUrl="https://feeds.transistor.fm/certified-comptia-cloud"/>
      <podcast:remoteItem feedGuid="dd19cb51-faa8-5990-873c-5a1b155835f4" feedUrl="https://feeds.transistor.fm/certified-google-cloud-digital-leader-audio-course"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>93eddb60-0aea-11f1-9632-fb3aae762536</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Tue, 10 Feb 2026 15:32:52 -0600" url="https://media.transistor.fm/6b9d4f3b/dc086ecf.mp3" length="733536" type="audio/mpeg">Welcome to Certified: The GIAC GCLD Audio Course</podcast:trailer>
    <language>en</language>
    <pubDate>Sun, 17 May 2026 00:50:28 -0500</pubDate>
    <lastBuildDate>Sun, 17 May 2026 00:51:03 -0500</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/CgF-8hJQvJ5qLBxqmTUpXjBE3oNcsJ06nybvD2CD628/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOGYx/MTcyYTZlYjMwZDQ4/MjRlYzkwYTk4NTc4/OGFiMC5wbmc.jpg</url>
      <title>Certified: The GIAC GCLD Audio Course</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/CgF-8hJQvJ5qLBxqmTUpXjBE3oNcsJ06nybvD2CD628/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOGYx/MTcyYTZlYjMwZDQ4/MjRlYzkwYTk4NTc4/OGFiMC5wbmc.jpg"/>
    <itunes:summary>This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late. You’ll build a practical, defensible security posture across compute, containers, storage, and managed services by using hardened baselines, policy enforcement, continuous validation, and clear ownership. Along the way, you’ll learn how to reduce attack surface with immutable deployment patterns, least privilege workload identities, safe sharing defaults, and recovery-focused controls like versioning and lifecycle rules.

You’ll also strengthen detection and response by choosing high-signal monitoring that reveals attacker movement, correlating identity abuse across logins, tokens, and privilege changes, and tuning alerts so responders focus on what actually matters. The course includes actionable playbooks for investigating cloud alerts, preventing data leakage with blocking controls and step-up authentication for risky actions, and preparing audit-ready evidence that aligns logs, configurations, access reviews, and exceptions. The result is a cloud security approach that is operational, repeatable, and built for teams who need measurable risk reduction—not just best-practice slogans.
</itunes:summary>
    <itunes:subtitle>This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late.</itunes:subtitle>
    <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1 — Decode the GCLD exam format, rules, scoring, and timing calmly</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Decode the GCLD exam format, rules, scoring, and timing calmly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b14f0b3-1013-4483-bbfc-60d3c57bfb4c</guid>
      <link>https://share.transistor.fm/s/8a3f6019</link>
      <description>
        <![CDATA[<p>This episode breaks down what to expect on the GCLD exam so you can spend your effort on mastery instead of guesswork. You’ll clarify how question styles, timing pressure, and scoring mechanics shape test strategy, including why pacing matters even when you “know the material.” We’ll cover practical approaches for reading for intent, eliminating distractors, and deciding when to mark-and-move versus commit to an answer. You’ll also learn how exam rules influence risk decisions, such as avoiding time sinks on low-confidence items and protecting time for higher-value questions you can secure quickly. The goal is a calm, repeatable method that reduces surprises and improves consistency under timed conditions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode breaks down what to expect on the GCLD exam so you can spend your effort on mastery instead of guesswork. You’ll clarify how question styles, timing pressure, and scoring mechanics shape test strategy, including why pacing matters even when you “know the material.” We’ll cover practical approaches for reading for intent, eliminating distractors, and deciding when to mark-and-move versus commit to an answer. You’ll also learn how exam rules influence risk decisions, such as avoiding time sinks on low-confidence items and protecting time for higher-value questions you can secure quickly. The goal is a calm, repeatable method that reduces surprises and improves consistency under timed conditions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:21:13 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8a3f6019/5d112d2d.mp3" length="32314363" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>807</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode breaks down what to expect on the GCLD exam so you can spend your effort on mastery instead of guesswork. You’ll clarify how question styles, timing pressure, and scoring mechanics shape test strategy, including why pacing matters even when you “know the material.” We’ll cover practical approaches for reading for intent, eliminating distractors, and deciding when to mark-and-move versus commit to an answer. You’ll also learn how exam rules influence risk decisions, such as avoiding time sinks on low-confidence items and protecting time for higher-value questions you can secure quickly. The goal is a calm, repeatable method that reduces surprises and improves consistency under timed conditions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8a3f6019/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 2 — Build a spoken study plan that sticks for busy cloud defenders</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Build a spoken study plan that sticks for busy cloud defenders</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2a012114-99d7-447e-96bf-d60b0b1b933e</guid>
      <link>https://share.transistor.fm/s/cbeb0be4</link>
      <description>
        <![CDATA[<p>This episode focuses on turning exam objectives into a realistic plan you can execute alongside a full workload. You’ll learn how to convert broad domains into weekly outcomes, how to sequence topics so foundations support advanced material, and how to use short review cycles to keep retention high. We’ll connect study planning to exam performance by emphasizing spaced repetition, targeted practice by weak area, and time-boxed sessions that still produce measurable progress. You’ll also explore troubleshooting common failure modes, like “reading without recall,” over-investing in favorite topics, or skipping review until it’s too late. By the end, you’ll have a plan structure you can reuse, adjust, and sustain through the full prep window. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on turning exam objectives into a realistic plan you can execute alongside a full workload. You’ll learn how to convert broad domains into weekly outcomes, how to sequence topics so foundations support advanced material, and how to use short review cycles to keep retention high. We’ll connect study planning to exam performance by emphasizing spaced repetition, targeted practice by weak area, and time-boxed sessions that still produce measurable progress. You’ll also explore troubleshooting common failure modes, like “reading without recall,” over-investing in favorite topics, or skipping review until it’s too late. By the end, you’ll have a plan structure you can reuse, adjust, and sustain through the full prep window. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:21:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cbeb0be4/bddaf093.mp3" length="33997694" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>849</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on turning exam objectives into a realistic plan you can execute alongside a full workload. You’ll learn how to convert broad domains into weekly outcomes, how to sequence topics so foundations support advanced material, and how to use short review cycles to keep retention high. We’ll connect study planning to exam performance by emphasizing spaced repetition, targeted practice by weak area, and time-boxed sessions that still produce measurable progress. You’ll also explore troubleshooting common failure modes, like “reading without recall,” over-investing in favorite topics, or skipping review until it’s too late. By the end, you’ll have a plan structure you can reuse, adjust, and sustain through the full prep window. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cbeb0be4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 3 — Understand shared responsibility clearly across IaaS, PaaS, and SaaS realities</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Understand shared responsibility clearly across IaaS, PaaS, and SaaS realities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6988a218-c1f4-4920-9c51-60bccf2cf214</guid>
      <link>https://share.transistor.fm/s/c7ebb9c1</link>
      <description>
        <![CDATA[<p>This episode explains shared responsibility in a way that supports exam questions and real incident accountability. You’ll define what the provider secures versus what you must secure, then apply that model across IaaS, PaaS, and SaaS where the boundaries shift in meaningful ways. We’ll use practical scenarios, such as misconfigured storage exposure or identity misuse, to show how defenders can be “responsible” even when they do not “control” the underlying platform. You’ll also learn how misunderstanding responsibility leads to weak controls, missing logs, and failed audit evidence, especially when teams assume a service is secure “by default.” The outcome is a clear mental map you can apply to architecture decisions, control ownership, and exam item reasoning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains shared responsibility in a way that supports exam questions and real incident accountability. You’ll define what the provider secures versus what you must secure, then apply that model across IaaS, PaaS, and SaaS where the boundaries shift in meaningful ways. We’ll use practical scenarios, such as misconfigured storage exposure or identity misuse, to show how defenders can be “responsible” even when they do not “control” the underlying platform. You’ll also learn how misunderstanding responsibility leads to weak controls, missing logs, and failed audit evidence, especially when teams assume a service is secure “by default.” The outcome is a clear mental map you can apply to architecture decisions, control ownership, and exam item reasoning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:22:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c7ebb9c1/07bc364a.mp3" length="26525660" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>662</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains shared responsibility in a way that supports exam questions and real incident accountability. You’ll define what the provider secures versus what you must secure, then apply that model across IaaS, PaaS, and SaaS where the boundaries shift in meaningful ways. We’ll use practical scenarios, such as misconfigured storage exposure or identity misuse, to show how defenders can be “responsible” even when they do not “control” the underlying platform. You’ll also learn how misunderstanding responsibility leads to weak controls, missing logs, and failed audit evidence, especially when teams assume a service is secure “by default.” The outcome is a clear mental map you can apply to architecture decisions, control ownership, and exam item reasoning. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7ebb9c1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 4 — Apply threat-informed defense by matching controls to real cloud adversaries</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Apply threat-informed defense by matching controls to real cloud adversaries</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">04fecf08-6136-4198-9f5d-fe3aaa47c6e8</guid>
      <link>https://share.transistor.fm/s/9eeb43ec</link>
      <description>
        <![CDATA[<p>This episode teaches how to prioritize defenses based on how cloud attackers actually operate, which is central to designing effective control stacks and answering scenario-driven exam items. You’ll connect adversary behaviors to control outcomes, focusing on how identity abuse, misconfigurations, and automation failures become reliable attacker advantages. We’ll discuss how to choose controls that reduce likelihood and impact, such as tightening permissions, improving detection signals, and constraining exposure, instead of relying on generic checklists. You’ll also learn how to validate that a control meaningfully disrupts an attack path and how to recognize “paper controls” that look strong but do not change attacker options. The result is a practical method for matching risks to defenses with measurable coverage and defensible tradeoffs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to prioritize defenses based on how cloud attackers actually operate, which is central to designing effective control stacks and answering scenario-driven exam items. You’ll connect adversary behaviors to control outcomes, focusing on how identity abuse, misconfigurations, and automation failures become reliable attacker advantages. We’ll discuss how to choose controls that reduce likelihood and impact, such as tightening permissions, improving detection signals, and constraining exposure, instead of relying on generic checklists. You’ll also learn how to validate that a control meaningfully disrupts an attack path and how to recognize “paper controls” that look strong but do not change attacker options. The result is a practical method for matching risks to defenses with measurable coverage and defensible tradeoffs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:22:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9eeb43ec/d66c0483.mp3" length="26848530" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>670</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to prioritize defenses based on how cloud attackers actually operate, which is central to designing effective control stacks and answering scenario-driven exam items. You’ll connect adversary behaviors to control outcomes, focusing on how identity abuse, misconfigurations, and automation failures become reliable attacker advantages. We’ll discuss how to choose controls that reduce likelihood and impact, such as tightening permissions, improving detection signals, and constraining exposure, instead of relying on generic checklists. You’ll also learn how to validate that a control meaningfully disrupts an attack path and how to recognize “paper controls” that look strong but do not change attacker options. The result is a practical method for matching risks to defenses with measurable coverage and defensible tradeoffs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9eeb43ec/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 5 — Identify high-probability cloud attacker goals, incentives, and target choices</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 — Identify high-probability cloud attacker goals, incentives, and target choices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">554058f9-84ca-4b9c-b538-28af4909b92d</guid>
      <link>https://share.transistor.fm/s/0eaf0712</link>
      <description>
        <![CDATA[<p>This episode breaks down why cloud environments are targeted and what attackers most often try to achieve once they enter. You’ll map common goals—data theft, service disruption, cryptomining, persistence, and privilege expansion—to the incentives and constraints attackers face in public cloud. We’ll explore how target choices are driven by exposure, weak identity controls, and high-value data paths, and how those choices show up in logs and alert patterns. You’ll also learn how to use attacker goals to drive prioritization, such as protecting “keys to the kingdom” accounts, isolating sensitive datasets, and hardening pathways that enable rapid monetization. This perspective improves both exam reasoning and real-world triage when you need to decide what matters most first. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode breaks down why cloud environments are targeted and what attackers most often try to achieve once they enter. You’ll map common goals—data theft, service disruption, cryptomining, persistence, and privilege expansion—to the incentives and constraints attackers face in public cloud. We’ll explore how target choices are driven by exposure, weak identity controls, and high-value data paths, and how those choices show up in logs and alert patterns. You’ll also learn how to use attacker goals to drive prioritization, such as protecting “keys to the kingdom” accounts, isolating sensitive datasets, and hardening pathways that enable rapid monetization. This perspective improves both exam reasoning and real-world triage when you need to decide what matters most first. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:22:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0eaf0712/151b61cc.mp3" length="25176697" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>628</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode breaks down why cloud environments are targeted and what attackers most often try to achieve once they enter. You’ll map common goals—data theft, service disruption, cryptomining, persistence, and privilege expansion—to the incentives and constraints attackers face in public cloud. We’ll explore how target choices are driven by exposure, weak identity controls, and high-value data paths, and how those choices show up in logs and alert patterns. You’ll also learn how to use attacker goals to drive prioritization, such as protecting “keys to the kingdom” accounts, isolating sensitive datasets, and hardening pathways that enable rapid monetization. This perspective improves both exam reasoning and real-world triage when you need to decide what matters most first. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0eaf0712/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 6 — Track common initial access paths attackers use in public cloud environments</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Track common initial access paths attackers use in public cloud environments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">640c1562-f767-4f60-adab-20fb617d6b5f</guid>
      <link>https://share.transistor.fm/s/96369cf1</link>
      <description>
        <![CDATA[<p>This episode focuses on the entry points attackers prefer in cloud, which directly supports exam questions about exposure reduction and incident hypotheses. You’ll define initial access in cloud terms, including stolen credentials, over-permissioned tokens, exposed management interfaces, insecure public endpoints, and compromised CI/CD or third-party integrations. We’ll walk through how these paths differ from traditional perimeter intrusion, emphasizing that identity and API access frequently replace “network breach” as the primary opening move. You’ll also learn practical best practices for preventing and detecting initial access, such as tightening authentication controls, reducing internet-facing management, and monitoring abnormal sign-in and token activity. The goal is to recognize early indicators quickly and to understand which defensive controls actually close the most common doors. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the entry points attackers prefer in cloud, which directly supports exam questions about exposure reduction and incident hypotheses. You’ll define initial access in cloud terms, including stolen credentials, over-permissioned tokens, exposed management interfaces, insecure public endpoints, and compromised CI/CD or third-party integrations. We’ll walk through how these paths differ from traditional perimeter intrusion, emphasizing that identity and API access frequently replace “network breach” as the primary opening move. You’ll also learn practical best practices for preventing and detecting initial access, such as tightening authentication controls, reducing internet-facing management, and monitoring abnormal sign-in and token activity. The goal is to recognize early indicators quickly and to understand which defensive controls actually close the most common doors. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:23:13 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/96369cf1/690216d1.mp3" length="26066946" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>650</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the entry points attackers prefer in cloud, which directly supports exam questions about exposure reduction and incident hypotheses. You’ll define initial access in cloud terms, including stolen credentials, over-permissioned tokens, exposed management interfaces, insecure public endpoints, and compromised CI/CD or third-party integrations. We’ll walk through how these paths differ from traditional perimeter intrusion, emphasizing that identity and API access frequently replace “network breach” as the primary opening move. You’ll also learn practical best practices for preventing and detecting initial access, such as tightening authentication controls, reducing internet-facing management, and monitoring abnormal sign-in and token activity. The goal is to recognize early indicators quickly and to understand which defensive controls actually close the most common doors. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/96369cf1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 7 — Recognize privilege escalation patterns unique to cloud identity and policy systems</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Recognize privilege escalation patterns unique to cloud identity and policy systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cdb0f97b-eaaf-4d9a-87d3-c05e7d4b8668</guid>
      <link>https://share.transistor.fm/s/7283bdb1</link>
      <description>
        <![CDATA[<p>This episode explains how cloud privilege escalation often happens through identity, policy, and role assumptions rather than local exploitation. You’ll learn core concepts like permissions boundaries, role chaining, delegated administration, and policy evaluation logic that can create unintended paths to higher privilege. We’ll use practical examples, such as overly broad wildcard actions, pass-role style abuse, and mis-scoped permissions on automation identities, to show how escalation becomes possible even without touching an operating system. You’ll also cover troubleshooting steps: how to reason about “who can grant what,” how to identify high-risk permission combinations, and how to spot escalation clues in control-plane logs. By the end, you’ll have a repeatable way to analyze privilege graphs and reduce escalation opportunities through least privilege and tighter change controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how cloud privilege escalation often happens through identity, policy, and role assumptions rather than local exploitation. You’ll learn core concepts like permissions boundaries, role chaining, delegated administration, and policy evaluation logic that can create unintended paths to higher privilege. We’ll use practical examples, such as overly broad wildcard actions, pass-role style abuse, and mis-scoped permissions on automation identities, to show how escalation becomes possible even without touching an operating system. You’ll also cover troubleshooting steps: how to reason about “who can grant what,” how to identify high-risk permission combinations, and how to spot escalation clues in control-plane logs. By the end, you’ll have a repeatable way to analyze privilege graphs and reduce escalation opportunities through least privilege and tighter change controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:23:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7283bdb1/d5c71f8e.mp3" length="25036691" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>625</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how cloud privilege escalation often happens through identity, policy, and role assumptions rather than local exploitation. You’ll learn core concepts like permissions boundaries, role chaining, delegated administration, and policy evaluation logic that can create unintended paths to higher privilege. We’ll use practical examples, such as overly broad wildcard actions, pass-role style abuse, and mis-scoped permissions on automation identities, to show how escalation becomes possible even without touching an operating system. You’ll also cover troubleshooting steps: how to reason about “who can grant what,” how to identify high-risk permission combinations, and how to spot escalation clues in control-plane logs. By the end, you’ll have a repeatable way to analyze privilege graphs and reduce escalation opportunities through least privilege and tighter change controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7283bdb1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 8 — Contain cloud intrusions fast using isolation, credential resets, and scoped actions</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Contain cloud intrusions fast using isolation, credential resets, and scoped actions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2eb019b-60a8-424b-94df-c82323dc9053</guid>
      <link>https://share.transistor.fm/s/41455d96</link>
      <description>
        <![CDATA[<p>This episode covers containment tactics that work in cloud without causing unnecessary outages or spreading the blast radius. You’ll define containment as limiting attacker ability to act, then apply that idea using isolation controls, segmentation decisions, temporary deny policies, and rapid credential resets. We’ll discuss why “shut it all down” is often the wrong move in cloud, and how scoped actions preserve business continuity while still stopping active misuse. You’ll also learn how to prioritize containment steps when identity compromise is suspected, including what to rotate first, how to revoke sessions safely, and how to prevent the attacker from reestablishing access through automation or persisted tokens. The outcome is a practical, exam-aligned containment playbook you can reason through under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers containment tactics that work in cloud without causing unnecessary outages or spreading the blast radius. You’ll define containment as limiting attacker ability to act, then apply that idea using isolation controls, segmentation decisions, temporary deny policies, and rapid credential resets. We’ll discuss why “shut it all down” is often the wrong move in cloud, and how scoped actions preserve business continuity while still stopping active misuse. You’ll also learn how to prioritize containment steps when identity compromise is suspected, including what to rotate first, how to revoke sessions safely, and how to prevent the attacker from reestablishing access through automation or persisted tokens. The outcome is a practical, exam-aligned containment playbook you can reason through under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:24:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/41455d96/b74f826b.mp3" length="23440089" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>585</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers containment tactics that work in cloud without causing unnecessary outages or spreading the blast radius. You’ll define containment as limiting attacker ability to act, then apply that idea using isolation controls, segmentation decisions, temporary deny policies, and rapid credential resets. We’ll discuss why “shut it all down” is often the wrong move in cloud, and how scoped actions preserve business continuity while still stopping active misuse. You’ll also learn how to prioritize containment steps when identity compromise is suspected, including what to rotate first, how to revoke sessions safely, and how to prevent the attacker from reestablishing access through automation or persisted tokens. The outcome is a practical, exam-aligned containment playbook you can reason through under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/41455d96/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 9 — Preserve cloud evidence correctly so investigations remain reliable and defensible</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — Preserve cloud evidence correctly so investigations remain reliable and defensible</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fcd3e140-1fa7-4a5f-a61c-bbb3f93af434</guid>
      <link>https://share.transistor.fm/s/c8bffb8e</link>
      <description>
        <![CDATA[<p>This episode explains how to preserve evidence in cloud environments so your investigation remains trustworthy and your conclusions can withstand scrutiny. You’ll define evidence sources in cloud terms, including identity logs, control-plane activity, data access logs, workload telemetry, and configuration history, then discuss why integrity and chain-of-custody considerations still apply. We’ll cover best practices like centralized log storage, immutability controls, least-privilege access to evidence repositories, and careful use of snapshots or exports that avoid altering the system state unnecessarily. You’ll also learn troubleshooting considerations, such as gaps caused by disabled logging, retention limits, region variance, and clock drift that breaks timelines. By the end, you’ll be able to identify what to collect first and how to protect it from tampering during a live response. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to preserve evidence in cloud environments so your investigation remains trustworthy and your conclusions can withstand scrutiny. You’ll define evidence sources in cloud terms, including identity logs, control-plane activity, data access logs, workload telemetry, and configuration history, then discuss why integrity and chain-of-custody considerations still apply. We’ll cover best practices like centralized log storage, immutability controls, least-privilege access to evidence repositories, and careful use of snapshots or exports that avoid altering the system state unnecessarily. You’ll also learn troubleshooting considerations, such as gaps caused by disabled logging, retention limits, region variance, and clock drift that breaks timelines. By the end, you’ll be able to identify what to collect first and how to protect it from tampering during a live response. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:24:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c8bffb8e/acb588b8.mp3" length="22893603" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>571</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to preserve evidence in cloud environments so your investigation remains trustworthy and your conclusions can withstand scrutiny. You’ll define evidence sources in cloud terms, including identity logs, control-plane activity, data access logs, workload telemetry, and configuration history, then discuss why integrity and chain-of-custody considerations still apply. We’ll cover best practices like centralized log storage, immutability controls, least-privilege access to evidence repositories, and careful use of snapshots or exports that avoid altering the system state unnecessarily. You’ll also learn troubleshooting considerations, such as gaps caused by disabled logging, retention limits, region variance, and clock drift that breaks timelines. By the end, you’ll be able to identify what to collect first and how to protect it from tampering during a live response. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c8bffb8e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 10 — Recover safely after cloud compromise with controlled rebuilds and trust restoration</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — Recover safely after cloud compromise with controlled rebuilds and trust restoration</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7bfa0c0d-e900-4440-8cd9-6787d9569d0f</guid>
      <link>https://share.transistor.fm/s/2ab4e016</link>
      <description>
        <![CDATA[<p>This episode focuses on recovery as a structured process that restores trust, not just service uptime, which is a key theme in cloud defense and exam scenarios. You’ll define safe recovery practices such as controlled rebuilds, validated configurations, clean identity re-issuance, and careful reintroduction of connectivity so you do not re-enable attacker access. We’ll explain why “restore from backup” is often insufficient when attackers may have modified policies, inserted persistence, or obtained long-lived credentials. You’ll also explore practical recovery checkpoints, including verifying logging, reviewing privileged access, and confirming that recovered services meet security baselines before returning to normal operations. The outcome is an exam-ready mental model for moving from containment to a clean, defensible state with evidence that the environment is trustworthy again. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on recovery as a structured process that restores trust, not just service uptime, which is a key theme in cloud defense and exam scenarios. You’ll define safe recovery practices such as controlled rebuilds, validated configurations, clean identity re-issuance, and careful reintroduction of connectivity so you do not re-enable attacker access. We’ll explain why “restore from backup” is often insufficient when attackers may have modified policies, inserted persistence, or obtained long-lived credentials. You’ll also explore practical recovery checkpoints, including verifying logging, reviewing privileged access, and confirming that recovered services meet security baselines before returning to normal operations. The outcome is an exam-ready mental model for moving from containment to a clean, defensible state with evidence that the environment is trustworthy again. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:24:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2ab4e016/7d253095.mp3" length="28503667" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>711</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on recovery as a structured process that restores trust, not just service uptime, which is a key theme in cloud defense and exam scenarios. You’ll define safe recovery practices such as controlled rebuilds, validated configurations, clean identity re-issuance, and careful reintroduction of connectivity so you do not re-enable attacker access. We’ll explain why “restore from backup” is often insufficient when attackers may have modified policies, inserted persistence, or obtained long-lived credentials. You’ll also explore practical recovery checkpoints, including verifying logging, reviewing privileged access, and confirming that recovered services meet security baselines before returning to normal operations. The outcome is an exam-ready mental model for moving from containment to a clean, defensible state with evidence that the environment is trustworthy again. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2ab4e016/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 11 — Master cloud account fundamentals: tenants, subscriptions, projects, and billing boundaries </title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Master cloud account fundamentals: tenants, subscriptions, projects, and billing boundaries </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b7e6b89-3c2e-4fe4-9c34-8a213d8df1f3</guid>
      <link>https://share.transistor.fm/s/ac659745</link>
      <description>
        <![CDATA[<p> This episode explains how cloud account structures define ownership, isolation, and accountability, which frequently appears in GCLD questions about governance design. You’ll distinguish tenants from subscriptions or projects and connect those boundaries to identity scope, policy inheritance, and financial controls. We’ll cover why billing constructs are not just finance details, but also indicators of operational responsibility, cost anomaly detection, and chargeback models that influence security outcomes. You’ll walk through scenarios where weak boundary decisions create noisy logs, unclear asset ownership, and accidental cross-environment access. You’ll also learn practical best practices for naming, tagging, and structuring accounts so audits, incident response, and least privilege decisions remain clean as environments scale. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This episode explains how cloud account structures define ownership, isolation, and accountability, which frequently appears in GCLD questions about governance design. You’ll distinguish tenants from subscriptions or projects and connect those boundaries to identity scope, policy inheritance, and financial controls. We’ll cover why billing constructs are not just finance details, but also indicators of operational responsibility, cost anomaly detection, and chargeback models that influence security outcomes. You’ll walk through scenarios where weak boundary decisions create noisy logs, unclear asset ownership, and accidental cross-environment access. You’ll also learn practical best practices for naming, tagging, and structuring accounts so audits, incident response, and least privilege decisions remain clean as environments scale. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:25:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ac659745/b4bdfcc3.mp3" length="34044777" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>850</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This episode explains how cloud account structures define ownership, isolation, and accountability, which frequently appears in GCLD questions about governance design. You’ll distinguish tenants from subscriptions or projects and connect those boundaries to identity scope, policy inheritance, and financial controls. We’ll cover why billing constructs are not just finance details, but also indicators of operational responsibility, cost anomaly detection, and chargeback models that influence security outcomes. You’ll walk through scenarios where weak boundary decisions create noisy logs, unclear asset ownership, and accidental cross-environment access. You’ll also learn practical best practices for naming, tagging, and structuring accounts so audits, incident response, and least privilege decisions remain clean as environments scale. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ac659745/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 12 — Design multi-account strategy that reduces blast radius and simplifies governance</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Design multi-account strategy that reduces blast radius and simplifies governance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">46d84b64-3a23-476b-a695-d6567a5ce754</guid>
      <link>https://share.transistor.fm/s/006c275e</link>
      <description>
        <![CDATA[<p> This episode focuses on why multi-account designs are a core cloud defense pattern and how they support exam scenarios involving segmentation, governance, and risk reduction. You’ll define blast radius in cloud terms and see how separating workloads, environments, and administrative functions limits lateral movement and policy mistakes. We’ll compare common multi-account models, including workload-based, environment-based, and function-based structures, and discuss the tradeoffs each introduces for operations and security. You’ll also explore governance mechanics like centralized logging, delegated administration, and shared services accounts, emphasizing how to keep “central” from becoming “overpowered.” By the end, you’ll be able to justify a multi-account approach with clear security outcomes, while avoiding common pitfalls like duplicated controls, inconsistent baselines, and unmanaged exceptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This episode focuses on why multi-account designs are a core cloud defense pattern and how they support exam scenarios involving segmentation, governance, and risk reduction. You’ll define blast radius in cloud terms and see how separating workloads, environments, and administrative functions limits lateral movement and policy mistakes. We’ll compare common multi-account models, including workload-based, environment-based, and function-based structures, and discuss the tradeoffs each introduces for operations and security. You’ll also explore governance mechanics like centralized logging, delegated administration, and shared services accounts, emphasizing how to keep “central” from becoming “overpowered.” By the end, you’ll be able to justify a multi-account approach with clear security outcomes, while avoiding common pitfalls like duplicated controls, inconsistent baselines, and unmanaged exceptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:25:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/006c275e/d338e466.mp3" length="32482633" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>811</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This episode focuses on why multi-account designs are a core cloud defense pattern and how they support exam scenarios involving segmentation, governance, and risk reduction. You’ll define blast radius in cloud terms and see how separating workloads, environments, and administrative functions limits lateral movement and policy mistakes. We’ll compare common multi-account models, including workload-based, environment-based, and function-based structures, and discuss the tradeoffs each introduces for operations and security. You’ll also explore governance mechanics like centralized logging, delegated administration, and shared services accounts, emphasizing how to keep “central” from becoming “overpowered.” By the end, you’ll be able to justify a multi-account approach with clear security outcomes, while avoiding common pitfalls like duplicated controls, inconsistent baselines, and unmanaged exceptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/006c275e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 13 — Structure organizational units and account groupings for predictable security inheritance </title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — Structure organizational units and account groupings for predictable security inheritance </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fef927e3-1a89-4d8c-9290-72db906efbdd</guid>
      <link>https://share.transistor.fm/s/fa4bd680</link>
      <description>
        <![CDATA[<p>This episode teaches how organizational units and account groupings enable consistent policy inheritance, which is a frequent theme in governance and control-mapping exam questions. You’ll define what inheritance means for security controls, including how policies cascade, how exceptions are handled, and where enforcement actually occurs. We’ll walk through a practical design approach that groups accounts by risk and function so guardrails apply predictably without constant manual intervention. You’ll also learn troubleshooting strategies for inheritance failures, such as conflicting policies, ambiguous grouping decisions, and “temporary exceptions” that quietly become permanent. The goal is a structure that supports speed and autonomy for teams while keeping the security model legible, auditable, and resistant to drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how organizational units and account groupings enable consistent policy inheritance, which is a frequent theme in governance and control-mapping exam questions. You’ll define what inheritance means for security controls, including how policies cascade, how exceptions are handled, and where enforcement actually occurs. We’ll walk through a practical design approach that groups accounts by risk and function so guardrails apply predictably without constant manual intervention. You’ll also learn troubleshooting strategies for inheritance failures, such as conflicting policies, ambiguous grouping decisions, and “temporary exceptions” that quietly become permanent. The goal is a structure that supports speed and autonomy for teams while keeping the security model legible, auditable, and resistant to drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:26:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fa4bd680/20281e1d.mp3" length="30007287" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>749</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how organizational units and account groupings enable consistent policy inheritance, which is a frequent theme in governance and control-mapping exam questions. You’ll define what inheritance means for security controls, including how policies cascade, how exceptions are handled, and where enforcement actually occurs. We’ll walk through a practical design approach that groups accounts by risk and function so guardrails apply predictably without constant manual intervention. You’ll also learn troubleshooting strategies for inheritance failures, such as conflicting policies, ambiguous grouping decisions, and “temporary exceptions” that quietly become permanent. The goal is a structure that supports speed and autonomy for teams while keeping the security model legible, auditable, and resistant to drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fa4bd680/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 14 — Set up guardrails early with policies that prevent dangerous service configurations </title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Set up guardrails early with policies that prevent dangerous service configurations </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a709f313-0ed8-4898-a740-b0c78f3126e0</guid>
      <link>https://share.transistor.fm/s/f577f129</link>
      <description>
        <![CDATA[<p> This episode explains how preventative guardrails reduce risk by making unsafe configurations harder or impossible, a key concept for cloud leadership and exam-driven governance decisions. You’ll define guardrails as mandatory constraints, then connect them to policy-as-code, service control restrictions, and baseline configuration requirements that stop common failure modes like public exposure and over-broad identity permissions. We’ll use scenarios such as disabling risky services in sensitive accounts, enforcing encryption defaults, or blocking internet-facing resources without approvals to show how guardrails reduce both incidents and audit findings. You’ll also cover common troubleshooting issues, including overly rigid policies that block legitimate work, weak exception handling, and poor communication that leads to shadow IT. The outcome is a practical method for placing guardrails where they provide the highest risk reduction with the lowest operational friction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This episode explains how preventative guardrails reduce risk by making unsafe configurations harder or impossible, a key concept for cloud leadership and exam-driven governance decisions. You’ll define guardrails as mandatory constraints, then connect them to policy-as-code, service control restrictions, and baseline configuration requirements that stop common failure modes like public exposure and over-broad identity permissions. We’ll use scenarios such as disabling risky services in sensitive accounts, enforcing encryption defaults, or blocking internet-facing resources without approvals to show how guardrails reduce both incidents and audit findings. You’ll also cover common troubleshooting issues, including overly rigid policies that block legitimate work, weak exception handling, and poor communication that leads to shadow IT. The outcome is a practical method for placing guardrails where they provide the highest risk reduction with the lowest operational friction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:26:42 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f577f129/e57d8140.mp3" length="25192386" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>628</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This episode explains how preventative guardrails reduce risk by making unsafe configurations harder or impossible, a key concept for cloud leadership and exam-driven governance decisions. You’ll define guardrails as mandatory constraints, then connect them to policy-as-code, service control restrictions, and baseline configuration requirements that stop common failure modes like public exposure and over-broad identity permissions. We’ll use scenarios such as disabling risky services in sensitive accounts, enforcing encryption defaults, or blocking internet-facing resources without approvals to show how guardrails reduce both incidents and audit findings. You’ll also cover common troubleshooting issues, including overly rigid policies that block legitimate work, weak exception handling, and poor communication that leads to shadow IT. The outcome is a practical method for placing guardrails where they provide the highest risk reduction with the lowest operational friction. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f577f129/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 15 — Establish account-level security baselines that survive rapid growth and change </title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Establish account-level security baselines that survive rapid growth and change </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9d99534a-3e5e-47b8-87da-b60983a1d52d</guid>
      <link>https://share.transistor.fm/s/f678a8ff</link>
      <description>
        <![CDATA[<p> This episode covers how to define and enforce account-level security baselines so controls remain consistent as teams, services, and deployments expand, which aligns closely with GCLD expectations for sustainable governance. You’ll clarify what belongs in a baseline, including logging requirements, identity standards, network defaults, encryption expectations, and monitoring visibility for both control plane and workloads. We’ll discuss how baselines differ from “best effort” guidelines by emphasizing enforceability, evidence generation, and continuous validation rather than one-time setup. You’ll also explore real-world failure patterns like baseline drift, inconsistent regional settings, and rushed projects that bypass standards in the name of speed. By the end, you’ll have a clear approach to building baselines that are measurable, auditable, and resilient under constant organizational change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This episode covers how to define and enforce account-level security baselines so controls remain consistent as teams, services, and deployments expand, which aligns closely with GCLD expectations for sustainable governance. You’ll clarify what belongs in a baseline, including logging requirements, identity standards, network defaults, encryption expectations, and monitoring visibility for both control plane and workloads. We’ll discuss how baselines differ from “best effort” guidelines by emphasizing enforceability, evidence generation, and continuous validation rather than one-time setup. You’ll also explore real-world failure patterns like baseline drift, inconsistent regional settings, and rushed projects that bypass standards in the name of speed. By the end, you’ll have a clear approach to building baselines that are measurable, auditable, and resilient under constant organizational change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:27:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f678a8ff/a3d8075b.mp3" length="24428557" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>609</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This episode covers how to define and enforce account-level security baselines so controls remain consistent as teams, services, and deployments expand, which aligns closely with GCLD expectations for sustainable governance. You’ll clarify what belongs in a baseline, including logging requirements, identity standards, network defaults, encryption expectations, and monitoring visibility for both control plane and workloads. We’ll discuss how baselines differ from “best effort” guidelines by emphasizing enforceability, evidence generation, and continuous validation rather than one-time setup. You’ll also explore real-world failure patterns like baseline drift, inconsistent regional settings, and rushed projects that bypass standards in the name of speed. By the end, you’ll have a clear approach to building baselines that are measurable, auditable, and resilient under constant organizational change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f678a8ff/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 16 — Build IAM foundations that prevent identity sprawl across teams and workloads </title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Build IAM foundations that prevent identity sprawl across teams and workloads </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">663f9cea-884b-434d-9e0d-b0d67abcf37d</guid>
      <link>https://share.transistor.fm/s/c1fb273e</link>
      <description>
        <![CDATA[<p>This episode explains why IAM foundations are the backbone of cloud security and how identity sprawl creates hidden risk that shows up in both exam scenarios and real incidents. You’ll define identity sprawl as uncontrolled growth of users, service identities, roles, and credentials, then connect it to policy confusion, excessive privileges, and poor offboarding outcomes. We’ll cover foundational practices like standardized identity sources, consistent naming, clear ownership, and separation of human and workload identities so access decisions stay reviewable. You’ll also learn troubleshooting considerations, such as shared service accounts, long-lived keys that outlast projects, and “temporary” access that becomes permanent because nobody tracks it. The goal is an IAM structure that scales without sacrificing auditability, least privilege, or operational clarity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why IAM foundations are the backbone of cloud security and how identity sprawl creates hidden risk that shows up in both exam scenarios and real incidents. You’ll define identity sprawl as uncontrolled growth of users, service identities, roles, and credentials, then connect it to policy confusion, excessive privileges, and poor offboarding outcomes. We’ll cover foundational practices like standardized identity sources, consistent naming, clear ownership, and separation of human and workload identities so access decisions stay reviewable. You’ll also learn troubleshooting considerations, such as shared service accounts, long-lived keys that outlast projects, and “temporary” access that becomes permanent because nobody tracks it. The goal is an IAM structure that scales without sacrificing auditability, least privilege, or operational clarity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:27:32 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c1fb273e/4a21e0bf.mp3" length="40109337" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1001</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why IAM foundations are the backbone of cloud security and how identity sprawl creates hidden risk that shows up in both exam scenarios and real incidents. You’ll define identity sprawl as uncontrolled growth of users, service identities, roles, and credentials, then connect it to policy confusion, excessive privileges, and poor offboarding outcomes. We’ll cover foundational practices like standardized identity sources, consistent naming, clear ownership, and separation of human and workload identities so access decisions stay reviewable. You’ll also learn troubleshooting considerations, such as shared service accounts, long-lived keys that outlast projects, and “temporary” access that becomes permanent because nobody tracks it. The goal is an IAM structure that scales without sacrificing auditability, least privilege, or operational clarity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c1fb273e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 17 — Translate job duties into roles that stay minimal, precise, and auditable </title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — Translate job duties into roles that stay minimal, precise, and auditable </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">252808e1-5df0-4878-be3f-edfdfdb292d5</guid>
      <link>https://share.transistor.fm/s/6165704a</link>
      <description>
        <![CDATA[<p>This episode focuses on designing roles that reflect real job duties without drifting into broad, hard-to-audit permissions, a common evaluation point on governance-focused exams. You’ll define role engineering as mapping responsibilities to permission sets, then learn how to separate routine operations, administrative actions, and sensitive approvals to reduce unnecessary privilege. We’ll walk through examples like distinguishing read-only troubleshooting access from deployment access, or separating billing visibility from security administration, so each role has a defensible purpose. You’ll also cover auditability tactics, including clear role descriptions, consistent naming, and evidence that role membership is controlled and reviewed. By the end, you’ll be able to design roles that support productivity while making abnormal access patterns easier to detect and explain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on designing roles that reflect real job duties without drifting into broad, hard-to-audit permissions, a common evaluation point on governance-focused exams. You’ll define role engineering as mapping responsibilities to permission sets, then learn how to separate routine operations, administrative actions, and sensitive approvals to reduce unnecessary privilege. We’ll walk through examples like distinguishing read-only troubleshooting access from deployment access, or separating billing visibility from security administration, so each role has a defensible purpose. You’ll also cover auditability tactics, including clear role descriptions, consistent naming, and evidence that role membership is controlled and reviewed. By the end, you’ll be able to design roles that support productivity while making abnormal access patterns easier to detect and explain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:28:05 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6165704a/3f6e3e61.mp3" length="30799288" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>769</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on designing roles that reflect real job duties without drifting into broad, hard-to-audit permissions, a common evaluation point on governance-focused exams. You’ll define role engineering as mapping responsibilities to permission sets, then learn how to separate routine operations, administrative actions, and sensitive approvals to reduce unnecessary privilege. We’ll walk through examples like distinguishing read-only troubleshooting access from deployment access, or separating billing visibility from security administration, so each role has a defensible purpose. You’ll also cover auditability tactics, including clear role descriptions, consistent naming, and evidence that role membership is controlled and reviewed. By the end, you’ll be able to design roles that support productivity while making abnormal access patterns easier to detect and explain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6165704a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 18 — Design least privilege policies that avoid wildcards and unnecessary broad actions</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Design least privilege policies that avoid wildcards and unnecessary broad actions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">46e37886-f932-4b16-a281-1a5ac1154de5</guid>
      <link>https://share.transistor.fm/s/709b0a50</link>
      <description>
        <![CDATA[<p>This episode teaches how to build least privilege policies that remain effective under real operational demands, which is central to cloud governance and a frequent source of exam questions. You’ll define least privilege as granting only what is required, when required, and scoped to the right resources, then connect that definition to policy structure, conditions, and resource constraints. We’ll examine why wildcards and broad actions are tempting, how they quietly expand attack paths, and how to replace them with narrower permissions that still allow teams to work. You’ll also learn troubleshooting practices for permission errors, including how to test changes safely, interpret denial events, and avoid “fixing” access issues by granting overly broad permissions. The outcome is a policy design mindset that balances security with maintainability and reduces escalation and misuse risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to build least privilege policies that remain effective under real operational demands, which is central to cloud governance and a frequent source of exam questions. You’ll define least privilege as granting only what is required, when required, and scoped to the right resources, then connect that definition to policy structure, conditions, and resource constraints. We’ll examine why wildcards and broad actions are tempting, how they quietly expand attack paths, and how to replace them with narrower permissions that still allow teams to work. You’ll also learn troubleshooting practices for permission errors, including how to test changes safely, interpret denial events, and avoid “fixing” access issues by granting overly broad permissions. The outcome is a policy design mindset that balances security with maintainability and reduces escalation and misuse risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:28:32 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/709b0a50/4f69747f.mp3" length="31629998" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>789</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to build least privilege policies that remain effective under real operational demands, which is central to cloud governance and a frequent source of exam questions. You’ll define least privilege as granting only what is required, when required, and scoped to the right resources, then connect that definition to policy structure, conditions, and resource constraints. We’ll examine why wildcards and broad actions are tempting, how they quietly expand attack paths, and how to replace them with narrower permissions that still allow teams to work. You’ll also learn troubleshooting practices for permission errors, including how to test changes safely, interpret denial events, and avoid “fixing” access issues by granting overly broad permissions. The outcome is a policy design mindset that balances security with maintainability and reduces escalation and misuse risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/709b0a50/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 19 — Prevent privilege creep with periodic access reviews and automated entitlement cleanup</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Prevent privilege creep with periodic access reviews and automated entitlement cleanup</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">155ab5fe-4f03-45da-bc47-34913df63d57</guid>
      <link>https://share.transistor.fm/s/ca6bd990</link>
      <description>
        <![CDATA[<p> This episode explains how privilege creep accumulates in cloud environments and how access reviews and entitlement cleanup reduce long-term risk, a theme that ties governance to measurable control outcomes. You’ll define privilege creep as gradual permission expansion caused by role changes, temporary access, project churn, and inherited group membership that nobody revisits. We’ll cover how periodic reviews work in practice, including selecting review scope, validating business justification, and documenting decisions in a way auditors and incident responders can use. You’ll also explore automation approaches that remove stale access based on signals like inactivity, ended projects, or expired approvals, while minimizing business disruption. The goal is a repeatable process that keeps least privilege true over time instead of being a one-time policy design exercise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This episode explains how privilege creep accumulates in cloud environments and how access reviews and entitlement cleanup reduce long-term risk, a theme that ties governance to measurable control outcomes. You’ll define privilege creep as gradual permission expansion caused by role changes, temporary access, project churn, and inherited group membership that nobody revisits. We’ll cover how periodic reviews work in practice, including selecting review scope, validating business justification, and documenting decisions in a way auditors and incident responders can use. You’ll also explore automation approaches that remove stale access based on signals like inactivity, ended projects, or expired approvals, while minimizing business disruption. The goal is a repeatable process that keeps least privilege true over time instead of being a one-time policy design exercise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:28:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ca6bd990/c708cf2a.mp3" length="25427492" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>634</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This episode explains how privilege creep accumulates in cloud environments and how access reviews and entitlement cleanup reduce long-term risk, a theme that ties governance to measurable control outcomes. You’ll define privilege creep as gradual permission expansion caused by role changes, temporary access, project churn, and inherited group membership that nobody revisits. We’ll cover how periodic reviews work in practice, including selecting review scope, validating business justification, and documenting decisions in a way auditors and incident responders can use. You’ll also explore automation approaches that remove stale access based on signals like inactivity, ended projects, or expired approvals, while minimizing business disruption. The goal is a repeatable process that keeps least privilege true over time instead of being a one-time policy design exercise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ca6bd990/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 20 — Control root and break-glass access with tight processes and strong monitoring </title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Control root and break-glass access with tight processes and strong monitoring </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8959ff94-1d60-4d7b-9792-f4b08d240a01</guid>
      <link>https://share.transistor.fm/s/d7077ac0</link>
      <description>
        <![CDATA[<p>This episode focuses on root and break-glass access as a high-risk necessity that must be controlled, monitored, and provably limited for both exam expectations and real-world resilience. You’ll define break-glass access as emergency capability used when normal controls fail, then discuss why unmanaged emergency access becomes a common attacker goal and a frequent audit weakness. We’ll cover process design, including who can request access, how approval and time limits work, and how to enforce strong authentication and secure storage for the credentials or mechanisms involved. You’ll also learn monitoring requirements such as alerting on any use, correlating activity with incident tickets, and reviewing post-event actions to confirm no persistence or unauthorized changes occurred. The outcome is a governance model that preserves emergency recovery options without creating an untracked, permanently privileged back door. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on root and break-glass access as a high-risk necessity that must be controlled, monitored, and provably limited for both exam expectations and real-world resilience. You’ll define break-glass access as emergency capability used when normal controls fail, then discuss why unmanaged emergency access becomes a common attacker goal and a frequent audit weakness. We’ll cover process design, including who can request access, how approval and time limits work, and how to enforce strong authentication and secure storage for the credentials or mechanisms involved. You’ll also learn monitoring requirements such as alerting on any use, correlating activity with incident tickets, and reviewing post-event actions to confirm no persistence or unauthorized changes occurred. The outcome is a governance model that preserves emergency recovery options without creating an untracked, permanently privileged back door. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:29:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d7077ac0/383f3a13.mp3" length="23628163" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>589</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on root and break-glass access as a high-risk necessity that must be controlled, monitored, and provably limited for both exam expectations and real-world resilience. You’ll define break-glass access as emergency capability used when normal controls fail, then discuss why unmanaged emergency access becomes a common attacker goal and a frequent audit weakness. We’ll cover process design, including who can request access, how approval and time limits work, and how to enforce strong authentication and secure storage for the credentials or mechanisms involved. You’ll also learn monitoring requirements such as alerting on any use, correlating activity with incident tickets, and reviewing post-event actions to confirm no persistence or unauthorized changes occurred. The outcome is a governance model that preserves emergency recovery options without creating an untracked, permanently privileged back door. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d7077ac0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 21 — Secure service accounts with strict scope, limited lifetime, and clear ownership</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Secure service accounts with strict scope, limited lifetime, and clear ownership</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">71f742b8-636c-4020-91f3-4684d68ca500</guid>
      <link>https://share.transistor.fm/s/09b62cde</link>
      <description>
        <![CDATA[<p>Service accounts are often the quiet backbone of cloud automation, and they are also a frequent root cause of high-impact compromise when they are over-permissioned or poorly tracked. In this episode, you’ll define service accounts and workload identities, then connect them to least privilege, scoped resource access, and “who owns it” accountability that the GCLD exam expects you to reason about. We’ll cover best practices like separating human and non-human identities, using narrowly defined roles, limiting where credentials can be used, and setting clear rotation and deprovisioning triggers when apps change or retire. You’ll also troubleshoot common failure patterns, such as shared service accounts across teams, long-lived secrets embedded in deployment pipelines, and missing inventory that prevents rapid revocation during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Service accounts are often the quiet backbone of cloud automation, and they are also a frequent root cause of high-impact compromise when they are over-permissioned or poorly tracked. In this episode, you’ll define service accounts and workload identities, then connect them to least privilege, scoped resource access, and “who owns it” accountability that the GCLD exam expects you to reason about. We’ll cover best practices like separating human and non-human identities, using narrowly defined roles, limiting where credentials can be used, and setting clear rotation and deprovisioning triggers when apps change or retire. You’ll also troubleshoot common failure patterns, such as shared service accounts across teams, long-lived secrets embedded in deployment pipelines, and missing inventory that prevents rapid revocation during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:30:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/09b62cde/c37ab6f6.mp3" length="32572492" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>813</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Service accounts are often the quiet backbone of cloud automation, and they are also a frequent root cause of high-impact compromise when they are over-permissioned or poorly tracked. In this episode, you’ll define service accounts and workload identities, then connect them to least privilege, scoped resource access, and “who owns it” accountability that the GCLD exam expects you to reason about. We’ll cover best practices like separating human and non-human identities, using narrowly defined roles, limiting where credentials can be used, and setting clear rotation and deprovisioning triggers when apps change or retire. You’ll also troubleshoot common failure patterns, such as shared service accounts across teams, long-lived secrets embedded in deployment pipelines, and missing inventory that prevents rapid revocation during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/09b62cde/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 22 — Reduce session risk with short lifetimes, reauthentication, and device-aware access </title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Reduce session risk with short lifetimes, reauthentication, and device-aware access </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e9f3e16f-63fa-43c7-93d8-8503661ac8dd</guid>
      <link>https://share.transistor.fm/s/2d0f306e</link>
      <description>
        <![CDATA[<p>Session controls determine how long an attacker can operate after stealing a token, cookie, or session credential, making this a core governance topic for both exam scenarios and real-world containment. You’ll learn how session lifetime, idle timeout, and reauthentication requirements reduce risk by shrinking the window for misuse, especially for privileged actions and sensitive data access. We’ll discuss device-aware access concepts, including why device posture and location signals can be used to require stronger verification or block suspicious sessions without interrupting normal work. You’ll also cover troubleshooting tradeoffs, such as user friction, legacy app limitations, and the operational impact of forcing frequent re-logins, along with strategies to apply stricter session rules only where risk is highest. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Session controls determine how long an attacker can operate after stealing a token, cookie, or session credential, making this a core governance topic for both exam scenarios and real-world containment. You’ll learn how session lifetime, idle timeout, and reauthentication requirements reduce risk by shrinking the window for misuse, especially for privileged actions and sensitive data access. We’ll discuss device-aware access concepts, including why device posture and location signals can be used to require stronger verification or block suspicious sessions without interrupting normal work. You’ll also cover troubleshooting tradeoffs, such as user friction, legacy app limitations, and the operational impact of forcing frequent re-logins, along with strategies to apply stricter session rules only where risk is highest. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:30:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2d0f306e/5afed19f.mp3" length="36413545" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>909</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Session controls determine how long an attacker can operate after stealing a token, cookie, or session credential, making this a core governance topic for both exam scenarios and real-world containment. You’ll learn how session lifetime, idle timeout, and reauthentication requirements reduce risk by shrinking the window for misuse, especially for privileged actions and sensitive data access. We’ll discuss device-aware access concepts, including why device posture and location signals can be used to require stronger verification or block suspicious sessions without interrupting normal work. You’ll also cover troubleshooting tradeoffs, such as user friction, legacy app limitations, and the operational impact of forcing frequent re-logins, along with strategies to apply stricter session rules only where risk is highest. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2d0f306e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 23 — Harden authentication using MFA, phishing resistance, and conditional access logic</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Harden authentication using MFA, phishing resistance, and conditional access logic</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e353342-bdd8-45bf-a6e5-acaf1398e69b</guid>
      <link>https://share.transistor.fm/s/aa93080e</link>
      <description>
        <![CDATA[<p>Authentication is the front door for cloud control planes, and the GCLD exam expects you to understand how stronger authentication directly reduces breach probability. In this episode, you’ll compare MFA approaches, explain why not all second factors provide equal protection, and connect phishing resistance to modern attacker tradecraft like credential harvesting and session hijacking. We’ll expand into conditional access logic, showing how risk signals such as impossible travel, unusual device traits, or privileged action attempts can trigger step-up authentication or outright blocks. You’ll also troubleshoot implementation issues, including bypass paths for legacy protocols, weak recovery methods that attackers abuse, and “MFA fatigue” style push approvals that undermine intent. By the end, you’ll be able to justify authentication choices with clear risk outcomes rather than vague “best practice” claims. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Authentication is the front door for cloud control planes, and the GCLD exam expects you to understand how stronger authentication directly reduces breach probability. In this episode, you’ll compare MFA approaches, explain why not all second factors provide equal protection, and connect phishing resistance to modern attacker tradecraft like credential harvesting and session hijacking. We’ll expand into conditional access logic, showing how risk signals such as impossible travel, unusual device traits, or privileged action attempts can trigger step-up authentication or outright blocks. You’ll also troubleshoot implementation issues, including bypass paths for legacy protocols, weak recovery methods that attackers abuse, and “MFA fatigue” style push approvals that undermine intent. By the end, you’ll be able to justify authentication choices with clear risk outcomes rather than vague “best practice” claims. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:31:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aa93080e/6937915e.mp3" length="31239206" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>780</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Authentication is the front door for cloud control planes, and the GCLD exam expects you to understand how stronger authentication directly reduces breach probability. In this episode, you’ll compare MFA approaches, explain why not all second factors provide equal protection, and connect phishing resistance to modern attacker tradecraft like credential harvesting and session hijacking. We’ll expand into conditional access logic, showing how risk signals such as impossible travel, unusual device traits, or privileged action attempts can trigger step-up authentication or outright blocks. You’ll also troubleshoot implementation issues, including bypass paths for legacy protocols, weak recovery methods that attackers abuse, and “MFA fatigue” style push approvals that undermine intent. By the end, you’ll be able to justify authentication choices with clear risk outcomes rather than vague “best practice” claims. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aa93080e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 24 — Validate federation patterns so enterprise identity extends safely into cloud services</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Validate federation patterns so enterprise identity extends safely into cloud services</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fa26722a-3427-457a-b6ae-9e32f28e0852</guid>
      <link>https://share.transistor.fm/s/38c8f951</link>
      <description>
        <![CDATA[<p>Federation can simplify identity operations, but it can also amplify enterprise compromise into cloud compromise if patterns are implemented carelessly. This episode explains core federation concepts, how trust relationships work, and why token issuance, claims, and role mapping become security-critical design points that show up on governance exams. You’ll explore best practices for limiting who can federate, constraining what federated identities can do, and validating that attributes and group membership are accurate and timely. We’ll also cover practical troubleshooting scenarios, such as stale group synchronization leading to over-privilege, misconfigured trust settings that allow unintended tenants or partners, and poor logging that hides suspicious sign-ins. The goal is a federation design that improves user experience while still preserving least privilege, strong monitoring, and rapid revocation capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Federation can simplify identity operations, but it can also amplify enterprise compromise into cloud compromise if patterns are implemented carelessly. This episode explains core federation concepts, how trust relationships work, and why token issuance, claims, and role mapping become security-critical design points that show up on governance exams. You’ll explore best practices for limiting who can federate, constraining what federated identities can do, and validating that attributes and group membership are accurate and timely. We’ll also cover practical troubleshooting scenarios, such as stale group synchronization leading to over-privilege, misconfigured trust settings that allow unintended tenants or partners, and poor logging that hides suspicious sign-ins. The goal is a federation design that improves user experience while still preserving least privilege, strong monitoring, and rapid revocation capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:32:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/38c8f951/b0792da9.mp3" length="28690708" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>716</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Federation can simplify identity operations, but it can also amplify enterprise compromise into cloud compromise if patterns are implemented carelessly. This episode explains core federation concepts, how trust relationships work, and why token issuance, claims, and role mapping become security-critical design points that show up on governance exams. You’ll explore best practices for limiting who can federate, constraining what federated identities can do, and validating that attributes and group membership are accurate and timely. We’ll also cover practical troubleshooting scenarios, such as stale group synchronization leading to over-privilege, misconfigured trust settings that allow unintended tenants or partners, and poor logging that hides suspicious sign-ins. The goal is a federation design that improves user experience while still preserving least privilege, strong monitoring, and rapid revocation capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/38c8f951/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 25 — Secure third-party access by scoping permissions, monitoring behavior, and revoking fast </title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Secure third-party access by scoping permissions, monitoring behavior, and revoking fast </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bee7756c-4e39-40d6-b6a4-8f9712bbe471</guid>
      <link>https://share.transistor.fm/s/3a3a6ecc</link>
      <description>
        <![CDATA[<p> Third-party access is common for vendors, MSPs, auditors, and SaaS integrations, and it is a recurring risk theme because external identities often receive broad access “to make it work.” In this episode, you’ll learn how the GCLD perspective evaluates third-party access: define the business need, scope the permissions and resources precisely, and require evidence through monitoring and reviews. We’ll discuss approaches like least-privileged delegated roles, time-bound access, separation of duties for approvals, and limiting third parties to specific projects, datasets, or administrative functions. You’ll also examine detection and response considerations, including alerting on unusual vendor behavior, confirming changes against approved tickets, and having a fast revocation plan when a vendor account is suspected or the contract ends. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> Third-party access is common for vendors, MSPs, auditors, and SaaS integrations, and it is a recurring risk theme because external identities often receive broad access “to make it work.” In this episode, you’ll learn how the GCLD perspective evaluates third-party access: define the business need, scope the permissions and resources precisely, and require evidence through monitoring and reviews. We’ll discuss approaches like least-privileged delegated roles, time-bound access, separation of duties for approvals, and limiting third parties to specific projects, datasets, or administrative functions. You’ll also examine detection and response considerations, including alerting on unusual vendor behavior, confirming changes against approved tickets, and having a fast revocation plan when a vendor account is suspected or the contract ends. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:33:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3a3a6ecc/69bd2b7d.mp3" length="25416004" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>634</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> Third-party access is common for vendors, MSPs, auditors, and SaaS integrations, and it is a recurring risk theme because external identities often receive broad access “to make it work.” In this episode, you’ll learn how the GCLD perspective evaluates third-party access: define the business need, scope the permissions and resources precisely, and require evidence through monitoring and reviews. We’ll discuss approaches like least-privileged delegated roles, time-bound access, separation of duties for approvals, and limiting third parties to specific projects, datasets, or administrative functions. You’ll also examine detection and response considerations, including alerting on unusual vendor behavior, confirming changes against approved tickets, and having a fast revocation plan when a vendor account is suspected or the contract ends. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3a3a6ecc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 26 — Control external access by limiting public endpoints and enforcing private connectivity</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Control external access by limiting public endpoints and enforcing private connectivity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5d574810-a5f9-4878-b5ea-6ccef794098d</guid>
      <link>https://share.transistor.fm/s/49251874</link>
      <description>
        <![CDATA[<p>External access design determines whether attackers can reach your services at all, so this episode connects network exposure decisions to governance outcomes and exam-ready reasoning. You’ll define public endpoints, private connectivity, and the operational motivations that lead teams to expose services, then evaluate those choices through risk, blast radius, and monitoring needs. We’ll cover best practices such as defaulting to private access for admin and sensitive data paths, using controlled ingress points, and designing connectivity that supports segmentation and identity-based authorization. You’ll also troubleshoot common pitfalls like accidental internet exposure, inconsistent DNS and routing that bypasses intended controls, and “temporary” public access added during troubleshooting that never gets removed. The outcome is an actionable approach for reducing exposure without blocking legitimate business workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>External access design determines whether attackers can reach your services at all, so this episode connects network exposure decisions to governance outcomes and exam-ready reasoning. You’ll define public endpoints, private connectivity, and the operational motivations that lead teams to expose services, then evaluate those choices through risk, blast radius, and monitoring needs. We’ll cover best practices such as defaulting to private access for admin and sensitive data paths, using controlled ingress points, and designing connectivity that supports segmentation and identity-based authorization. You’ll also troubleshoot common pitfalls like accidental internet exposure, inconsistent DNS and routing that bypasses intended controls, and “temporary” public access added during troubleshooting that never gets removed. The outcome is an actionable approach for reducing exposure without blocking legitimate business workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:33:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/49251874/32228a1c.mp3" length="24962514" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>623</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>External access design determines whether attackers can reach your services at all, so this episode connects network exposure decisions to governance outcomes and exam-ready reasoning. You’ll define public endpoints, private connectivity, and the operational motivations that lead teams to expose services, then evaluate those choices through risk, blast radius, and monitoring needs. We’ll cover best practices such as defaulting to private access for admin and sensitive data paths, using controlled ingress points, and designing connectivity that supports segmentation and identity-based authorization. You’ll also troubleshoot common pitfalls like accidental internet exposure, inconsistent DNS and routing that bypasses intended controls, and “temporary” public access added during troubleshooting that never gets removed. The outcome is an actionable approach for reducing exposure without blocking legitimate business workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/49251874/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 27 — Prevent accidental exposure by verifying default-deny behaviors and explicit allow lists </title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Prevent accidental exposure by verifying default-deny behaviors and explicit allow lists </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e83eef77-32cf-4cce-a632-7da8e2d095be</guid>
      <link>https://share.transistor.fm/s/f9274929</link>
      <description>
        <![CDATA[<p>Many cloud incidents begin with an assumption that something is private when it is not, and this episode trains you to validate exposure rather than trust defaults. You’ll define default-deny as a design principle, then connect it to policy evaluation, security group or firewall behavior, routing, and service-level sharing settings that can silently override intent. We’ll discuss how explicit allow lists should be narrow, reviewed, and tied to real business requirements, including how to document them for audit evidence and operational clarity. You’ll also explore troubleshooting steps when access fails, emphasizing safe diagnosis that does not broaden exposure as a quick fix. By the end, you’ll know how to confirm what is actually reachable, who can reach it, and why—before a mistake becomes a breach. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Many cloud incidents begin with an assumption that something is private when it is not, and this episode trains you to validate exposure rather than trust defaults. You’ll define default-deny as a design principle, then connect it to policy evaluation, security group or firewall behavior, routing, and service-level sharing settings that can silently override intent. We’ll discuss how explicit allow lists should be narrow, reviewed, and tied to real business requirements, including how to document them for audit evidence and operational clarity. You’ll also explore troubleshooting steps when access fails, emphasizing safe diagnosis that does not broaden exposure as a quick fix. By the end, you’ll know how to confirm what is actually reachable, who can reach it, and why—before a mistake becomes a breach. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:34:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f9274929/28ac1040.mp3" length="21612575" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>539</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Many cloud incidents begin with an assumption that something is private when it is not, and this episode trains you to validate exposure rather than trust defaults. You’ll define default-deny as a design principle, then connect it to policy evaluation, security group or firewall behavior, routing, and service-level sharing settings that can silently override intent. We’ll discuss how explicit allow lists should be narrow, reviewed, and tied to real business requirements, including how to document them for audit evidence and operational clarity. You’ll also explore troubleshooting steps when access fails, emphasizing safe diagnosis that does not broaden exposure as a quick fix. By the end, you’ll know how to confirm what is actually reachable, who can reach it, and why—before a mistake becomes a breach. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f9274929/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 28 — Implement safe remote administration paths that reduce internet-facing management risk </title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Implement safe remote administration paths that reduce internet-facing management risk </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b8035969-7b4e-46e9-b8dd-21de4f4eb1b2</guid>
      <link>https://share.transistor.fm/s/f6dee8a4</link>
      <description>
        <![CDATA[<p>Remote administration is necessary, but exposing management interfaces to the internet increases both attack surface and operational risk. This episode explains how to design admin access paths that are intentional, tightly controlled, and auditable, which aligns with GCLD expectations for secure-by-design leadership. You’ll compare direct internet-facing management to safer patterns that constrain where administration can occur, who can initiate it, and what actions are allowed once connected. We’ll cover best practices like separation of admin networks, strong authentication and session controls, and centralized logging that captures the who-what-when of privileged access. You’ll also troubleshoot real-world issues such as emergency access needs, vendor support requirements, and “quick temporary openings” that create permanent exposure when not governed by change control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Remote administration is necessary, but exposing management interfaces to the internet increases both attack surface and operational risk. This episode explains how to design admin access paths that are intentional, tightly controlled, and auditable, which aligns with GCLD expectations for secure-by-design leadership. You’ll compare direct internet-facing management to safer patterns that constrain where administration can occur, who can initiate it, and what actions are allowed once connected. We’ll cover best practices like separation of admin networks, strong authentication and session controls, and centralized logging that captures the who-what-when of privileged access. You’ll also troubleshoot real-world issues such as emergency access needs, vendor support requirements, and “quick temporary openings” that create permanent exposure when not governed by change control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:34:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f6dee8a4/4fc5b915.mp3" length="22535216" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>562</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Remote administration is necessary, but exposing management interfaces to the internet increases both attack surface and operational risk. This episode explains how to design admin access paths that are intentional, tightly controlled, and auditable, which aligns with GCLD expectations for secure-by-design leadership. You’ll compare direct internet-facing management to safer patterns that constrain where administration can occur, who can initiate it, and what actions are allowed once connected. We’ll cover best practices like separation of admin networks, strong authentication and session controls, and centralized logging that captures the who-what-when of privileged access. You’ll also troubleshoot real-world issues such as emergency access needs, vendor support requirements, and “quick temporary openings” that create permanent exposure when not governed by change control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f6dee8a4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 29 — Apply IAM best practices to external entry points so access stays intentional </title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — Apply IAM best practices to external entry points so access stays intentional </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">adc51355-5c2e-4c5a-9c0e-8a5224582bc4</guid>
      <link>https://share.transistor.fm/s/39cf1453</link>
      <description>
        <![CDATA[<p>External entry points—whether APIs, portals, or admin services—become safer when IAM is applied as the primary control, not an afterthought. In this episode, you’ll connect IAM principles like least privilege, strong authentication, and explicit authorization to the way public-facing services are accessed and administered. We’ll discuss how to prevent anonymous or overly broad access, how to separate user roles from service roles, and how to use conditions and context to ensure access is appropriate for the request. You’ll also explore monitoring and troubleshooting considerations, including how to detect credential stuffing signals, how to validate that policies match intended resources, and how to avoid breaking integrations when tightening permissions. The goal is a disciplined approach where every external path has a clear identity story, a clear authorization story, and verifiable evidence through logs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>External entry points—whether APIs, portals, or admin services—become safer when IAM is applied as the primary control, not an afterthought. In this episode, you’ll connect IAM principles like least privilege, strong authentication, and explicit authorization to the way public-facing services are accessed and administered. We’ll discuss how to prevent anonymous or overly broad access, how to separate user roles from service roles, and how to use conditions and context to ensure access is appropriate for the request. You’ll also explore monitoring and troubleshooting considerations, including how to detect credential stuffing signals, how to validate that policies match intended resources, and how to avoid breaking integrations when tightening permissions. The goal is a disciplined approach where every external path has a clear identity story, a clear authorization story, and verifiable evidence through logs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:35:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/39cf1453/b7da1f93.mp3" length="39713321" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>992</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>External entry points—whether APIs, portals, or admin services—become safer when IAM is applied as the primary control, not an afterthought. In this episode, you’ll connect IAM principles like least privilege, strong authentication, and explicit authorization to the way public-facing services are accessed and administered. We’ll discuss how to prevent anonymous or overly broad access, how to separate user roles from service roles, and how to use conditions and context to ensure access is appropriate for the request. You’ll also explore monitoring and troubleshooting considerations, including how to detect credential stuffing signals, how to validate that policies match intended resources, and how to avoid breaking integrations when tightening permissions. The goal is a disciplined approach where every external path has a clear identity story, a clear authorization story, and verifiable evidence through logs. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/39cf1453/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 30 — Secrets Management: eliminate hardcoded keys and reduce credential lifetime aggressively </title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Secrets Management: eliminate hardcoded keys and reduce credential lifetime aggressively </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c0555b1e-4cfc-4f64-97cb-9d635d63b126</guid>
      <link>https://share.transistor.fm/s/554632e8</link>
      <description>
        <![CDATA[<p>Secrets management is a cornerstone control because hardcoded keys and long-lived credentials convert minor mistakes into major breaches. This episode defines secrets in practical terms—API keys, tokens, passwords, certificates—and explains why storing them in code, images, or configuration files creates uncontrolled distribution and makes revocation painful. You’ll learn exam-relevant best practices such as centralized secret storage, strict access policies, rotation workflows, and designing systems so short-lived credentials are the default rather than an advanced feature. We’ll also cover troubleshooting realities: legacy apps that expect static secrets, rollout strategies that avoid downtime, and validation steps to confirm old credentials no longer work after rotation. By the end, you’ll be able to evaluate secrets risk with clear criteria and implement controls that reduce both exposure likelihood and blast radius. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Secrets management is a cornerstone control because hardcoded keys and long-lived credentials convert minor mistakes into major breaches. This episode defines secrets in practical terms—API keys, tokens, passwords, certificates—and explains why storing them in code, images, or configuration files creates uncontrolled distribution and makes revocation painful. You’ll learn exam-relevant best practices such as centralized secret storage, strict access policies, rotation workflows, and designing systems so short-lived credentials are the default rather than an advanced feature. We’ll also cover troubleshooting realities: legacy apps that expect static secrets, rollout strategies that avoid downtime, and validation steps to confirm old credentials no longer work after rotation. By the end, you’ll be able to evaluate secrets risk with clear criteria and implement controls that reduce both exposure likelihood and blast radius. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:35:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/554632e8/43239fcf.mp3" length="29957130" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>748</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Secrets management is a cornerstone control because hardcoded keys and long-lived credentials convert minor mistakes into major breaches. This episode defines secrets in practical terms—API keys, tokens, passwords, certificates—and explains why storing them in code, images, or configuration files creates uncontrolled distribution and makes revocation painful. You’ll learn exam-relevant best practices such as centralized secret storage, strict access policies, rotation workflows, and designing systems so short-lived credentials are the default rather than an advanced feature. We’ll also cover troubleshooting realities: legacy apps that expect static secrets, rollout strategies that avoid downtime, and validation steps to confirm old credentials no longer work after rotation. By the end, you’ll be able to evaluate secrets risk with clear criteria and implement controls that reduce both exposure likelihood and blast radius. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/554632e8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 31 — Store secrets safely using managed services, encryption, access controls, and logging </title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Store secrets safely using managed services, encryption, access controls, and logging </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">365acf3d-03a5-4d8b-8ece-4e05a54a6649</guid>
      <link>https://share.transistor.fm/s/c2b25da4</link>
      <description>
        <![CDATA[<p>This episode explains what “safe secret storage” really means in cloud environments and why it repeatedly appears on the GCLD exam as a leadership control decision, not just a developer detail. You’ll define secrets as high-impact authentication material and connect managed secret services to core security outcomes: centralized control, consistent encryption, auditable access, and predictable rotation support. We’ll expand into how access controls should be structured so only the right identities can retrieve specific secrets, and how logging makes secret access reviewable during incidents and audits. You’ll also examine real-world failure modes, such as secrets copied into multiple systems “for convenience,” unclear ownership, and missing logs that prevent you from knowing whether a secret was abused. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains what “safe secret storage” really means in cloud environments and why it repeatedly appears on the GCLD exam as a leadership control decision, not just a developer detail. You’ll define secrets as high-impact authentication material and connect managed secret services to core security outcomes: centralized control, consistent encryption, auditable access, and predictable rotation support. We’ll expand into how access controls should be structured so only the right identities can retrieve specific secrets, and how logging makes secret access reviewable during incidents and audits. You’ll also examine real-world failure modes, such as secrets copied into multiple systems “for convenience,” unclear ownership, and missing logs that prevent you from knowing whether a secret was abused. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:36:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c2b25da4/fe4de54a.mp3" length="29870398" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>745</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains what “safe secret storage” really means in cloud environments and why it repeatedly appears on the GCLD exam as a leadership control decision, not just a developer detail. You’ll define secrets as high-impact authentication material and connect managed secret services to core security outcomes: centralized control, consistent encryption, auditable access, and predictable rotation support. We’ll expand into how access controls should be structured so only the right identities can retrieve specific secrets, and how logging makes secret access reviewable during incidents and audits. You’ll also examine real-world failure modes, such as secrets copied into multiple systems “for convenience,” unclear ownership, and missing logs that prevent you from knowing whether a secret was abused. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c2b25da4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 32 — Rotate secrets reliably with automation that prevents outages and forgotten credentials </title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Rotate secrets reliably with automation that prevents outages and forgotten credentials </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">95de615a-fde7-41a1-bc90-08d63e4a1edc</guid>
      <link>https://share.transistor.fm/s/e8f9bc93</link>
      <description>
        <![CDATA[<p> This episode focuses on rotation as an operational capability that reduces long-term compromise risk, and it frames rotation in the way exam questions often do: as a balance of security and uptime. You’ll define rotation in practical terms, then explore how automation supports repeatability, scheduling, and consistent cutover steps that humans routinely forget under pressure. We’ll discuss patterns that reduce outage risk, such as staged rotation, dual-credential overlap during cutover, and validation checks that confirm new secrets work before old ones are disabled. You’ll also troubleshoot common rotation breakdowns, including undocumented dependencies, credentials embedded in legacy components, and “rotation projects” that never finish because there is no owner or deadline. By the end, you’ll have a governance-minded view of rotation that produces both measurable risk reduction and reliable service continuity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> This episode focuses on rotation as an operational capability that reduces long-term compromise risk, and it frames rotation in the way exam questions often do: as a balance of security and uptime. You’ll define rotation in practical terms, then explore how automation supports repeatability, scheduling, and consistent cutover steps that humans routinely forget under pressure. We’ll discuss patterns that reduce outage risk, such as staged rotation, dual-credential overlap during cutover, and validation checks that confirm new secrets work before old ones are disabled. You’ll also troubleshoot common rotation breakdowns, including undocumented dependencies, credentials embedded in legacy components, and “rotation projects” that never finish because there is no owner or deadline. By the end, you’ll have a governance-minded view of rotation that produces both measurable risk reduction and reliable service continuity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:43:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e8f9bc93/c83fff7f.mp3" length="24285422" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>606</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> This episode focuses on rotation as an operational capability that reduces long-term compromise risk, and it frames rotation in the way exam questions often do: as a balance of security and uptime. You’ll define rotation in practical terms, then explore how automation supports repeatability, scheduling, and consistent cutover steps that humans routinely forget under pressure. We’ll discuss patterns that reduce outage risk, such as staged rotation, dual-credential overlap during cutover, and validation checks that confirm new secrets work before old ones are disabled. You’ll also troubleshoot common rotation breakdowns, including undocumented dependencies, credentials embedded in legacy components, and “rotation projects” that never finish because there is no owner or deadline. By the end, you’ll have a governance-minded view of rotation that produces both measurable risk reduction and reliable service continuity. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e8f9bc93/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 33 — Scope secrets to least privilege so one leak cannot unlock broad cloud access </title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — Scope secrets to least privilege so one leak cannot unlock broad cloud access </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87be0333-ffcf-4af4-a87a-be9aa0f30f2e</guid>
      <link>https://share.transistor.fm/s/4cee2a7a</link>
      <description>
        <![CDATA[<p>This episode teaches how to apply least privilege specifically to secrets, which is a high-leverage control because secrets often grant direct access to data stores, control planes, or production services. You’ll learn how scoping works in practice by tying each secret to a narrow identity, a narrow set of actions, and a narrow set of resources, rather than using shared “master keys” that unlock entire environments. We’ll cover how scoping supports incident response by limiting blast radius and simplifying revocation, since you can disable a single path instead of rebuilding an entire access model. You’ll also explore real-world pitfalls like secrets reused across environments, secrets that effectively become admin credentials, and missing tagging or ownership that makes cleanup impossible. The outcome is a practical approach to secret design that treats each credential as a controlled capability with clear boundaries and audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to apply least privilege specifically to secrets, which is a high-leverage control because secrets often grant direct access to data stores, control planes, or production services. You’ll learn how scoping works in practice by tying each secret to a narrow identity, a narrow set of actions, and a narrow set of resources, rather than using shared “master keys” that unlock entire environments. We’ll cover how scoping supports incident response by limiting blast radius and simplifying revocation, since you can disable a single path instead of rebuilding an entire access model. You’ll also explore real-world pitfalls like secrets reused across environments, secrets that effectively become admin credentials, and missing tagging or ownership that makes cleanup impossible. The outcome is a practical approach to secret design that treats each credential as a controlled capability with clear boundaries and audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:44:19 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4cee2a7a/16a4290a.mp3" length="24285402" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>606</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to apply least privilege specifically to secrets, which is a high-leverage control because secrets often grant direct access to data stores, control planes, or production services. You’ll learn how scoping works in practice by tying each secret to a narrow identity, a narrow set of actions, and a narrow set of resources, rather than using shared “master keys” that unlock entire environments. We’ll cover how scoping supports incident response by limiting blast radius and simplifying revocation, since you can disable a single path instead of rebuilding an entire access model. You’ll also explore real-world pitfalls like secrets reused across environments, secrets that effectively become admin credentials, and missing tagging or ownership that makes cleanup impossible. The outcome is a practical approach to secret design that treats each credential as a controlled capability with clear boundaries and audit evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4cee2a7a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 34 — Deliver secrets to workloads safely without embedding them in images or source code </title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — Deliver secrets to workloads safely without embedding them in images or source code </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">431001a0-4f0e-41d3-b250-8be3cc89deff</guid>
      <link>https://share.transistor.fm/s/f6a66b4a</link>
      <description>
        <![CDATA[<p>This episode addresses a common cloud security failure: secrets leaking through build artifacts, repositories, or container images, which creates uncontrolled distribution and long-lived compromise risk. You’ll define secure delivery as providing secrets to workloads at runtime through controlled retrieval mechanisms, rather than baking credentials into code, configuration, or artifacts that are copied and cached widely. We’ll connect this to GCLD exam expectations around secure automation, least privilege, and auditability by focusing on how runtime retrieval supports centralized policy enforcement and logging of access events. You’ll also troubleshoot real deployment challenges, such as startup ordering, permission errors, secret versioning, and rollback scenarios where older components expect older credentials. By the end, you’ll be able to evaluate a workload’s secret handling method and identify whether it is truly controllable, monitorable, and revocable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode addresses a common cloud security failure: secrets leaking through build artifacts, repositories, or container images, which creates uncontrolled distribution and long-lived compromise risk. You’ll define secure delivery as providing secrets to workloads at runtime through controlled retrieval mechanisms, rather than baking credentials into code, configuration, or artifacts that are copied and cached widely. We’ll connect this to GCLD exam expectations around secure automation, least privilege, and auditability by focusing on how runtime retrieval supports centralized policy enforcement and logging of access events. You’ll also troubleshoot real deployment challenges, such as startup ordering, permission errors, secret versioning, and rollback scenarios where older components expect older credentials. By the end, you’ll be able to evaluate a workload’s secret handling method and identify whether it is truly controllable, monitorable, and revocable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:45:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f6a66b4a/1941a0b2.mp3" length="38424973" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>959</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode addresses a common cloud security failure: secrets leaking through build artifacts, repositories, or container images, which creates uncontrolled distribution and long-lived compromise risk. You’ll define secure delivery as providing secrets to workloads at runtime through controlled retrieval mechanisms, rather than baking credentials into code, configuration, or artifacts that are copied and cached widely. We’ll connect this to GCLD exam expectations around secure automation, least privilege, and auditability by focusing on how runtime retrieval supports centralized policy enforcement and logging of access events. You’ll also troubleshoot real deployment challenges, such as startup ordering, permission errors, secret versioning, and rollback scenarios where older components expect older credentials. By the end, you’ll be able to evaluate a workload’s secret handling method and identify whether it is truly controllable, monitorable, and revocable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f6a66b4a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 35 — Cloud Automation: use Infrastructure as Code to make security repeatable and testable </title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — Cloud Automation: use Infrastructure as Code to make security repeatable and testable </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e30e796-a080-409f-8243-f60b5feb1f2d</guid>
      <link>https://share.transistor.fm/s/0e9b4449</link>
      <description>
        <![CDATA[<p>This episode explains why Infrastructure as Code is a governance tool as much as an engineering tool, and why the GCLD exam emphasizes repeatability, reviewability, and control evidence. You’ll define Infrastructure as Code as declarative, versioned infrastructure definitions that allow consistent provisioning across environments and teams. We’ll connect IaC to security outcomes by showing how it enables peer review, change tracking, standardized baselines, and rapid rebuilds that reduce configuration drift and accelerate recovery. You’ll also explore practical failure modes, such as copying templates without understanding them, bypassing code with manual changes, and creating overly complex modules that teams cannot safely maintain. The goal is to understand how IaC supports secure-by-design operations, where infrastructure changes become predictable, testable, and auditable rather than ad hoc and fragile. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why Infrastructure as Code is a governance tool as much as an engineering tool, and why the GCLD exam emphasizes repeatability, reviewability, and control evidence. You’ll define Infrastructure as Code as declarative, versioned infrastructure definitions that allow consistent provisioning across environments and teams. We’ll connect IaC to security outcomes by showing how it enables peer review, change tracking, standardized baselines, and rapid rebuilds that reduce configuration drift and accelerate recovery. You’ll also explore practical failure modes, such as copying templates without understanding them, bypassing code with manual changes, and creating overly complex modules that teams cannot safely maintain. The goal is to understand how IaC supports secure-by-design operations, where infrastructure changes become predictable, testable, and auditable rather than ad hoc and fragile. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:45:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0e9b4449/7ef03fff.mp3" length="31868243" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>795</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why Infrastructure as Code is a governance tool as much as an engineering tool, and why the GCLD exam emphasizes repeatability, reviewability, and control evidence. You’ll define Infrastructure as Code as declarative, versioned infrastructure definitions that allow consistent provisioning across environments and teams. We’ll connect IaC to security outcomes by showing how it enables peer review, change tracking, standardized baselines, and rapid rebuilds that reduce configuration drift and accelerate recovery. You’ll also explore practical failure modes, such as copying templates without understanding them, bypassing code with manual changes, and creating overly complex modules that teams cannot safely maintain. The goal is to understand how IaC supports secure-by-design operations, where infrastructure changes become predictable, testable, and auditable rather than ad hoc and fragile. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0e9b4449/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 36 — Prevent configuration drift with policy-as-code and continuous posture enforcement </title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Prevent configuration drift with policy-as-code and continuous posture enforcement </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2661e995-67c9-4105-8c10-bd4d3641d9a7</guid>
      <link>https://share.transistor.fm/s/f80d61ab</link>
      <description>
        <![CDATA[<p>This episode focuses on drift as an inevitability in cloud environments and teaches how to prevent it through enforceable, automated controls rather than periodic manual reviews. You’ll define configuration drift as the gradual divergence between intended secure state and actual deployed state, often caused by emergency changes, manual fixes, and inconsistent provisioning patterns. We’ll explain policy-as-code as a mechanism to encode guardrails and requirements in a way that can be evaluated continuously, producing clear pass/fail outcomes and evidence for audits. You’ll also cover posture enforcement strategies that detect and correct risky changes quickly, while still allowing controlled exceptions through documented processes. Troubleshooting topics include false positives that erode trust in tooling, overly strict policies that block needed work, and weak exception handling that becomes a permanent bypass. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on drift as an inevitability in cloud environments and teaches how to prevent it through enforceable, automated controls rather than periodic manual reviews. You’ll define configuration drift as the gradual divergence between intended secure state and actual deployed state, often caused by emergency changes, manual fixes, and inconsistent provisioning patterns. We’ll explain policy-as-code as a mechanism to encode guardrails and requirements in a way that can be evaluated continuously, producing clear pass/fail outcomes and evidence for audits. You’ll also cover posture enforcement strategies that detect and correct risky changes quickly, while still allowing controlled exceptions through documented processes. Troubleshooting topics include false positives that erode trust in tooling, overly strict policies that block needed work, and weak exception handling that becomes a permanent bypass. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:46:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f80d61ab/42131f46.mp3" length="29319731" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>732</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on drift as an inevitability in cloud environments and teaches how to prevent it through enforceable, automated controls rather than periodic manual reviews. You’ll define configuration drift as the gradual divergence between intended secure state and actual deployed state, often caused by emergency changes, manual fixes, and inconsistent provisioning patterns. We’ll explain policy-as-code as a mechanism to encode guardrails and requirements in a way that can be evaluated continuously, producing clear pass/fail outcomes and evidence for audits. You’ll also cover posture enforcement strategies that detect and correct risky changes quickly, while still allowing controlled exceptions through documented processes. Troubleshooting topics include false positives that erode trust in tooling, overly strict policies that block needed work, and weak exception handling that becomes a permanent bypass. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f80d61ab/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 37 — Secure CI/CD pipelines so build systems cannot become attacker bridges </title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — Secure CI/CD pipelines so build systems cannot become attacker bridges </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8ea6f0b9-5c43-41d0-8831-130e61cf3b91</guid>
      <link>https://share.transistor.fm/s/6bb5bcd3</link>
      <description>
        <![CDATA[<p>This episode teaches why CI/CD pipelines are high-value targets and how to secure them so attackers cannot use build systems to pivot into production. You’ll define pipelines as automated paths that compile, test, package, and deploy code, then connect pipeline compromise to real outcomes like credential theft, malicious code insertion, and unauthorized infrastructure changes. We’ll cover best practices such as least privilege for build identities, protecting secrets used during builds, isolating build environments, and enforcing strong access controls and reviews around pipeline configuration changes. You’ll also examine detection and troubleshooting considerations, including spotting unusual build triggers, unexpected dependency changes, and pipeline actions occurring outside approved change windows. The goal is a defensible pipeline security posture where automation accelerates delivery without becoming an unmonitored, overpowered attacker pathway. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches why CI/CD pipelines are high-value targets and how to secure them so attackers cannot use build systems to pivot into production. You’ll define pipelines as automated paths that compile, test, package, and deploy code, then connect pipeline compromise to real outcomes like credential theft, malicious code insertion, and unauthorized infrastructure changes. We’ll cover best practices such as least privilege for build identities, protecting secrets used during builds, isolating build environments, and enforcing strong access controls and reviews around pipeline configuration changes. You’ll also examine detection and troubleshooting considerations, including spotting unusual build triggers, unexpected dependency changes, and pipeline actions occurring outside approved change windows. The goal is a defensible pipeline security posture where automation accelerates delivery without becoming an unmonitored, overpowered attacker pathway. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:46:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6bb5bcd3/1bb76d14.mp3" length="24616621" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>614</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches why CI/CD pipelines are high-value targets and how to secure them so attackers cannot use build systems to pivot into production. You’ll define pipelines as automated paths that compile, test, package, and deploy code, then connect pipeline compromise to real outcomes like credential theft, malicious code insertion, and unauthorized infrastructure changes. We’ll cover best practices such as least privilege for build identities, protecting secrets used during builds, isolating build environments, and enforcing strong access controls and reviews around pipeline configuration changes. You’ll also examine detection and troubleshooting considerations, including spotting unusual build triggers, unexpected dependency changes, and pipeline actions occurring outside approved change windows. The goal is a defensible pipeline security posture where automation accelerates delivery without becoming an unmonitored, overpowered attacker pathway. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6bb5bcd3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 38 — Validate automated deployments with approvals, change tracking, and safe rollback patterns</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — Validate automated deployments with approvals, change tracking, and safe rollback patterns</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fbdb798b-6d76-4014-bea6-75005bfb79c2</guid>
      <link>https://share.transistor.fm/s/2ec7ccfa</link>
      <description>
        <![CDATA[<p>This episode focuses on controlling speed safely, which is a common leadership challenge and an exam-relevant governance theme in cloud operations. You’ll learn how approvals and change tracking create accountability for automated deployments, ensuring that high-risk changes are reviewed and that every change can be traced back to a responsible decision. We’ll discuss safe rollout and rollback patterns, emphasizing why rollback is not a panic button but a planned capability with tested procedures and clear blast radius control. You’ll also explore practical scenarios like a deployment that introduces an insecure configuration, where the right response combines containment, rollback, and evidence gathering rather than improvisation. Troubleshooting topics include emergency changes that bypass normal approvals, incomplete deployment logs that break audit trails, and rollback failures caused by database or configuration dependencies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on controlling speed safely, which is a common leadership challenge and an exam-relevant governance theme in cloud operations. You’ll learn how approvals and change tracking create accountability for automated deployments, ensuring that high-risk changes are reviewed and that every change can be traced back to a responsible decision. We’ll discuss safe rollout and rollback patterns, emphasizing why rollback is not a panic button but a planned capability with tested procedures and clear blast radius control. You’ll also explore practical scenarios like a deployment that introduces an insecure configuration, where the right response combines containment, rollback, and evidence gathering rather than improvisation. Troubleshooting topics include emergency changes that bypass normal approvals, incomplete deployment logs that break audit trails, and rollback failures caused by database or configuration dependencies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:46:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2ec7ccfa/1537b94c.mp3" length="24420218" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>609</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on controlling speed safely, which is a common leadership challenge and an exam-relevant governance theme in cloud operations. You’ll learn how approvals and change tracking create accountability for automated deployments, ensuring that high-risk changes are reviewed and that every change can be traced back to a responsible decision. We’ll discuss safe rollout and rollback patterns, emphasizing why rollback is not a panic button but a planned capability with tested procedures and clear blast radius control. You’ll also explore practical scenarios like a deployment that introduces an insecure configuration, where the right response combines containment, rollback, and evidence gathering rather than improvisation. Troubleshooting topics include emergency changes that bypass normal approvals, incomplete deployment logs that break audit trails, and rollback failures caused by database or configuration dependencies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2ec7ccfa/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 39 — Automate guardrails that block risky storage, network, and IAM configurations instantly </title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — Automate guardrails that block risky storage, network, and IAM configurations instantly </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">803d7bed-a5ee-4fec-ae1c-aa87a35c8a6b</guid>
      <link>https://share.transistor.fm/s/bb0e3aef</link>
      <description>
        <![CDATA[<p>This episode explains how automated guardrails prevent common cloud incidents by stopping dangerous configurations before they reach production, which is central to secure scaling and exam-driven governance decisions. You’ll define guardrails as enforceable controls that evaluate configurations in real time or near real time, then apply that concept to high-risk areas like public storage exposure, overly permissive network paths, and broad IAM permissions. We’ll discuss what “instantly” should mean operationally, including where to block changes, where to quarantine, and how to alert and route remediation tasks without flooding teams with noise. You’ll also explore troubleshooting challenges such as legitimate exceptions, differences between environments, and preventing developers from working around controls by shifting changes to ungoverned accounts. The outcome is a practical model for prevention-first security that reduces risk while still supporting delivery speed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how automated guardrails prevent common cloud incidents by stopping dangerous configurations before they reach production, which is central to secure scaling and exam-driven governance decisions. You’ll define guardrails as enforceable controls that evaluate configurations in real time or near real time, then apply that concept to high-risk areas like public storage exposure, overly permissive network paths, and broad IAM permissions. We’ll discuss what “instantly” should mean operationally, including where to block changes, where to quarantine, and how to alert and route remediation tasks without flooding teams with noise. You’ll also explore troubleshooting challenges such as legitimate exceptions, differences between environments, and preventing developers from working around controls by shifting changes to ungoverned accounts. The outcome is a practical model for prevention-first security that reduces risk while still supporting delivery speed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:47:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bb0e3aef/0dab35c7.mp3" length="29348998" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>732</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how automated guardrails prevent common cloud incidents by stopping dangerous configurations before they reach production, which is central to secure scaling and exam-driven governance decisions. You’ll define guardrails as enforceable controls that evaluate configurations in real time or near real time, then apply that concept to high-risk areas like public storage exposure, overly permissive network paths, and broad IAM permissions. We’ll discuss what “instantly” should mean operationally, including where to block changes, where to quarantine, and how to alert and route remediation tasks without flooding teams with noise. You’ll also explore troubleshooting challenges such as legitimate exceptions, differences between environments, and preventing developers from working around controls by shifting changes to ungoverned accounts. The outcome is a practical model for prevention-first security that reduces risk while still supporting delivery speed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bb0e3aef/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 40 — Frameworks for built-in security: map provider native capabilities into reliable patterns </title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — Frameworks for built-in security: map provider native capabilities into reliable patterns </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8ccb3ffd-e29a-47c4-8854-568f01e91819</guid>
      <link>https://share.transistor.fm/s/b54e3233</link>
      <description>
        <![CDATA[<p>This episode teaches how to translate provider-native security capabilities into repeatable patterns that teams can adopt consistently, which supports both exam reasoning and real governance outcomes. You’ll define built-in security as the native controls cloud providers offer—identity, logging, encryption, network controls, and monitoring—and learn how to organize them into a coherent design instead of a scattered tool list. We’ll cover how patterns reduce misconfiguration risk by standardizing how services are deployed, how access is granted, and how evidence is collected, while still allowing variation where business needs require it. You’ll also explore common pitfalls such as assuming native equals enabled, failing to integrate logs into detection workflows, and selecting controls without clear ownership or operational procedures. By the end, you’ll be able to evaluate whether a security capability is truly operationalized as a reliable pattern with measurable coverage and maintainable governance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to translate provider-native security capabilities into repeatable patterns that teams can adopt consistently, which supports both exam reasoning and real governance outcomes. You’ll define built-in security as the native controls cloud providers offer—identity, logging, encryption, network controls, and monitoring—and learn how to organize them into a coherent design instead of a scattered tool list. We’ll cover how patterns reduce misconfiguration risk by standardizing how services are deployed, how access is granted, and how evidence is collected, while still allowing variation where business needs require it. You’ll also explore common pitfalls such as assuming native equals enabled, failing to integrate logs into detection workflows, and selecting controls without clear ownership or operational procedures. By the end, you’ll be able to evaluate whether a security capability is truly operationalized as a reliable pattern with measurable coverage and maintainable governance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:47:45 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b54e3233/113853f6.mp3" length="26227892" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>654</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to translate provider-native security capabilities into repeatable patterns that teams can adopt consistently, which supports both exam reasoning and real governance outcomes. You’ll define built-in security as the native controls cloud providers offer—identity, logging, encryption, network controls, and monitoring—and learn how to organize them into a coherent design instead of a scattered tool list. We’ll cover how patterns reduce misconfiguration risk by standardizing how services are deployed, how access is granted, and how evidence is collected, while still allowing variation where business needs require it. You’ll also explore common pitfalls such as assuming native equals enabled, failing to integrate logs into detection workflows, and selecting controls without clear ownership or operational procedures. By the end, you’ll be able to evaluate whether a security capability is truly operationalized as a reliable pattern with measurable coverage and maintainable governance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b54e3233/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 41 — Design security-by-default architectures using managed services and least-management surfaces </title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — Design security-by-default architectures using managed services and least-management surfaces </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b026f40-9c6f-41fe-915c-4343db58a404</guid>
      <link>https://share.transistor.fm/s/bd4fa8b8</link>
      <description>
        <![CDATA[<p>This episode explains how to design cloud architectures that are secure by default, reducing reliance on constant manual hardening and minimizing the attack surface created by operating system and platform management tasks. You’ll connect the GCLD exam’s governance focus to practical design choices such as preferring managed services, limiting administrative entry points, and reducing the number of components that require patching, credential handling, and direct access. We’ll cover how “least-management surfaces” changes risk by shrinking the set of privileged actions available to operators and attackers, and how that affects monitoring and incident response complexity. You’ll also walk through scenario thinking, such as choosing between self-managed and managed data services, and evaluating tradeoffs in control, visibility, and operational burden. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to design cloud architectures that are secure by default, reducing reliance on constant manual hardening and minimizing the attack surface created by operating system and platform management tasks. You’ll connect the GCLD exam’s governance focus to practical design choices such as preferring managed services, limiting administrative entry points, and reducing the number of components that require patching, credential handling, and direct access. We’ll cover how “least-management surfaces” changes risk by shrinking the set of privileged actions available to operators and attackers, and how that affects monitoring and incident response complexity. You’ll also walk through scenario thinking, such as choosing between self-managed and managed data services, and evaluating tradeoffs in control, visibility, and operational burden. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:48:12 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bd4fa8b8/748e08b7.mp3" length="40877369" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1021</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to design cloud architectures that are secure by default, reducing reliance on constant manual hardening and minimizing the attack surface created by operating system and platform management tasks. You’ll connect the GCLD exam’s governance focus to practical design choices such as preferring managed services, limiting administrative entry points, and reducing the number of components that require patching, credential handling, and direct access. We’ll cover how “least-management surfaces” changes risk by shrinking the set of privileged actions available to operators and attackers, and how that affects monitoring and incident response complexity. You’ll also walk through scenario thinking, such as choosing between self-managed and managed data services, and evaluating tradeoffs in control, visibility, and operational burden. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bd4fa8b8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 42 — Operationalize secure landing zones that standardize identity, logging, and network controls </title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Operationalize secure landing zones that standardize identity, logging, and network controls </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0b174932-c46e-40e5-9a68-aa538aa23d6b</guid>
      <link>https://share.transistor.fm/s/1dc33d2b</link>
      <description>
        <![CDATA[<p>This episode focuses on secure landing zones as the foundational environment where accounts, identity, logging, and network baselines are established before workloads arrive. You’ll define a landing zone as a standardized blueprint that enforces consistent guardrails, enabling the kind of predictable governance outcomes the GCLD exam expects you to reason about. We’ll explore how landing zones simplify operations by centralizing logging, enforcing baseline network segmentation, and ensuring identity patterns are consistent across teams and environments. You’ll also examine common failure modes, such as partial adoption, unmanaged accounts created outside the standard process, and inconsistent regional settings that weaken visibility and control. By the end, you’ll be able to describe how a landing zone supports scalability, auditability, and incident readiness without relying on heroics. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on secure landing zones as the foundational environment where accounts, identity, logging, and network baselines are established before workloads arrive. You’ll define a landing zone as a standardized blueprint that enforces consistent guardrails, enabling the kind of predictable governance outcomes the GCLD exam expects you to reason about. We’ll explore how landing zones simplify operations by centralizing logging, enforcing baseline network segmentation, and ensuring identity patterns are consistent across teams and environments. You’ll also examine common failure modes, such as partial adoption, unmanaged accounts created outside the standard process, and inconsistent regional settings that weaken visibility and control. By the end, you’ll be able to describe how a landing zone supports scalability, auditability, and incident readiness without relying on heroics. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:48:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1dc33d2b/28d384e6.mp3" length="36619408" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>914</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on secure landing zones as the foundational environment where accounts, identity, logging, and network baselines are established before workloads arrive. You’ll define a landing zone as a standardized blueprint that enforces consistent guardrails, enabling the kind of predictable governance outcomes the GCLD exam expects you to reason about. We’ll explore how landing zones simplify operations by centralizing logging, enforcing baseline network segmentation, and ensuring identity patterns are consistent across teams and environments. You’ll also examine common failure modes, such as partial adoption, unmanaged accounts created outside the standard process, and inconsistent regional settings that weaken visibility and control. By the end, you’ll be able to describe how a landing zone supports scalability, auditability, and incident readiness without relying on heroics. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1dc33d2b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 43 — Extend built-in controls consistently across single-cloud and multi-cloud environments </title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — Extend built-in controls consistently across single-cloud and multi-cloud environments </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">091e7120-5145-44d2-b2ad-caddeba82c78</guid>
      <link>https://share.transistor.fm/s/8a0b66e3</link>
      <description>
        <![CDATA[<p>This episode teaches how to maintain consistent security outcomes when environments span one cloud provider or multiple providers with different native capabilities and terminology. You’ll connect exam-relevant governance principles—standardization, control mapping, and measurable evidence—to the practical work of translating identity, logging, encryption, and network controls across platforms. We’ll discuss how inconsistency creates gaps attackers exploit, such as missing log sources in one provider, weaker MFA enforcement in another, or policy models that are interpreted differently by teams. You’ll also learn troubleshooting approaches like defining outcome-based requirements, building provider-specific implementations that satisfy the same intent, and validating drift through continuous checks rather than assumptions. The goal is a defensible multi-environment strategy where “same security” means the same risk reduction and the same evidence, not identical tooling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to maintain consistent security outcomes when environments span one cloud provider or multiple providers with different native capabilities and terminology. You’ll connect exam-relevant governance principles—standardization, control mapping, and measurable evidence—to the practical work of translating identity, logging, encryption, and network controls across platforms. We’ll discuss how inconsistency creates gaps attackers exploit, such as missing log sources in one provider, weaker MFA enforcement in another, or policy models that are interpreted differently by teams. You’ll also learn troubleshooting approaches like defining outcome-based requirements, building provider-specific implementations that satisfy the same intent, and validating drift through continuous checks rather than assumptions. The goal is a defensible multi-environment strategy where “same security” means the same risk reduction and the same evidence, not identical tooling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:49:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8a0b66e3/7977826b.mp3" length="32496228" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>811</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to maintain consistent security outcomes when environments span one cloud provider or multiple providers with different native capabilities and terminology. You’ll connect exam-relevant governance principles—standardization, control mapping, and measurable evidence—to the practical work of translating identity, logging, encryption, and network controls across platforms. We’ll discuss how inconsistency creates gaps attackers exploit, such as missing log sources in one provider, weaker MFA enforcement in another, or policy models that are interpreted differently by teams. You’ll also learn troubleshooting approaches like defining outcome-based requirements, building provider-specific implementations that satisfy the same intent, and validating drift through continuous checks rather than assumptions. The goal is a defensible multi-environment strategy where “same security” means the same risk reduction and the same evidence, not identical tooling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8a0b66e3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 44 — Cloud Logging Fundamentals: choose log sources that answer real investigation questions</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Cloud Logging Fundamentals: choose log sources that answer real investigation questions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">746370dd-7a76-48cd-a553-d8eee6c98cee</guid>
      <link>https://share.transistor.fm/s/020b39f0</link>
      <description>
        <![CDATA[<p>This episode explains how to choose cloud log sources based on the questions you must answer during incidents, audits, and operational troubleshooting, which is a common scenario framing in the GCLD exam. You’ll define logging fundamentals by focusing on intent: determining who did what, where, when, and with what impact, across identity, control plane, workloads, and data access. We’ll cover practical selection criteria, such as whether a log source provides enough context to support root cause analysis, whether it can be centralized and retained, and whether it aligns to high-probability threat scenarios. You’ll also examine failure patterns like collecting everything without purpose, missing key sources that create blind spots, and relying on logs that are too shallow to support decisions. By the end, you’ll have a method for building a log portfolio that is cost-aware, investigation-ready, and defensible under scrutiny. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to choose cloud log sources based on the questions you must answer during incidents, audits, and operational troubleshooting, which is a common scenario framing in the GCLD exam. You’ll define logging fundamentals by focusing on intent: determining who did what, where, when, and with what impact, across identity, control plane, workloads, and data access. We’ll cover practical selection criteria, such as whether a log source provides enough context to support root cause analysis, whether it can be centralized and retained, and whether it aligns to high-probability threat scenarios. You’ll also examine failure patterns like collecting everything without purpose, missing key sources that create blind spots, and relying on logs that are too shallow to support decisions. By the end, you’ll have a method for building a log portfolio that is cost-aware, investigation-ready, and defensible under scrutiny. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:49:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/020b39f0/b5a0eb21.mp3" length="28504718" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>711</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to choose cloud log sources based on the questions you must answer during incidents, audits, and operational troubleshooting, which is a common scenario framing in the GCLD exam. You’ll define logging fundamentals by focusing on intent: determining who did what, where, when, and with what impact, across identity, control plane, workloads, and data access. We’ll cover practical selection criteria, such as whether a log source provides enough context to support root cause analysis, whether it can be centralized and retained, and whether it aligns to high-probability threat scenarios. You’ll also examine failure patterns like collecting everything without purpose, missing key sources that create blind spots, and relying on logs that are too shallow to support decisions. By the end, you’ll have a method for building a log portfolio that is cost-aware, investigation-ready, and defensible under scrutiny. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/020b39f0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 45 — Capture identity logs that reveal misuse, privilege changes, and suspicious sign-ins </title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — Capture identity logs that reveal misuse, privilege changes, and suspicious sign-ins </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6a17f15-8809-4109-b1bf-beaa9c0e6372</guid>
      <link>https://share.transistor.fm/s/feb11077</link>
      <description>
        <![CDATA[<p>This episode focuses on identity logs as a primary signal for cloud compromise, because many attacks begin and expand through account misuse rather than classic network intrusion. You’ll learn what identity logs should capture, including authentication events, MFA outcomes, token and session activity, role assumptions, and changes to group membership or privilege assignments. We’ll connect these signals to exam scenarios where you must detect suspicious sign-ins, explain privilege escalation pathways, or validate whether an administrative action was authorized. You’ll also cover troubleshooting considerations such as incomplete coverage across tenants or accounts, inconsistent time synchronization that breaks timelines, and insufficient enrichment that prevents analysts from tying activity to real users and devices. The outcome is a clear understanding of what to collect, how to centralize it, and how to use it to prove or disprove identity-driven attack hypotheses. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on identity logs as a primary signal for cloud compromise, because many attacks begin and expand through account misuse rather than classic network intrusion. You’ll learn what identity logs should capture, including authentication events, MFA outcomes, token and session activity, role assumptions, and changes to group membership or privilege assignments. We’ll connect these signals to exam scenarios where you must detect suspicious sign-ins, explain privilege escalation pathways, or validate whether an administrative action was authorized. You’ll also cover troubleshooting considerations such as incomplete coverage across tenants or accounts, inconsistent time synchronization that breaks timelines, and insufficient enrichment that prevents analysts from tying activity to real users and devices. The outcome is a clear understanding of what to collect, how to centralize it, and how to use it to prove or disprove identity-driven attack hypotheses. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:49:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/feb11077/5a11c8c1.mp3" length="27652077" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on identity logs as a primary signal for cloud compromise, because many attacks begin and expand through account misuse rather than classic network intrusion. You’ll learn what identity logs should capture, including authentication events, MFA outcomes, token and session activity, role assumptions, and changes to group membership or privilege assignments. We’ll connect these signals to exam scenarios where you must detect suspicious sign-ins, explain privilege escalation pathways, or validate whether an administrative action was authorized. You’ll also cover troubleshooting considerations such as incomplete coverage across tenants or accounts, inconsistent time synchronization that breaks timelines, and insufficient enrichment that prevents analysts from tying activity to real users and devices. The outcome is a clear understanding of what to collect, how to centralize it, and how to use it to prove or disprove identity-driven attack hypotheses. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/feb11077/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 46 — Capture control-plane logs that show configuration changes and risky administrative actions</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Capture control-plane logs that show configuration changes and risky administrative actions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4b52bed7-417e-446d-9c4d-ad34a51e5e2e</guid>
      <link>https://share.transistor.fm/s/bf96b06d</link>
      <description>
        <![CDATA[<p>This episode explains why control-plane logs are essential for governance, incident response, and exam questions that ask you to reason about configuration change history and administrative intent. You’ll define the control plane as the management layer where resources are created, modified, and destroyed, then identify the kinds of events that matter most: policy updates, network changes, identity and role changes, and security setting modifications. We’ll discuss how these logs support investigations by revealing the exact timeline and actor behind risky actions, including whether changes were performed through automation, console access, or third-party tooling. You’ll also troubleshoot common gaps such as missing regions, short retention windows, and over-permissioned access to logs that allows tampering. By the end, you’ll know how to use control-plane visibility to detect unauthorized change, validate change management claims, and strengthen preventive controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why control-plane logs are essential for governance, incident response, and exam questions that ask you to reason about configuration change history and administrative intent. You’ll define the control plane as the management layer where resources are created, modified, and destroyed, then identify the kinds of events that matter most: policy updates, network changes, identity and role changes, and security setting modifications. We’ll discuss how these logs support investigations by revealing the exact timeline and actor behind risky actions, including whether changes were performed through automation, console access, or third-party tooling. You’ll also troubleshoot common gaps such as missing regions, short retention windows, and over-permissioned access to logs that allows tampering. By the end, you’ll know how to use control-plane visibility to detect unauthorized change, validate change management claims, and strengthen preventive controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:50:10 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bf96b06d/fd703544.mp3" length="26662571" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>665</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why control-plane logs are essential for governance, incident response, and exam questions that ask you to reason about configuration change history and administrative intent. You’ll define the control plane as the management layer where resources are created, modified, and destroyed, then identify the kinds of events that matter most: policy updates, network changes, identity and role changes, and security setting modifications. We’ll discuss how these logs support investigations by revealing the exact timeline and actor behind risky actions, including whether changes were performed through automation, console access, or third-party tooling. You’ll also troubleshoot common gaps such as missing regions, short retention windows, and over-permissioned access to logs that allows tampering. By the end, you’ll know how to use control-plane visibility to detect unauthorized change, validate change management claims, and strengthen preventive controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bf96b06d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 47 — Capture data access logs that reveal sensitive reads, writes, deletes, and sharing </title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Capture data access logs that reveal sensitive reads, writes, deletes, and sharing </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41711c95-cbd1-4bd4-8f78-eb40b9569498</guid>
      <link>https://share.transistor.fm/s/dfc90c42</link>
      <description>
        <![CDATA[<p>This episode focuses on data access logging as a way to detect and prove what happened to sensitive information, which is a recurring theme in cloud leadership and GCLD-style governance scenarios. You’ll learn what data access logs should include, such as object reads and writes, permission changes, share events, and bulk operations that indicate exfiltration or destructive activity. We’ll connect data visibility to real outcomes like breach notification decisions, regulatory reporting, and scoping an incident’s impact, emphasizing why “we think it was accessed” is not defensible without evidence. You’ll also explore troubleshooting issues like high-volume noise, missing service-specific audit events, and ambiguous identities when workloads share credentials or service roles. The goal is to build data logging that is targeted, searchable, and able to answer the most important question during a crisis: exactly what data was touched, and by whom. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on data access logging as a way to detect and prove what happened to sensitive information, which is a recurring theme in cloud leadership and GCLD-style governance scenarios. You’ll learn what data access logs should include, such as object reads and writes, permission changes, share events, and bulk operations that indicate exfiltration or destructive activity. We’ll connect data visibility to real outcomes like breach notification decisions, regulatory reporting, and scoping an incident’s impact, emphasizing why “we think it was accessed” is not defensible without evidence. You’ll also explore troubleshooting issues like high-volume noise, missing service-specific audit events, and ambiguous identities when workloads share credentials or service roles. The goal is to build data logging that is targeted, searchable, and able to answer the most important question during a crisis: exactly what data was touched, and by whom. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:50:31 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dfc90c42/3189054c.mp3" length="23594735" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>589</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on data access logging as a way to detect and prove what happened to sensitive information, which is a recurring theme in cloud leadership and GCLD-style governance scenarios. You’ll learn what data access logs should include, such as object reads and writes, permission changes, share events, and bulk operations that indicate exfiltration or destructive activity. We’ll connect data visibility to real outcomes like breach notification decisions, regulatory reporting, and scoping an incident’s impact, emphasizing why “we think it was accessed” is not defensible without evidence. You’ll also explore troubleshooting issues like high-volume noise, missing service-specific audit events, and ambiguous identities when workloads share credentials or service roles. The goal is to build data logging that is targeted, searchable, and able to answer the most important question during a crisis: exactly what data was touched, and by whom. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dfc90c42/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 48 — Protect log integrity using centralized storage, immutability controls, and tight permissions </title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — Protect log integrity using centralized storage, immutability controls, and tight permissions </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b75e87ff-dc41-4232-9d6e-33fcab2b9627</guid>
      <link>https://share.transistor.fm/s/ddf595ab</link>
      <description>
        <![CDATA[<p>This episode explains how logs become meaningful evidence only when their integrity is protected, which is directly relevant to exam questions on audit readiness and incident defensibility. You’ll learn why decentralized logs are fragile and how centralization reduces loss, improves correlation, and simplifies access control enforcement. We’ll cover immutability concepts, including write-once patterns, retention locks, and controlled deletion policies that prevent attackers or insiders from erasing traces after misuse. You’ll also explore permissions design so log repositories are accessible for analysis but not modifiable by the same identities that can generate suspicious events, supporting separation of duties. Troubleshooting scenarios include accidental log deletion through automated cleanup, excessive admin access that undermines trust, and missing monitoring for log pipeline failures that silently create blind spots. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how logs become meaningful evidence only when their integrity is protected, which is directly relevant to exam questions on audit readiness and incident defensibility. You’ll learn why decentralized logs are fragile and how centralization reduces loss, improves correlation, and simplifies access control enforcement. We’ll cover immutability concepts, including write-once patterns, retention locks, and controlled deletion policies that prevent attackers or insiders from erasing traces after misuse. You’ll also explore permissions design so log repositories are accessible for analysis but not modifiable by the same identities that can generate suspicious events, supporting separation of duties. Troubleshooting scenarios include accidental log deletion through automated cleanup, excessive admin access that undermines trust, and missing monitoring for log pipeline failures that silently create blind spots. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:50:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ddf595ab/5db4af4a.mp3" length="24247818" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>605</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how logs become meaningful evidence only when their integrity is protected, which is directly relevant to exam questions on audit readiness and incident defensibility. You’ll learn why decentralized logs are fragile and how centralization reduces loss, improves correlation, and simplifies access control enforcement. We’ll cover immutability concepts, including write-once patterns, retention locks, and controlled deletion policies that prevent attackers or insiders from erasing traces after misuse. You’ll also explore permissions design so log repositories are accessible for analysis but not modifiable by the same identities that can generate suspicious events, supporting separation of duties. Troubleshooting scenarios include accidental log deletion through automated cleanup, excessive admin access that undermines trust, and missing monitoring for log pipeline failures that silently create blind spots. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ddf595ab/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 49 — Set retention intentionally so logs remain useful across incident and audit timelines </title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — Set retention intentionally so logs remain useful across incident and audit timelines </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aae6a259-5b27-4e92-94a1-2076c543c0fd</guid>
      <link>https://share.transistor.fm/s/7f210480</link>
      <description>
        <![CDATA[<p>This episode focuses on retention as a strategic decision that balances investigation needs, compliance expectations, and operational cost, which is a common governance tradeoff in GCLD-style exam questions. You’ll define retention in terms of time coverage needed to detect slow-moving attacks, support forensic reconstruction, and provide audit evidence across reporting periods. We’ll discuss how different log types may require different retention windows, and why short retention can force you into guesswork when an incident is discovered late. You’ll also cover practical considerations such as tiered storage, access controls for older logs, and ensuring retention policies apply consistently across accounts and regions. Troubleshooting topics include retention set on one service but not another, log pipeline failures that reduce effective retention, and unclear ownership that leads to silent policy changes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on retention as a strategic decision that balances investigation needs, compliance expectations, and operational cost, which is a common governance tradeoff in GCLD-style exam questions. You’ll define retention in terms of time coverage needed to detect slow-moving attacks, support forensic reconstruction, and provide audit evidence across reporting periods. We’ll discuss how different log types may require different retention windows, and why short retention can force you into guesswork when an incident is discovered late. You’ll also cover practical considerations such as tiered storage, access controls for older logs, and ensuring retention policies apply consistently across accounts and regions. Troubleshooting topics include retention set on one service but not another, log pipeline failures that reduce effective retention, and unclear ownership that leads to silent policy changes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:51:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7f210480/c90e13e6.mp3" length="22726430" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>567</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on retention as a strategic decision that balances investigation needs, compliance expectations, and operational cost, which is a common governance tradeoff in GCLD-style exam questions. You’ll define retention in terms of time coverage needed to detect slow-moving attacks, support forensic reconstruction, and provide audit evidence across reporting periods. We’ll discuss how different log types may require different retention windows, and why short retention can force you into guesswork when an incident is discovered late. You’ll also cover practical considerations such as tiered storage, access controls for older logs, and ensuring retention policies apply consistently across accounts and regions. Troubleshooting topics include retention set on one service but not another, log pipeline failures that reduce effective retention, and unclear ownership that leads to silent policy changes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7f210480/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 50 — Normalize logs for correlation so patterns emerge across accounts and regions </title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Normalize logs for correlation so patterns emerge across accounts and regions </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ac93de7e-c626-4207-9141-ffddb84ecbcd</guid>
      <link>https://share.transistor.fm/s/6cd7bc28</link>
      <description>
        <![CDATA[<p>This episode explains how normalization improves detection and investigation by making diverse log sources comparable, searchable, and correlatable across a large cloud footprint. You’ll define normalization as transforming events into consistent fields, timestamps, identity representations, and action categories so analysts can pivot and link related activity without manual translation. We’ll connect this to exam scenarios where you must detect suspicious behavior spanning multiple accounts or regions, such as an attacker using one identity to change policies while another identity accesses data. You’ll also learn how poor normalization creates missed signals, duplicate alerts, and inconsistent reporting, especially when teams use different naming schemes and inconsistent tagging. Troubleshooting considerations include field mapping errors, time zone confusion, inconsistent identity formats, and the need to enrich events with context like asset ownership and environment classification. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how normalization improves detection and investigation by making diverse log sources comparable, searchable, and correlatable across a large cloud footprint. You’ll define normalization as transforming events into consistent fields, timestamps, identity representations, and action categories so analysts can pivot and link related activity without manual translation. We’ll connect this to exam scenarios where you must detect suspicious behavior spanning multiple accounts or regions, such as an attacker using one identity to change policies while another identity accesses data. You’ll also learn how poor normalization creates missed signals, duplicate alerts, and inconsistent reporting, especially when teams use different naming schemes and inconsistent tagging. Troubleshooting considerations include field mapping errors, time zone confusion, inconsistent identity formats, and the need to enrich events with context like asset ownership and environment classification. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:51:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6cd7bc28/655c12ac.mp3" length="24266594" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>605</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how normalization improves detection and investigation by making diverse log sources comparable, searchable, and correlatable across a large cloud footprint. You’ll define normalization as transforming events into consistent fields, timestamps, identity representations, and action categories so analysts can pivot and link related activity without manual translation. We’ll connect this to exam scenarios where you must detect suspicious behavior spanning multiple accounts or regions, such as an attacker using one identity to change policies while another identity accesses data. You’ll also learn how poor normalization creates missed signals, duplicate alerts, and inconsistent reporting, especially when teams use different naming schemes and inconsistent tagging. Troubleshooting considerations include field mapping errors, time zone confusion, inconsistent identity formats, and the need to enrich events with context like asset ownership and environment classification. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6cd7bc28/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 51 — Cloud networking technology: understand VPC or VNET primitives and routing behaviors</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Cloud networking technology: understand VPC or VNET primitives and routing behaviors</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">63acfac2-b673-4544-885e-561f5201434b</guid>
      <link>https://share.transistor.fm/s/8e9d000a</link>
      <description>
        <![CDATA[<p>This episode builds the cloud networking foundation the GCLD exam expects by clarifying what core primitives actually do in practice, including address spaces, subnets, route tables, and the separation between control-plane intent and data-plane behavior. You’ll learn how routing decisions are made, how default routes and propagated routes change traffic flow, and why “it should be isolated” is not the same as “it is unreachable.” We’ll connect these concepts to common exam scenarios like unexpected lateral movement, broken segmentation, and misrouted hybrid connectivity. You’ll also explore real-world troubleshooting considerations, including overlapping CIDR blocks, asymmetric routing, and the operational impact of changing routes in shared environments. The goal is to reason confidently about reachability and blast radius using network building blocks rather than assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds the cloud networking foundation the GCLD exam expects by clarifying what core primitives actually do in practice, including address spaces, subnets, route tables, and the separation between control-plane intent and data-plane behavior. You’ll learn how routing decisions are made, how default routes and propagated routes change traffic flow, and why “it should be isolated” is not the same as “it is unreachable.” We’ll connect these concepts to common exam scenarios like unexpected lateral movement, broken segmentation, and misrouted hybrid connectivity. You’ll also explore real-world troubleshooting considerations, including overlapping CIDR blocks, asymmetric routing, and the operational impact of changing routes in shared environments. The goal is to reason confidently about reachability and blast radius using network building blocks rather than assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:52:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8e9d000a/1b40abfe.mp3" length="37569202" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>938</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds the cloud networking foundation the GCLD exam expects by clarifying what core primitives actually do in practice, including address spaces, subnets, route tables, and the separation between control-plane intent and data-plane behavior. You’ll learn how routing decisions are made, how default routes and propagated routes change traffic flow, and why “it should be isolated” is not the same as “it is unreachable.” We’ll connect these concepts to common exam scenarios like unexpected lateral movement, broken segmentation, and misrouted hybrid connectivity. You’ll also explore real-world troubleshooting considerations, including overlapping CIDR blocks, asymmetric routing, and the operational impact of changing routes in shared environments. The goal is to reason confidently about reachability and blast radius using network building blocks rather than assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8e9d000a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 52 — Segment networks intentionally to reduce blast radius and limit lateral movement </title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Segment networks intentionally to reduce blast radius and limit lateral movement </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">68d1118e-fbdc-49ba-8ebc-1ab182f4f4b4</guid>
      <link>https://share.transistor.fm/s/647f27cb</link>
      <description>
        <![CDATA[<p>This episode explains segmentation as a deliberate risk-reduction strategy, not just a diagram exercise, and it connects directly to GCLD questions about architecture, governance, and incident containment. You’ll define segmentation in cloud terms using subnets, routing boundaries, and policy enforcement points, then learn how segmentation reduces attacker options after initial access. We’ll walk through scenarios where a flat network allows an attacker to pivot from a low-value system to sensitive data services, and how segmented design blocks that path or forces detectable choke points. You’ll also cover operational pitfalls such as overly complex segmentation that teams bypass, inconsistent patterns across environments, and missing documentation that makes troubleshooting slow and risky. By the end, you’ll be able to justify segmentation decisions with clear outcomes: smaller blast radius, fewer trust relationships, and cleaner detection opportunities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains segmentation as a deliberate risk-reduction strategy, not just a diagram exercise, and it connects directly to GCLD questions about architecture, governance, and incident containment. You’ll define segmentation in cloud terms using subnets, routing boundaries, and policy enforcement points, then learn how segmentation reduces attacker options after initial access. We’ll walk through scenarios where a flat network allows an attacker to pivot from a low-value system to sensitive data services, and how segmented design blocks that path or forces detectable choke points. You’ll also cover operational pitfalls such as overly complex segmentation that teams bypass, inconsistent patterns across environments, and missing documentation that makes troubleshooting slow and risky. By the end, you’ll be able to justify segmentation decisions with clear outcomes: smaller blast radius, fewer trust relationships, and cleaner detection opportunities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:52:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/647f27cb/4fa1eaf1.mp3" length="35574486" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>888</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains segmentation as a deliberate risk-reduction strategy, not just a diagram exercise, and it connects directly to GCLD questions about architecture, governance, and incident containment. You’ll define segmentation in cloud terms using subnets, routing boundaries, and policy enforcement points, then learn how segmentation reduces attacker options after initial access. We’ll walk through scenarios where a flat network allows an attacker to pivot from a low-value system to sensitive data services, and how segmented design blocks that path or forces detectable choke points. You’ll also cover operational pitfalls such as overly complex segmentation that teams bypass, inconsistent patterns across environments, and missing documentation that makes troubleshooting slow and risky. By the end, you’ll be able to justify segmentation decisions with clear outcomes: smaller blast radius, fewer trust relationships, and cleaner detection opportunities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/647f27cb/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 53 — Control ingress with security groups, firewalls, and service-specific access policies</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — Control ingress with security groups, firewalls, and service-specific access policies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bb525d13-884f-4805-bf20-9ed63b944e3b</guid>
      <link>https://share.transistor.fm/s/3ba7d755</link>
      <description>
        <![CDATA[<p>This episode focuses on inbound access control as a primary defense layer and shows how the exam expects you to choose the right control for the right exposure point. You’ll compare security groups and firewalls as enforcement mechanisms, then expand into service-specific access policies where the service itself can restrict who may connect or call it. We’ll discuss best practices for least-access ingress rules, including narrowing ports, sources, and protocols, and tying access to known systems rather than broad IP ranges whenever possible. You’ll also troubleshoot common problems like “temporary” broad rules that become permanent, rule shadowing that creates unexpected access, and misalignment between network controls and identity-based authorization that leads to false confidence. The goal is a consistent method for defining what is allowed in, why it is allowed, and how you will detect misuse if it happens. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on inbound access control as a primary defense layer and shows how the exam expects you to choose the right control for the right exposure point. You’ll compare security groups and firewalls as enforcement mechanisms, then expand into service-specific access policies where the service itself can restrict who may connect or call it. We’ll discuss best practices for least-access ingress rules, including narrowing ports, sources, and protocols, and tying access to known systems rather than broad IP ranges whenever possible. You’ll also troubleshoot common problems like “temporary” broad rules that become permanent, rule shadowing that creates unexpected access, and misalignment between network controls and identity-based authorization that leads to false confidence. The goal is a consistent method for defining what is allowed in, why it is allowed, and how you will detect misuse if it happens. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:53:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ba7d755/6b7d5ce6.mp3" length="35244306" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>880</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on inbound access control as a primary defense layer and shows how the exam expects you to choose the right control for the right exposure point. You’ll compare security groups and firewalls as enforcement mechanisms, then expand into service-specific access policies where the service itself can restrict who may connect or call it. We’ll discuss best practices for least-access ingress rules, including narrowing ports, sources, and protocols, and tying access to known systems rather than broad IP ranges whenever possible. You’ll also troubleshoot common problems like “temporary” broad rules that become permanent, rule shadowing that creates unexpected access, and misalignment between network controls and identity-based authorization that leads to false confidence. The goal is a consistent method for defining what is allowed in, why it is allowed, and how you will detect misuse if it happens. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ba7d755/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 54 — Control egress to reduce exfiltration paths and limit command-and-control reachability</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Control egress to reduce exfiltration paths and limit command-and-control reachability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60abf457-1ce7-4a67-aead-c42f57ec9ca2</guid>
      <link>https://share.transistor.fm/s/3ca7c3b1</link>
      <description>
        <![CDATA[<p>This episode explains why outbound traffic control matters in cloud environments and how it changes attacker economics by making exfiltration and command-and-control harder and noisier. You’ll define egress control as limiting where systems can send data, then connect it to exam scenarios involving data loss prevention, containment, and segmentation effectiveness. We’ll cover practical approaches such as restricting outbound destinations, forcing traffic through controlled inspection points, and applying different egress rules for high-risk workloads versus general-purpose systems. You’ll also explore troubleshooting realities like breaking software updates, dependency downloads, and third-party APIs, and how to solve those issues without reverting to “allow all.” By the end, you’ll be able to design egress with a clear balance: enough freedom for business function, but enough constraint to reduce attacker paths and improve detection signal quality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why outbound traffic control matters in cloud environments and how it changes attacker economics by making exfiltration and command-and-control harder and noisier. You’ll define egress control as limiting where systems can send data, then connect it to exam scenarios involving data loss prevention, containment, and segmentation effectiveness. We’ll cover practical approaches such as restricting outbound destinations, forcing traffic through controlled inspection points, and applying different egress rules for high-risk workloads versus general-purpose systems. You’ll also explore troubleshooting realities like breaking software updates, dependency downloads, and third-party APIs, and how to solve those issues without reverting to “allow all.” By the end, you’ll be able to design egress with a clear balance: enough freedom for business function, but enough constraint to reduce attacker paths and improve detection signal quality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:53:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ca7c3b1/5ba8bc0b.mp3" length="26379394" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>658</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why outbound traffic control matters in cloud environments and how it changes attacker economics by making exfiltration and command-and-control harder and noisier. You’ll define egress control as limiting where systems can send data, then connect it to exam scenarios involving data loss prevention, containment, and segmentation effectiveness. We’ll cover practical approaches such as restricting outbound destinations, forcing traffic through controlled inspection points, and applying different egress rules for high-risk workloads versus general-purpose systems. You’ll also explore troubleshooting realities like breaking software updates, dependency downloads, and third-party APIs, and how to solve those issues without reverting to “allow all.” By the end, you’ll be able to design egress with a clear balance: enough freedom for business function, but enough constraint to reduce attacker paths and improve detection signal quality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ca7c3b1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 55 — Design private connectivity patterns that replace public exposure with controlled paths</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Design private connectivity patterns that replace public exposure with controlled paths</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35d8137e-de22-46e9-b5e2-139de2512bc9</guid>
      <link>https://share.transistor.fm/s/5d544187</link>
      <description>
        <![CDATA[<p>This episode teaches how private connectivity reduces attack surface by removing unnecessary internet exposure while still enabling required access between services, networks, and environments. You’ll learn how to reason about “private” in cloud terms, including which traffic stays on provider backbones, how access is authorized, and where enforcement and monitoring should occur. We’ll connect these patterns to GCLD exam decisions about secure architecture, showing why private connectivity can simplify ingress control and reduce scanning and opportunistic attacks. You’ll also walk through scenarios like moving from public service endpoints to private paths, and the operational considerations that come with it, such as DNS behavior, routing changes, and troubleshooting reachability without opening public exceptions. The goal is to replace exposure with controlled connectivity that is easier to govern, monitor, and defend at scale. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how private connectivity reduces attack surface by removing unnecessary internet exposure while still enabling required access between services, networks, and environments. You’ll learn how to reason about “private” in cloud terms, including which traffic stays on provider backbones, how access is authorized, and where enforcement and monitoring should occur. We’ll connect these patterns to GCLD exam decisions about secure architecture, showing why private connectivity can simplify ingress control and reduce scanning and opportunistic attacks. You’ll also walk through scenarios like moving from public service endpoints to private paths, and the operational considerations that come with it, such as DNS behavior, routing changes, and troubleshooting reachability without opening public exceptions. The goal is to replace exposure with controlled connectivity that is easier to govern, monitor, and defend at scale. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:54:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5d544187/d558d6ec.mp3" length="24596800" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>614</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how private connectivity reduces attack surface by removing unnecessary internet exposure while still enabling required access between services, networks, and environments. You’ll learn how to reason about “private” in cloud terms, including which traffic stays on provider backbones, how access is authorized, and where enforcement and monitoring should occur. We’ll connect these patterns to GCLD exam decisions about secure architecture, showing why private connectivity can simplify ingress control and reduce scanning and opportunistic attacks. You’ll also walk through scenarios like moving from public service endpoints to private paths, and the operational considerations that come with it, such as DNS behavior, routing changes, and troubleshooting reachability without opening public exceptions. The goal is to replace exposure with controlled connectivity that is easier to govern, monitor, and defend at scale. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5d544187/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 56 — Encrypt network traffic properly across regions, services, and hybrid connections </title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — Encrypt network traffic properly across regions, services, and hybrid connections </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c9b43032-1c43-493b-8ab1-f1fd869b1519</guid>
      <link>https://share.transistor.fm/s/ae395ecb</link>
      <description>
        <![CDATA[<p>This episode explains how to ensure confidentiality and integrity for data in transit across complex cloud paths, a topic that appears on the GCLD exam as both a technical control and a governance requirement. You’ll define what “properly encrypted” means beyond a checkbox, including strong protocol use, validated certificate handling, and consistent enforcement across service-to-service traffic. We’ll discuss common weak points, such as traffic that is encrypted at the edge but unencrypted internally, misconfigured certificates that cause teams to disable verification, and hybrid links where assumptions about private networks lead to skipped protections. You’ll also cover practical troubleshooting considerations like certificate rotation, mixed legacy clients, and diagnosing failures without weakening security settings. By the end, you’ll be able to evaluate transit protection end-to-end and explain how it supports compliance, reduces interception risk, and strengthens incident impact control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to ensure confidentiality and integrity for data in transit across complex cloud paths, a topic that appears on the GCLD exam as both a technical control and a governance requirement. You’ll define what “properly encrypted” means beyond a checkbox, including strong protocol use, validated certificate handling, and consistent enforcement across service-to-service traffic. We’ll discuss common weak points, such as traffic that is encrypted at the edge but unencrypted internally, misconfigured certificates that cause teams to disable verification, and hybrid links where assumptions about private networks lead to skipped protections. You’ll also cover practical troubleshooting considerations like certificate rotation, mixed legacy clients, and diagnosing failures without weakening security settings. By the end, you’ll be able to evaluate transit protection end-to-end and explain how it supports compliance, reduces interception risk, and strengthens incident impact control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:54:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ae395ecb/938339e9.mp3" length="43838586" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1095</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to ensure confidentiality and integrity for data in transit across complex cloud paths, a topic that appears on the GCLD exam as both a technical control and a governance requirement. You’ll define what “properly encrypted” means beyond a checkbox, including strong protocol use, validated certificate handling, and consistent enforcement across service-to-service traffic. We’ll discuss common weak points, such as traffic that is encrypted at the edge but unencrypted internally, misconfigured certificates that cause teams to disable verification, and hybrid links where assumptions about private networks lead to skipped protections. You’ll also cover practical troubleshooting considerations like certificate rotation, mixed legacy clients, and diagnosing failures without weakening security settings. By the end, you’ll be able to evaluate transit protection end-to-end and explain how it supports compliance, reduces interception risk, and strengthens incident impact control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ae395ecb/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 57 — Secure DNS and name resolution so attackers cannot redirect trust or hide access</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Secure DNS and name resolution so attackers cannot redirect trust or hide access</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">970fbfee-42fc-4a6b-a0ae-0bc84bc61fb7</guid>
      <link>https://share.transistor.fm/s/fc808965</link>
      <description>
        <![CDATA[<p>This episode focuses on DNS as a trust system and shows why it becomes both an attack tool and a defense dependency in cloud environments. You’ll learn how name resolution influences where traffic goes, how service discovery works, and why DNS misconfigurations can quietly bypass intended controls or enable redirection attacks. We’ll connect this to exam scenarios involving data exfiltration, man-in-the-middle risk, and persistence methods where attackers change records to route traffic through their infrastructure. You’ll also explore best practices like controlling who can modify DNS zones, monitoring for unexpected record changes, using consistent naming and segmentation, and validating that resolution paths match intended network boundaries. Troubleshooting topics include split-horizon behavior, caching effects that delay changes, and diagnosing “it resolves but won’t connect” issues without widening access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on DNS as a trust system and shows why it becomes both an attack tool and a defense dependency in cloud environments. You’ll learn how name resolution influences where traffic goes, how service discovery works, and why DNS misconfigurations can quietly bypass intended controls or enable redirection attacks. We’ll connect this to exam scenarios involving data exfiltration, man-in-the-middle risk, and persistence methods where attackers change records to route traffic through their infrastructure. You’ll also explore best practices like controlling who can modify DNS zones, monitoring for unexpected record changes, using consistent naming and segmentation, and validating that resolution paths match intended network boundaries. Troubleshooting topics include split-horizon behavior, caching effects that delay changes, and diagnosing “it resolves but won’t connect” issues without widening access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:55:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fc808965/8e3e7bc9.mp3" length="33539023" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>837</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on DNS as a trust system and shows why it becomes both an attack tool and a defense dependency in cloud environments. You’ll learn how name resolution influences where traffic goes, how service discovery works, and why DNS misconfigurations can quietly bypass intended controls or enable redirection attacks. We’ll connect this to exam scenarios involving data exfiltration, man-in-the-middle risk, and persistence methods where attackers change records to route traffic through their infrastructure. You’ll also explore best practices like controlling who can modify DNS zones, monitoring for unexpected record changes, using consistent naming and segmentation, and validating that resolution paths match intended network boundaries. Troubleshooting topics include split-horizon behavior, caching effects that delay changes, and diagnosing “it resolves but won’t connect” issues without widening access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fc808965/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 58 — Validate network design continuously by testing intended paths versus actual reachability </title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Validate network design continuously by testing intended paths versus actual reachability </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">24f7097c-c676-4210-ae29-5a53afce6bef</guid>
      <link>https://share.transistor.fm/s/bf543835</link>
      <description>
        <![CDATA[<p>This episode teaches how to verify network security outcomes with evidence, not assumptions, by comparing what the design says should happen to what packets can actually do. You’ll define reachability validation as confirming allowed and denied paths across subnets, services, and accounts, then connect it to GCLD expectations around governance, monitoring, and continuous assurance. We’ll discuss why drift, emergency changes, and inherited routes can create hidden access paths even when policies look correct on paper. You’ll also explore practical validation approaches, including defining critical path tests, tracking changes that should trigger re-validation, and using results to drive remediation without causing outages. Troubleshooting considerations include false confidence from incomplete tests, missing coverage across regions, and confusing results caused by DNS, NAT, or asymmetric routing. The goal is a repeatable validation cycle that keeps segmentation and exposure controls accurate over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to verify network security outcomes with evidence, not assumptions, by comparing what the design says should happen to what packets can actually do. You’ll define reachability validation as confirming allowed and denied paths across subnets, services, and accounts, then connect it to GCLD expectations around governance, monitoring, and continuous assurance. We’ll discuss why drift, emergency changes, and inherited routes can create hidden access paths even when policies look correct on paper. You’ll also explore practical validation approaches, including defining critical path tests, tracking changes that should trigger re-validation, and using results to drive remediation without causing outages. Troubleshooting considerations include false confidence from incomplete tests, missing coverage across regions, and confusing results caused by DNS, NAT, or asymmetric routing. The goal is a repeatable validation cycle that keeps segmentation and exposure controls accurate over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:55:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bf543835/7c8f27c6.mp3" length="25969802" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>648</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to verify network security outcomes with evidence, not assumptions, by comparing what the design says should happen to what packets can actually do. You’ll define reachability validation as confirming allowed and denied paths across subnets, services, and accounts, then connect it to GCLD expectations around governance, monitoring, and continuous assurance. We’ll discuss why drift, emergency changes, and inherited routes can create hidden access paths even when policies look correct on paper. You’ll also explore practical validation approaches, including defining critical path tests, tracking changes that should trigger re-validation, and using results to drive remediation without causing outages. Troubleshooting considerations include false confidence from incomplete tests, missing coverage across regions, and confusing results caused by DNS, NAT, or asymmetric routing. The goal is a repeatable validation cycle that keeps segmentation and exposure controls accurate over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bf543835/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 59 — Securing cloud networks: prevent misroutes, shadow paths, and accidental trust relationships</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — Securing cloud networks: prevent misroutes, shadow paths, and accidental trust relationships</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bc46d56c-b21e-43b7-b1c4-f6667a950e7b</guid>
      <link>https://share.transistor.fm/s/030528d8</link>
      <description>
        <![CDATA[<p>This episode focuses on the subtle network failures that create major security problems, including misroutes that send traffic through unintended places, shadow paths that bypass intended controls, and trust relationships that expand without explicit approval. You’ll learn how these issues emerge from routing propagation, shared services, peering links, and overlapping network designs that are common in fast-growing cloud environments. We’ll connect this to exam scenarios where the “right” policy exists but traffic still flows in risky ways, and you must identify the architectural weakness rather than blaming a single firewall rule. You’ll also explore best practices for controlling trust boundaries, documenting intended connectivity, and monitoring for changes that introduce new paths. Troubleshooting topics include diagnosing unexpected reachability, unwinding legacy peering relationships, and preventing repeated reintroduction of risky shortcuts during outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the subtle network failures that create major security problems, including misroutes that send traffic through unintended places, shadow paths that bypass intended controls, and trust relationships that expand without explicit approval. You’ll learn how these issues emerge from routing propagation, shared services, peering links, and overlapping network designs that are common in fast-growing cloud environments. We’ll connect this to exam scenarios where the “right” policy exists but traffic still flows in risky ways, and you must identify the architectural weakness rather than blaming a single firewall rule. You’ll also explore best practices for controlling trust boundaries, documenting intended connectivity, and monitoring for changes that introduce new paths. Troubleshooting topics include diagnosing unexpected reachability, unwinding legacy peering relationships, and preventing repeated reintroduction of risky shortcuts during outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:55:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/030528d8/e40203bc.mp3" length="25850687" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>645</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the subtle network failures that create major security problems, including misroutes that send traffic through unintended places, shadow paths that bypass intended controls, and trust relationships that expand without explicit approval. You’ll learn how these issues emerge from routing propagation, shared services, peering links, and overlapping network designs that are common in fast-growing cloud environments. We’ll connect this to exam scenarios where the “right” policy exists but traffic still flows in risky ways, and you must identify the architectural weakness rather than blaming a single firewall rule. You’ll also explore best practices for controlling trust boundaries, documenting intended connectivity, and monitoring for changes that introduce new paths. Troubleshooting topics include diagnosing unexpected reachability, unwinding legacy peering relationships, and preventing repeated reintroduction of risky shortcuts during outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/030528d8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 60 — Reduce exposure from load balancers, gateways, and proxies with strong defaults </title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60 — Reduce exposure from load balancers, gateways, and proxies with strong defaults </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">03444eb1-b954-4d14-a84c-3633c0bf869b</guid>
      <link>https://share.transistor.fm/s/c8137edd</link>
      <description>
        <![CDATA[<p>This episode explains how edge components like load balancers, gateways, and proxies often become the real perimeter in cloud, making their default configuration choices critical for security and exam-ready architecture reasoning. You’ll learn how these components route and terminate traffic, where encryption should be enforced, and how misconfiguration can expose admin interfaces, weak protocols, or unintended backends. We’ll cover strong defaults such as least-access listeners, secure cipher and protocol settings, restricted management access, and consistent logging that captures client identity and request behavior for detection and troubleshooting. You’ll also explore real-world scenarios like accidentally creating a public-facing endpoint for an internal service, or exposing a proxy that forwards to sensitive systems without proper authorization checks. The goal is to treat these components as security controls with explicit guardrails, not just performance tools, so exposure remains intentional and measurable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how edge components like load balancers, gateways, and proxies often become the real perimeter in cloud, making their default configuration choices critical for security and exam-ready architecture reasoning. You’ll learn how these components route and terminate traffic, where encryption should be enforced, and how misconfiguration can expose admin interfaces, weak protocols, or unintended backends. We’ll cover strong defaults such as least-access listeners, secure cipher and protocol settings, restricted management access, and consistent logging that captures client identity and request behavior for detection and troubleshooting. You’ll also explore real-world scenarios like accidentally creating a public-facing endpoint for an internal service, or exposing a proxy that forwards to sensitive systems without proper authorization checks. The goal is to treat these components as security controls with explicit guardrails, not just performance tools, so exposure remains intentional and measurable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:56:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c8137edd/f35840ec.mp3" length="24717994" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>617</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how edge components like load balancers, gateways, and proxies often become the real perimeter in cloud, making their default configuration choices critical for security and exam-ready architecture reasoning. You’ll learn how these components route and terminate traffic, where encryption should be enforced, and how misconfiguration can expose admin interfaces, weak protocols, or unintended backends. We’ll cover strong defaults such as least-access listeners, secure cipher and protocol settings, restricted management access, and consistent logging that captures client identity and request behavior for detection and troubleshooting. You’ll also explore real-world scenarios like accidentally creating a public-facing endpoint for an internal service, or exposing a proxy that forwards to sensitive systems without proper authorization checks. The goal is to treat these components as security controls with explicit guardrails, not just performance tools, so exposure remains intentional and measurable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c8137edd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 61 — Protect administrative network services so management planes stay isolated and controlled </title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Episode 61 — Protect administrative network services so management planes stay isolated and controlled </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6e0233f-89b2-49ce-acfe-98283409cee6</guid>
      <link>https://share.transistor.fm/s/7aef5ffc</link>
      <description>
        <![CDATA[<p>This episode explains why administrative network services are a high-leverage target and how isolating management planes reduces the chance that a single workload compromise turns into full environment takeover. You’ll define what “management plane” means in practical terms, including administrative endpoints, control interfaces, and privileged network paths that should not be reachable from general application networks. We’ll connect this to GCLD exam scenarios where the correct answer depends on understanding isolation boundaries, privileged access pathways, and the difference between operational convenience and defensible governance. You’ll also explore common failure patterns such as exposing admin ports during troubleshooting, reusing shared jump paths across environments, and allowing overly broad connectivity that makes lateral movement easy. The outcome is a clear approach to limiting where admin services can be reached from, who can reach them, and how to prove those controls are working through logs and validation tests. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why administrative network services are a high-leverage target and how isolating management planes reduces the chance that a single workload compromise turns into full environment takeover. You’ll define what “management plane” means in practical terms, including administrative endpoints, control interfaces, and privileged network paths that should not be reachable from general application networks. We’ll connect this to GCLD exam scenarios where the correct answer depends on understanding isolation boundaries, privileged access pathways, and the difference between operational convenience and defensible governance. You’ll also explore common failure patterns such as exposing admin ports during troubleshooting, reusing shared jump paths across environments, and allowing overly broad connectivity that makes lateral movement easy. The outcome is a clear approach to limiting where admin services can be reached from, who can reach them, and how to prove those controls are working through logs and validation tests. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:56:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7aef5ffc/6d9e774d.mp3" length="36099043" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>901</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why administrative network services are a high-leverage target and how isolating management planes reduces the chance that a single workload compromise turns into full environment takeover. You’ll define what “management plane” means in practical terms, including administrative endpoints, control interfaces, and privileged network paths that should not be reachable from general application networks. We’ll connect this to GCLD exam scenarios where the correct answer depends on understanding isolation boundaries, privileged access pathways, and the difference between operational convenience and defensible governance. You’ll also explore common failure patterns such as exposing admin ports during troubleshooting, reusing shared jump paths across environments, and allowing overly broad connectivity that makes lateral movement easy. The outcome is a clear approach to limiting where admin services can be reached from, who can reach them, and how to prove those controls are working through logs and validation tests. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7aef5ffc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 62 — Network security monitoring in the cloud: choose signals that reveal attacker movement </title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Episode 62 — Network security monitoring in the cloud: choose signals that reveal attacker movement </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d1674d13-3474-49cf-ae41-078e20674771</guid>
      <link>https://share.transistor.fm/s/c309cc6f</link>
      <description>
        <![CDATA[<p>This episode teaches how to select network monitoring signals that actually expose attacker behavior, rather than collecting traffic data that cannot answer investigation questions. You’ll define what “movement” looks like in cloud terms, including unexpected east-west connections, unusual service-to-service calls, and traffic patterns that violate intended segmentation. We’ll tie these ideas to GCLD-style questions that ask you to balance cost, coverage, and operational usefulness while still producing defensible detection capability. You’ll also examine practical challenges such as encrypted traffic reducing payload visibility, ephemeral assets changing baselines, and multi-account designs that complicate correlation. By the end, you’ll be able to justify which flow data, connection metadata, and service-level signals to prioritize so monitoring reveals paths an attacker would use to pivot and expand access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to select network monitoring signals that actually expose attacker behavior, rather than collecting traffic data that cannot answer investigation questions. You’ll define what “movement” looks like in cloud terms, including unexpected east-west connections, unusual service-to-service calls, and traffic patterns that violate intended segmentation. We’ll tie these ideas to GCLD-style questions that ask you to balance cost, coverage, and operational usefulness while still producing defensible detection capability. You’ll also examine practical challenges such as encrypted traffic reducing payload visibility, ephemeral assets changing baselines, and multi-account designs that complicate correlation. By the end, you’ll be able to justify which flow data, connection metadata, and service-level signals to prioritize so monitoring reveals paths an attacker would use to pivot and expand access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:57:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c309cc6f/437b8127.mp3" length="39584816" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>988</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to select network monitoring signals that actually expose attacker behavior, rather than collecting traffic data that cannot answer investigation questions. You’ll define what “movement” looks like in cloud terms, including unexpected east-west connections, unusual service-to-service calls, and traffic patterns that violate intended segmentation. We’ll tie these ideas to GCLD-style questions that ask you to balance cost, coverage, and operational usefulness while still producing defensible detection capability. You’ll also examine practical challenges such as encrypted traffic reducing payload visibility, ephemeral assets changing baselines, and multi-account designs that complicate correlation. By the end, you’ll be able to justify which flow data, connection metadata, and service-level signals to prioritize so monitoring reveals paths an attacker would use to pivot and expand access. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c309cc6f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 63 — Detect identity abuse by correlating logins, token use, and privilege changes </title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Episode 63 — Detect identity abuse by correlating logins, token use, and privilege changes </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d65752ed-3f69-451d-83ba-3ac6e3f0de2c</guid>
      <link>https://share.transistor.fm/s/233e5550</link>
      <description>
        <![CDATA[<p>This episode focuses on identity abuse as a primary cloud attack pattern and shows how correlation across authentication, token activity, and privilege events produces stronger detections than any single log source. You’ll define identity abuse signals such as anomalous sign-in contexts, unexpected token usage, unusual role assumptions, and rapid privilege changes that do not match normal operational workflows. We’ll connect these signals to exam scenarios where you must identify likely compromise indicators and choose the most reliable evidence to validate suspicious access. You’ll also explore troubleshooting issues like shared accounts that blur attribution, incomplete logging that hides token behavior, and noisy alerts caused by legitimate automation that was never documented. The goal is a repeatable correlation mindset: link who signed in, what credential material was used afterward, and what privileges changed, so you can distinguish routine administration from attacker-driven expansion. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on identity abuse as a primary cloud attack pattern and shows how correlation across authentication, token activity, and privilege events produces stronger detections than any single log source. You’ll define identity abuse signals such as anomalous sign-in contexts, unexpected token usage, unusual role assumptions, and rapid privilege changes that do not match normal operational workflows. We’ll connect these signals to exam scenarios where you must identify likely compromise indicators and choose the most reliable evidence to validate suspicious access. You’ll also explore troubleshooting issues like shared accounts that blur attribution, incomplete logging that hides token behavior, and noisy alerts caused by legitimate automation that was never documented. The goal is a repeatable correlation mindset: link who signed in, what credential material was used afterward, and what privileges changed, so you can distinguish routine administration from attacker-driven expansion. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:57:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/233e5550/67c011c8.mp3" length="32375002" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>808</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on identity abuse as a primary cloud attack pattern and shows how correlation across authentication, token activity, and privilege events produces stronger detections than any single log source. You’ll define identity abuse signals such as anomalous sign-in contexts, unexpected token usage, unusual role assumptions, and rapid privilege changes that do not match normal operational workflows. We’ll connect these signals to exam scenarios where you must identify likely compromise indicators and choose the most reliable evidence to validate suspicious access. You’ll also explore troubleshooting issues like shared accounts that blur attribution, incomplete logging that hides token behavior, and noisy alerts caused by legitimate automation that was never documented. The goal is a repeatable correlation mindset: link who signed in, what credential material was used afterward, and what privileges changed, so you can distinguish routine administration from attacker-driven expansion. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/233e5550/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 64 — Detect lateral movement by monitoring network flows, service calls, and unusual access paths </title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Episode 64 — Detect lateral movement by monitoring network flows, service calls, and unusual access paths </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c8016e0-9821-4dfb-a995-768d50818fa4</guid>
      <link>https://share.transistor.fm/s/fd6db3ea</link>
      <description>
        <![CDATA[<p>This episode explains lateral movement in cloud environments as a combination of connectivity, identity, and service-to-service behavior, and it prepares you for GCLD questions that test how attackers pivot after initial footholds. You’ll learn how to spot movement through abnormal network flows, unexpected API calls, and access paths that bypass intended segmentation or normal deployment patterns. We’ll use scenario thinking, such as a compromised workload suddenly reaching management interfaces or calling sensitive services it never used before, to illustrate what “unusual” looks like when you have baseline context. You’ll also cover practical hurdles like microservices generating lots of internal traffic, ephemeral scaling changing normal patterns, and gaps created when monitoring is enabled in one account or region but not another. The outcome is an investigative approach that combines flow evidence with service logs and identity events to confirm whether activity represents benign operations or a true pivot attempt. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains lateral movement in cloud environments as a combination of connectivity, identity, and service-to-service behavior, and it prepares you for GCLD questions that test how attackers pivot after initial footholds. You’ll learn how to spot movement through abnormal network flows, unexpected API calls, and access paths that bypass intended segmentation or normal deployment patterns. We’ll use scenario thinking, such as a compromised workload suddenly reaching management interfaces or calling sensitive services it never used before, to illustrate what “unusual” looks like when you have baseline context. You’ll also cover practical hurdles like microservices generating lots of internal traffic, ephemeral scaling changing normal patterns, and gaps created when monitoring is enabled in one account or region but not another. The outcome is an investigative approach that combines flow evidence with service logs and identity events to confirm whether activity represents benign operations or a true pivot attempt. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 14:59:31 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fd6db3ea/a2df4970.mp3" length="29539179" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>737</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains lateral movement in cloud environments as a combination of connectivity, identity, and service-to-service behavior, and it prepares you for GCLD questions that test how attackers pivot after initial footholds. You’ll learn how to spot movement through abnormal network flows, unexpected API calls, and access paths that bypass intended segmentation or normal deployment patterns. We’ll use scenario thinking, such as a compromised workload suddenly reaching management interfaces or calling sensitive services it never used before, to illustrate what “unusual” looks like when you have baseline context. You’ll also cover practical hurdles like microservices generating lots of internal traffic, ephemeral scaling changing normal patterns, and gaps created when monitoring is enabled in one account or region but not another. The outcome is an investigative approach that combines flow evidence with service logs and identity events to confirm whether activity represents benign operations or a true pivot attempt. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fd6db3ea/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 65 — Detect data exfiltration attempts using volume baselines, destination analysis, and timing</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Episode 65 — Detect data exfiltration attempts using volume baselines, destination analysis, and timing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e1e0c8ab-ba5a-42cb-bff5-09a7de4f5098</guid>
      <link>https://share.transistor.fm/s/8b1fc9aa</link>
      <description>
        <![CDATA[<p>This episode teaches how to detect exfiltration attempts by focusing on measurable behaviors—how much data moves, where it goes, and when it happens—rather than relying on hope that sensitive content will be obvious. You’ll define volume baselines as expected transfer ranges for systems and datasets, then learn how deviations can indicate bulk exports, staged transfers, or automated scraping. We’ll connect destination analysis to cloud reality by examining unusual external endpoints, unexpected cross-region transfers, and atypical cross-account sharing or replication that can quietly move data out of its intended boundary. You’ll also explore timing signals such as off-hours bursts, repetitive small transfers designed to evade thresholds, and sudden changes that occur immediately after privilege escalation or policy edits. The goal is to build an evidence-driven detection posture that supports both exam reasoning and real incident scoping when you must decide whether sensitive data likely left the environment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to detect exfiltration attempts by focusing on measurable behaviors—how much data moves, where it goes, and when it happens—rather than relying on hope that sensitive content will be obvious. You’ll define volume baselines as expected transfer ranges for systems and datasets, then learn how deviations can indicate bulk exports, staged transfers, or automated scraping. We’ll connect destination analysis to cloud reality by examining unusual external endpoints, unexpected cross-region transfers, and atypical cross-account sharing or replication that can quietly move data out of its intended boundary. You’ll also explore timing signals such as off-hours bursts, repetitive small transfers designed to evade thresholds, and sudden changes that occur immediately after privilege escalation or policy edits. The goal is to build an evidence-driven detection posture that supports both exam reasoning and real incident scoping when you must decide whether sensitive data likely left the environment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:03:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8b1fc9aa/ae76b96e.mp3" length="26880953" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>671</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to detect exfiltration attempts by focusing on measurable behaviors—how much data moves, where it goes, and when it happens—rather than relying on hope that sensitive content will be obvious. You’ll define volume baselines as expected transfer ranges for systems and datasets, then learn how deviations can indicate bulk exports, staged transfers, or automated scraping. We’ll connect destination analysis to cloud reality by examining unusual external endpoints, unexpected cross-region transfers, and atypical cross-account sharing or replication that can quietly move data out of its intended boundary. You’ll also explore timing signals such as off-hours bursts, repetitive small transfers designed to evade thresholds, and sudden changes that occur immediately after privilege escalation or policy edits. The goal is to build an evidence-driven detection posture that supports both exam reasoning and real incident scoping when you must decide whether sensitive data likely left the environment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8b1fc9aa/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 66 — Tune detections to reduce noise while keeping high-confidence cloud security alerts </title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Episode 66 — Tune detections to reduce noise while keeping high-confidence cloud security alerts </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">983b9fa1-551a-4741-bab7-4705e253447d</guid>
      <link>https://share.transistor.fm/s/0e6a6981</link>
      <description>
        <![CDATA[<p>This episode focuses on alert quality as a governance outcome, because noisy detections create fatigue, missed incidents, and poor credibility with stakeholders—topics that show up in leadership-oriented exam scenarios. You’ll learn how tuning works by adjusting thresholds, adding context, and narrowing conditions so alerts reflect meaningful risk rather than generic anomalies. We’ll discuss strategies such as baselining by environment, separating dev from prod, suppressing known-good automation, and enriching alerts with asset ownership and sensitivity so responders can triage quickly. You’ll also examine common tuning mistakes like disabling noisy rules without replacement, overfitting detections to current behavior so new attacks blend in, and failing to measure whether changes improve response outcomes. The goal is to maintain a set of high-confidence alerts that teams trust, investigate consistently, and can defend during audits as a reliable monitoring program rather than a collection of ignored notifications. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on alert quality as a governance outcome, because noisy detections create fatigue, missed incidents, and poor credibility with stakeholders—topics that show up in leadership-oriented exam scenarios. You’ll learn how tuning works by adjusting thresholds, adding context, and narrowing conditions so alerts reflect meaningful risk rather than generic anomalies. We’ll discuss strategies such as baselining by environment, separating dev from prod, suppressing known-good automation, and enriching alerts with asset ownership and sensitivity so responders can triage quickly. You’ll also examine common tuning mistakes like disabling noisy rules without replacement, overfitting detections to current behavior so new attacks blend in, and failing to measure whether changes improve response outcomes. The goal is to maintain a set of high-confidence alerts that teams trust, investigate consistently, and can defend during audits as a reliable monitoring program rather than a collection of ignored notifications. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:04:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0e6a6981/f2d13834.mp3" length="25415994" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>634</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on alert quality as a governance outcome, because noisy detections create fatigue, missed incidents, and poor credibility with stakeholders—topics that show up in leadership-oriented exam scenarios. You’ll learn how tuning works by adjusting thresholds, adding context, and narrowing conditions so alerts reflect meaningful risk rather than generic anomalies. We’ll discuss strategies such as baselining by environment, separating dev from prod, suppressing known-good automation, and enriching alerts with asset ownership and sensitivity so responders can triage quickly. You’ll also examine common tuning mistakes like disabling noisy rules without replacement, overfitting detections to current behavior so new attacks blend in, and failing to measure whether changes improve response outcomes. The goal is to maintain a set of high-confidence alerts that teams trust, investigate consistently, and can defend during audits as a reliable monitoring program rather than a collection of ignored notifications. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0e6a6981/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 67 — Investigate alerts with cloud context to decide benign behavior versus true compromise </title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Episode 67 — Investigate alerts with cloud context to decide benign behavior versus true compromise </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2e0966af-b95d-4dd3-a918-1affd9e5d2be</guid>
      <link>https://share.transistor.fm/s/b00bed3e</link>
      <description>
        <![CDATA[<p>This episode teaches how to investigate cloud alerts using context that turns raw events into a defensible conclusion, which aligns with GCLD expectations for decision-making under uncertainty. You’ll define “cloud context” as identity relationships, resource ownership, environment purpose, recent change activity, and known operational patterns that explain why something happened. We’ll walk through how to build a timeline that links identity actions, control-plane changes, network activity, and data access so you can decide whether the alert is a false positive, a misconfiguration, or active attacker behavior. You’ll also cover troubleshooting realities like incomplete logs, ambiguous service identities, and overlapping automation that makes “normal” difficult to define without ownership and tagging discipline. The outcome is a repeatable investigation flow that produces clear next steps—contain, validate, tune, or close—backed by evidence rather than intuition. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to investigate cloud alerts using context that turns raw events into a defensible conclusion, which aligns with GCLD expectations for decision-making under uncertainty. You’ll define “cloud context” as identity relationships, resource ownership, environment purpose, recent change activity, and known operational patterns that explain why something happened. We’ll walk through how to build a timeline that links identity actions, control-plane changes, network activity, and data access so you can decide whether the alert is a false positive, a misconfiguration, or active attacker behavior. You’ll also cover troubleshooting realities like incomplete logs, ambiguous service identities, and overlapping automation that makes “normal” difficult to define without ownership and tagging discipline. The outcome is a repeatable investigation flow that produces clear next steps—contain, validate, tune, or close—backed by evidence rather than intuition. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:04:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b00bed3e/74078efe.mp3" length="26217437" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>654</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to investigate cloud alerts using context that turns raw events into a defensible conclusion, which aligns with GCLD expectations for decision-making under uncertainty. You’ll define “cloud context” as identity relationships, resource ownership, environment purpose, recent change activity, and known operational patterns that explain why something happened. We’ll walk through how to build a timeline that links identity actions, control-plane changes, network activity, and data access so you can decide whether the alert is a false positive, a misconfiguration, or active attacker behavior. You’ll also cover troubleshooting realities like incomplete logs, ambiguous service identities, and overlapping automation that makes “normal” difficult to define without ownership and tagging discipline. The outcome is a repeatable investigation flow that produces clear next steps—contain, validate, tune, or close—backed by evidence rather than intuition. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b00bed3e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 68 — Secure compute deployment: harden images, reduce services, and enforce patch cadence </title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Episode 68 — Secure compute deployment: harden images, reduce services, and enforce patch cadence </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">186235ce-4a27-4e4b-8710-b368fe79d6b9</guid>
      <link>https://share.transistor.fm/s/76bb616c</link>
      <description>
        <![CDATA[<p>This episode focuses on compute deployment security as a lifecycle discipline, not a one-time configuration, and it supports GCLD questions that test how leaders build sustainable hardening programs. You’ll define image hardening as removing unnecessary components, configuring secure defaults, and ensuring consistent settings before systems scale out. We’ll connect service reduction to attack surface control by showing how unnecessary daemons, open ports, and extra packages expand opportunities for exploitation and complicate monitoring. You’ll also learn how patch cadence becomes a governance control: setting expectations, measuring compliance, and managing exceptions so security does not depend on heroic manual work. Troubleshooting topics include compatibility concerns that delay patching, drift caused by manual changes after deployment, and the risk of inconsistent images across environments that break both detection and recovery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on compute deployment security as a lifecycle discipline, not a one-time configuration, and it supports GCLD questions that test how leaders build sustainable hardening programs. You’ll define image hardening as removing unnecessary components, configuring secure defaults, and ensuring consistent settings before systems scale out. We’ll connect service reduction to attack surface control by showing how unnecessary daemons, open ports, and extra packages expand opportunities for exploitation and complicate monitoring. You’ll also learn how patch cadence becomes a governance control: setting expectations, measuring compliance, and managing exceptions so security does not depend on heroic manual work. Troubleshooting topics include compatibility concerns that delay patching, drift caused by manual changes after deployment, and the risk of inconsistent images across environments that break both detection and recovery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:05:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/76bb616c/f31fd9d0.mp3" length="30316567" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>757</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on compute deployment security as a lifecycle discipline, not a one-time configuration, and it supports GCLD questions that test how leaders build sustainable hardening programs. You’ll define image hardening as removing unnecessary components, configuring secure defaults, and ensuring consistent settings before systems scale out. We’ll connect service reduction to attack surface control by showing how unnecessary daemons, open ports, and extra packages expand opportunities for exploitation and complicate monitoring. You’ll also learn how patch cadence becomes a governance control: setting expectations, measuring compliance, and managing exceptions so security does not depend on heroic manual work. Troubleshooting topics include compatibility concerns that delay patching, drift caused by manual changes after deployment, and the risk of inconsistent images across environments that break both detection and recovery. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/76bb616c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 69 — Use immutable infrastructure patterns to shrink the window for persistent compromise</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Episode 69 — Use immutable infrastructure patterns to shrink the window for persistent compromise</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb5ec8c0-420d-46a3-badc-cfae8ec30d94</guid>
      <link>https://share.transistor.fm/s/e94162e6</link>
      <description>
        <![CDATA[<p>This episode explains immutable infrastructure as a strategy for reducing persistence opportunities by replacing systems instead of repairing them in place, which is a recurring secure-by-design concept in cloud governance. You’ll define immutability as treating deployed compute as disposable, where changes are made in the build pipeline and new instances replace old ones through controlled rollout. We’ll connect this to exam scenarios where attackers modify systems to maintain access, and immutability reduces that risk by limiting ad hoc changes and making unauthorized modifications easier to detect. You’ll also explore operational considerations like managing state externally, ensuring deployments are repeatable, and designing rollback so immutable patterns improve resilience rather than introducing downtime. The goal is to understand how immutability supports clean recovery, consistent baselines, and faster response, while also recognizing where teams must be careful to avoid hidden configuration drift in supporting services. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains immutable infrastructure as a strategy for reducing persistence opportunities by replacing systems instead of repairing them in place, which is a recurring secure-by-design concept in cloud governance. You’ll define immutability as treating deployed compute as disposable, where changes are made in the build pipeline and new instances replace old ones through controlled rollout. We’ll connect this to exam scenarios where attackers modify systems to maintain access, and immutability reduces that risk by limiting ad hoc changes and making unauthorized modifications easier to detect. You’ll also explore operational considerations like managing state externally, ensuring deployments are repeatable, and designing rollback so immutable patterns improve resilience rather than introducing downtime. The goal is to understand how immutability supports clean recovery, consistent baselines, and faster response, while also recognizing where teams must be careful to avoid hidden configuration drift in supporting services. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:05:42 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e94162e6/35ced972.mp3" length="29587226" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>738</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains immutable infrastructure as a strategy for reducing persistence opportunities by replacing systems instead of repairing them in place, which is a recurring secure-by-design concept in cloud governance. You’ll define immutability as treating deployed compute as disposable, where changes are made in the build pipeline and new instances replace old ones through controlled rollout. We’ll connect this to exam scenarios where attackers modify systems to maintain access, and immutability reduces that risk by limiting ad hoc changes and making unauthorized modifications easier to detect. You’ll also explore operational considerations like managing state externally, ensuring deployments are repeatable, and designing rollback so immutable patterns improve resilience rather than introducing downtime. The goal is to understand how immutability supports clean recovery, consistent baselines, and faster response, while also recognizing where teams must be careful to avoid hidden configuration drift in supporting services. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e94162e6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 70 — Validate compute security with baselines, policy enforcement, and continuous posture checks </title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Episode 70 — Validate compute security with baselines, policy enforcement, and continuous posture checks </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">37cdbc50-8f3b-441b-a794-27acc2b418e6</guid>
      <link>https://share.transistor.fm/s/b8fc5c0f</link>
      <description>
        <![CDATA[<p>This episode teaches how to validate that compute security remains true over time by combining baselines, enforceable policies, and continuous checks that detect drift quickly. You’ll define a compute baseline as a measurable standard for configuration, patch level, logging, and exposed services, then connect it to governance by emphasizing evidence, accountability, and repeatable validation. We’ll discuss how policy enforcement prevents known-bad states from deploying, while posture checks confirm that running systems still match intent even after scaling events and emergency fixes. You’ll also examine troubleshooting challenges such as false positives caused by legitimate variation, exceptions that undermine enforcement if not time-bound, and missing asset inventory that makes validation incomplete. By the end, you’ll have a clear method to prove compute posture is maintained, not merely intended, and to translate that proof into audit-ready evidence and operational confidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to validate that compute security remains true over time by combining baselines, enforceable policies, and continuous checks that detect drift quickly. You’ll define a compute baseline as a measurable standard for configuration, patch level, logging, and exposed services, then connect it to governance by emphasizing evidence, accountability, and repeatable validation. We’ll discuss how policy enforcement prevents known-bad states from deploying, while posture checks confirm that running systems still match intent even after scaling events and emergency fixes. You’ll also examine troubleshooting challenges such as false positives caused by legitimate variation, exceptions that undermine enforcement if not time-bound, and missing asset inventory that makes validation incomplete. By the end, you’ll have a clear method to prove compute posture is maintained, not merely intended, and to translate that proof into audit-ready evidence and operational confidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:06:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b8fc5c0f/2ca5de24.mp3" length="38673675" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>966</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to validate that compute security remains true over time by combining baselines, enforceable policies, and continuous checks that detect drift quickly. You’ll define a compute baseline as a measurable standard for configuration, patch level, logging, and exposed services, then connect it to governance by emphasizing evidence, accountability, and repeatable validation. We’ll discuss how policy enforcement prevents known-bad states from deploying, while posture checks confirm that running systems still match intent even after scaling events and emergency fixes. You’ll also examine troubleshooting challenges such as false positives caused by legitimate variation, exceptions that undermine enforcement if not time-bound, and missing asset inventory that makes validation incomplete. By the end, you’ll have a clear method to prove compute posture is maintained, not merely intended, and to translate that proof into audit-ready evidence and operational confidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b8fc5c0f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 71 — Apply runtime protections that limit execution, persistence, and privilege inside workloads </title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Episode 71 — Apply runtime protections that limit execution, persistence, and privilege inside workloads </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0eae2ce7-3e9d-4a2b-99fb-5d7244bab6c7</guid>
      <link>https://share.transistor.fm/s/0a3e76e8</link>
      <description>
        <![CDATA[<p>This episode explains runtime protections as the controls that operate while workloads are running, not just during build or deployment, and it ties directly to GCLD questions about reducing attacker options after initial foothold. You’ll define runtime protections in practical terms, including restricting what processes can execute, limiting outbound connections, and preventing unauthorized privilege changes that enable persistence. We’ll explore scenarios where an attacker lands in a workload through stolen credentials or exposed services, then attempts to install tools, create new accounts, or modify startup behavior, and you’ll learn how runtime controls can block or surface those moves quickly. You’ll also cover best practices for balancing protection with stability, such as applying stricter controls to high-risk services first, validating impacts in non-production environments, and using logging to prove controls are working. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains runtime protections as the controls that operate while workloads are running, not just during build or deployment, and it ties directly to GCLD questions about reducing attacker options after initial foothold. You’ll define runtime protections in practical terms, including restricting what processes can execute, limiting outbound connections, and preventing unauthorized privilege changes that enable persistence. We’ll explore scenarios where an attacker lands in a workload through stolen credentials or exposed services, then attempts to install tools, create new accounts, or modify startup behavior, and you’ll learn how runtime controls can block or surface those moves quickly. You’ll also cover best practices for balancing protection with stability, such as applying stricter controls to high-risk services first, validating impacts in non-production environments, and using logging to prove controls are working. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:06:30 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0a3e76e8/b8ed548e.mp3" length="34520206" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>862</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains runtime protections as the controls that operate while workloads are running, not just during build or deployment, and it ties directly to GCLD questions about reducing attacker options after initial foothold. You’ll define runtime protections in practical terms, including restricting what processes can execute, limiting outbound connections, and preventing unauthorized privilege changes that enable persistence. We’ll explore scenarios where an attacker lands in a workload through stolen credentials or exposed services, then attempts to install tools, create new accounts, or modify startup behavior, and you’ll learn how runtime controls can block or surface those moves quickly. You’ll also cover best practices for balancing protection with stability, such as applying stricter controls to high-risk services first, validating impacts in non-production environments, and using logging to prove controls are working. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0a3e76e8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 72 — Secure serverless and managed compute by controlling permissions, triggers, and inputs </title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Episode 72 — Secure serverless and managed compute by controlling permissions, triggers, and inputs </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c1d1645-d8e7-44e4-8def-2ae77b69acb4</guid>
      <link>https://share.transistor.fm/s/60b3796a</link>
      <description>
        <![CDATA[<p>This episode focuses on how serverless and managed compute shift risk from host hardening to identity, configuration, and event integrity, which is a common trap in governance-oriented exam scenarios. You’ll define the security control points that matter most: the permissions the function runs with, the triggers that invoke it, and the inputs it processes. We’ll discuss how overbroad permissions turn small logic flaws into major breaches, how trigger tampering can become persistence, and how unvalidated inputs can drive unauthorized actions like data access or privilege changes. You’ll also learn troubleshooting considerations such as separating trigger management from code deployment, monitoring for unexpected trigger updates, and constraining which services may invoke functions. The goal is a repeatable model for defending serverless workloads where control-plane discipline and least privilege do the heavy lifting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on how serverless and managed compute shift risk from host hardening to identity, configuration, and event integrity, which is a common trap in governance-oriented exam scenarios. You’ll define the security control points that matter most: the permissions the function runs with, the triggers that invoke it, and the inputs it processes. We’ll discuss how overbroad permissions turn small logic flaws into major breaches, how trigger tampering can become persistence, and how unvalidated inputs can drive unauthorized actions like data access or privilege changes. You’ll also learn troubleshooting considerations such as separating trigger management from code deployment, monitoring for unexpected trigger updates, and constraining which services may invoke functions. The goal is a repeatable model for defending serverless workloads where control-plane discipline and least privilege do the heavy lifting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:06:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/60b3796a/69e58083.mp3" length="30211037" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>754</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on how serverless and managed compute shift risk from host hardening to identity, configuration, and event integrity, which is a common trap in governance-oriented exam scenarios. You’ll define the security control points that matter most: the permissions the function runs with, the triggers that invoke it, and the inputs it processes. We’ll discuss how overbroad permissions turn small logic flaws into major breaches, how trigger tampering can become persistence, and how unvalidated inputs can drive unauthorized actions like data access or privilege changes. You’ll also learn troubleshooting considerations such as separating trigger management from code deployment, monitoring for unexpected trigger updates, and constraining which services may invoke functions. The goal is a repeatable model for defending serverless workloads where control-plane discipline and least privilege do the heavy lifting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/60b3796a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 73 — Containers and cloud storage: secure container builds from source to registry to runtime</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>Episode 73 — Containers and cloud storage: secure container builds from source to registry to runtime</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9a1b5d20-67e1-416d-a80e-fc93af467913</guid>
      <link>https://share.transistor.fm/s/3febde02</link>
      <description>
        <![CDATA[<p>This episode teaches the end-to-end container supply chain, emphasizing that container security is not a single scan but a controlled path from source code to build system to registry to runtime. You’ll learn how vulnerabilities and malicious changes can enter at each stage, including compromised dependencies, poisoned build pipelines, and registries that allow untrusted images to be pulled into production. We’ll connect these risks to exam expectations by focusing on governance controls: access control for registries, approvals for image promotion, and evidence through build and pull logs. You’ll also explore practical scenarios like a team pulling “latest” images without review, or an attacker pushing a lookalike image into an internal registry, and you’ll learn how policy and monitoring prevent silent drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches the end-to-end container supply chain, emphasizing that container security is not a single scan but a controlled path from source code to build system to registry to runtime. You’ll learn how vulnerabilities and malicious changes can enter at each stage, including compromised dependencies, poisoned build pipelines, and registries that allow untrusted images to be pulled into production. We’ll connect these risks to exam expectations by focusing on governance controls: access control for registries, approvals for image promotion, and evidence through build and pull logs. You’ll also explore practical scenarios like a team pulling “latest” images without review, or an attacker pushing a lookalike image into an internal registry, and you’ll learn how policy and monitoring prevent silent drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:07:19 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3febde02/6e51df1a.mp3" length="31356247" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>783</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches the end-to-end container supply chain, emphasizing that container security is not a single scan but a controlled path from source code to build system to registry to runtime. You’ll learn how vulnerabilities and malicious changes can enter at each stage, including compromised dependencies, poisoned build pipelines, and registries that allow untrusted images to be pulled into production. We’ll connect these risks to exam expectations by focusing on governance controls: access control for registries, approvals for image promotion, and evidence through build and pull logs. You’ll also explore practical scenarios like a team pulling “latest” images without review, or an attacker pushing a lookalike image into an internal registry, and you’ll learn how policy and monitoring prevent silent drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3febde02/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 74 — Enforce image hygiene by scanning, signing, and blocking risky dependencies </title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Episode 74 — Enforce image hygiene by scanning, signing, and blocking risky dependencies </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5fac46ea-94f9-4a02-82be-2fb0073ec761</guid>
      <link>https://share.transistor.fm/s/4897d152</link>
      <description>
        <![CDATA[<p>This episode explains image hygiene as a set of enforceable practices that reduce exploitable weaknesses before workloads ever run, and it aligns with GCLD questions about preventive controls and scalable governance. You’ll define scanning as identifying known vulnerabilities and insecure configurations, then expand into signing as an integrity mechanism that proves images came from trusted build processes. We’ll discuss how “blocking” works operationally, including setting policies that prevent promotion or deployment when risk thresholds are exceeded, and how to handle exceptions without creating permanent bypasses. You’ll also examine dependency risk, such as outdated libraries, unmaintained packages, or unexpected transitive dependencies that quietly introduce exploitable code paths. The goal is to create a clean, repeatable pipeline where only reviewed, verifiably produced images reach runtime, and where violations produce clear evidence and remediation steps. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains image hygiene as a set of enforceable practices that reduce exploitable weaknesses before workloads ever run, and it aligns with GCLD questions about preventive controls and scalable governance. You’ll define scanning as identifying known vulnerabilities and insecure configurations, then expand into signing as an integrity mechanism that proves images came from trusted build processes. We’ll discuss how “blocking” works operationally, including setting policies that prevent promotion or deployment when risk thresholds are exceeded, and how to handle exceptions without creating permanent bypasses. You’ll also examine dependency risk, such as outdated libraries, unmaintained packages, or unexpected transitive dependencies that quietly introduce exploitable code paths. The goal is to create a clean, repeatable pipeline where only reviewed, verifiably produced images reach runtime, and where violations produce clear evidence and remediation steps. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:07:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4897d152/6cd7f265.mp3" length="40322492" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1007</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains image hygiene as a set of enforceable practices that reduce exploitable weaknesses before workloads ever run, and it aligns with GCLD questions about preventive controls and scalable governance. You’ll define scanning as identifying known vulnerabilities and insecure configurations, then expand into signing as an integrity mechanism that proves images came from trusted build processes. We’ll discuss how “blocking” works operationally, including setting policies that prevent promotion or deployment when risk thresholds are exceeded, and how to handle exceptions without creating permanent bypasses. You’ll also examine dependency risk, such as outdated libraries, unmaintained packages, or unexpected transitive dependencies that quietly introduce exploitable code paths. The goal is to create a clean, repeatable pipeline where only reviewed, verifiably produced images reach runtime, and where violations produce clear evidence and remediation steps. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4897d152/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 75 — Isolate containers using least privilege runtime settings and strong boundary controls </title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Episode 75 — Isolate containers using least privilege runtime settings and strong boundary controls </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c16fff70-f087-4e11-82a1-e1407b981521</guid>
      <link>https://share.transistor.fm/s/2da26152</link>
      <description>
        <![CDATA[<p>This episode focuses on container isolation as a runtime governance outcome, not a promise implied by “it’s containerized,” and it prepares you for exam items that test boundary thinking and blast radius control. You’ll learn how least privilege applies at runtime through restricted capabilities, limited filesystem access, constrained network paths, and separation between workloads that should not trust each other. We’ll cover why weak boundaries enable container escape attempts, lateral movement between services, and unauthorized access to secrets or host resources, even when images are clean. You’ll also explore practical troubleshooting issues, such as workloads that were built with unnecessary privileges, teams that depend on broad permissions for convenience, and the need to validate isolation continuously as deployments change. The outcome is an isolation mindset where each workload gets only the access it needs, and boundary controls are treated as enforceable, testable security controls with evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on container isolation as a runtime governance outcome, not a promise implied by “it’s containerized,” and it prepares you for exam items that test boundary thinking and blast radius control. You’ll learn how least privilege applies at runtime through restricted capabilities, limited filesystem access, constrained network paths, and separation between workloads that should not trust each other. We’ll cover why weak boundaries enable container escape attempts, lateral movement between services, and unauthorized access to secrets or host resources, even when images are clean. You’ll also explore practical troubleshooting issues, such as workloads that were built with unnecessary privileges, teams that depend on broad permissions for convenience, and the need to validate isolation continuously as deployments change. The outcome is an isolation mindset where each workload gets only the access it needs, and boundary controls are treated as enforceable, testable security controls with evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:08:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2da26152/c790aa60.mp3" length="40258775" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1005</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on container isolation as a runtime governance outcome, not a promise implied by “it’s containerized,” and it prepares you for exam items that test boundary thinking and blast radius control. You’ll learn how least privilege applies at runtime through restricted capabilities, limited filesystem access, constrained network paths, and separation between workloads that should not trust each other. We’ll cover why weak boundaries enable container escape attempts, lateral movement between services, and unauthorized access to secrets or host resources, even when images are clean. You’ll also explore practical troubleshooting issues, such as workloads that were built with unnecessary privileges, teams that depend on broad permissions for convenience, and the need to validate isolation continuously as deployments change. The outcome is an isolation mindset where each workload gets only the access it needs, and boundary controls are treated as enforceable, testable security controls with evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2da26152/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 76 — Protect cloud storage with encryption, access policies, and safe sharing defaults </title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>Episode 76 — Protect cloud storage with encryption, access policies, and safe sharing defaults </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be59e625-722e-494e-87ac-1e0a97c17c02</guid>
      <link>https://share.transistor.fm/s/823eae0c</link>
      <description>
        <![CDATA[<p>This episode explains how to secure cloud storage using layered controls that prevent accidental exposure and reduce the impact of credential misuse, which is a recurring theme in cloud leadership exams. You’ll define the three pillars of storage protection: encryption to reduce data disclosure risk, access policies to enforce least privilege, and safe sharing defaults that prevent public access by mistake. We’ll discuss practical scenarios like a sensitive dataset shared for troubleshooting that becomes broadly accessible, and how controls like policy restrictions, approvals, and logging prevent “temporary” sharing from turning into a breach. You’ll also learn troubleshooting considerations, including confusing policy inheritance, overlapping access mechanisms, and the difference between being able to read data versus being able to enumerate, copy, or delete it at scale. By the end, you’ll have a method to evaluate storage security as a system with measurable outcomes, not as a single toggle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to secure cloud storage using layered controls that prevent accidental exposure and reduce the impact of credential misuse, which is a recurring theme in cloud leadership exams. You’ll define the three pillars of storage protection: encryption to reduce data disclosure risk, access policies to enforce least privilege, and safe sharing defaults that prevent public access by mistake. We’ll discuss practical scenarios like a sensitive dataset shared for troubleshooting that becomes broadly accessible, and how controls like policy restrictions, approvals, and logging prevent “temporary” sharing from turning into a breach. You’ll also learn troubleshooting considerations, including confusing policy inheritance, overlapping access mechanisms, and the difference between being able to read data versus being able to enumerate, copy, or delete it at scale. By the end, you’ll have a method to evaluate storage security as a system with measurable outcomes, not as a single toggle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:08:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/823eae0c/6a4d212f.mp3" length="32760578" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>818</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to secure cloud storage using layered controls that prevent accidental exposure and reduce the impact of credential misuse, which is a recurring theme in cloud leadership exams. You’ll define the three pillars of storage protection: encryption to reduce data disclosure risk, access policies to enforce least privilege, and safe sharing defaults that prevent public access by mistake. We’ll discuss practical scenarios like a sensitive dataset shared for troubleshooting that becomes broadly accessible, and how controls like policy restrictions, approvals, and logging prevent “temporary” sharing from turning into a breach. You’ll also learn troubleshooting considerations, including confusing policy inheritance, overlapping access mechanisms, and the difference between being able to read data versus being able to enumerate, copy, or delete it at scale. By the end, you’ll have a method to evaluate storage security as a system with measurable outcomes, not as a single toggle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/823eae0c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 77 — Prevent public bucket mistakes by validating policies, ACLs, and inherited permissions</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Episode 77 — Prevent public bucket mistakes by validating policies, ACLs, and inherited permissions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9bebe46f-f97d-4535-ab13-e0ce462e7b06</guid>
      <link>https://share.transistor.fm/s/13a74a6f</link>
      <description>
        <![CDATA[<p>This episode focuses on one of the most common cloud failure patterns: storage resources becoming public due to misunderstood configuration, rushed changes, or inherited permissions that no one reviewed. You’ll learn how “public” can emerge through multiple mechanisms, including explicit policy statements, ACL-style grants, sharing links, and inheritance from parent scopes that override local intent. We’ll connect this to GCLD exam scenarios by emphasizing validation over assumptions, including how to confirm effective permissions and how to detect exposure quickly through monitoring and posture checks. You’ll also explore real-world troubleshooting, such as diagnosing why access is allowed when it “shouldn’t be,” resolving conflicting policy layers, and avoiding the dangerous habit of fixing access issues by broadening permissions. The goal is to make public exposure prevention a repeatable control with clear evidence, not a hope-based configuration habit. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on one of the most common cloud failure patterns: storage resources becoming public due to misunderstood configuration, rushed changes, or inherited permissions that no one reviewed. You’ll learn how “public” can emerge through multiple mechanisms, including explicit policy statements, ACL-style grants, sharing links, and inheritance from parent scopes that override local intent. We’ll connect this to GCLD exam scenarios by emphasizing validation over assumptions, including how to confirm effective permissions and how to detect exposure quickly through monitoring and posture checks. You’ll also explore real-world troubleshooting, such as diagnosing why access is allowed when it “shouldn’t be,” resolving conflicting policy layers, and avoiding the dangerous habit of fixing access issues by broadening permissions. The goal is to make public exposure prevention a repeatable control with clear evidence, not a hope-based configuration habit. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:08:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/13a74a6f/61363679.mp3" length="26019949" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>649</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on one of the most common cloud failure patterns: storage resources becoming public due to misunderstood configuration, rushed changes, or inherited permissions that no one reviewed. You’ll learn how “public” can emerge through multiple mechanisms, including explicit policy statements, ACL-style grants, sharing links, and inheritance from parent scopes that override local intent. We’ll connect this to GCLD exam scenarios by emphasizing validation over assumptions, including how to confirm effective permissions and how to detect exposure quickly through monitoring and posture checks. You’ll also explore real-world troubleshooting, such as diagnosing why access is allowed when it “shouldn’t be,” resolving conflicting policy layers, and avoiding the dangerous habit of fixing access issues by broadening permissions. The goal is to make public exposure prevention a repeatable control with clear evidence, not a hope-based configuration habit. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/13a74a6f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 78 — Control object lifecycle and versioning to support recovery, accountability, and integrity </title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Episode 78 — Control object lifecycle and versioning to support recovery, accountability, and integrity </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b68b0a5-c218-441b-a5f6-0ddfa8add307</guid>
      <link>https://share.transistor.fm/s/fe872401</link>
      <description>
        <![CDATA[<p>This episode explains object lifecycle and versioning as governance tools that support recovery and accountability, not just cost management features, and it aligns with exam questions that connect storage controls to resilience outcomes. You’ll define lifecycle controls as policies that manage retention, transitions, and deletion behavior, and you’ll learn how versioning supports integrity by preserving prior states when data is overwritten or deleted. We’ll explore scenarios like ransomware-style deletion, accidental bulk updates, or malicious tampering, and how lifecycle rules and versioning can reduce impact and speed recovery when combined with logging and access control. You’ll also cover practical tradeoffs such as cost growth, operational complexity, and the need to ensure versioning and retention settings are consistent across sensitive datasets. The goal is a clear approach to designing storage behavior that supports investigations, restores data reliably, and produces defensible evidence of control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains object lifecycle and versioning as governance tools that support recovery and accountability, not just cost management features, and it aligns with exam questions that connect storage controls to resilience outcomes. You’ll define lifecycle controls as policies that manage retention, transitions, and deletion behavior, and you’ll learn how versioning supports integrity by preserving prior states when data is overwritten or deleted. We’ll explore scenarios like ransomware-style deletion, accidental bulk updates, or malicious tampering, and how lifecycle rules and versioning can reduce impact and speed recovery when combined with logging and access control. You’ll also cover practical tradeoffs such as cost growth, operational complexity, and the need to ensure versioning and retention settings are consistent across sensitive datasets. The goal is a clear approach to designing storage behavior that supports investigations, restores data reliably, and produces defensible evidence of control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:09:23 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fe872401/7977d266.mp3" length="29585151" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>738</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains object lifecycle and versioning as governance tools that support recovery and accountability, not just cost management features, and it aligns with exam questions that connect storage controls to resilience outcomes. You’ll define lifecycle controls as policies that manage retention, transitions, and deletion behavior, and you’ll learn how versioning supports integrity by preserving prior states when data is overwritten or deleted. We’ll explore scenarios like ransomware-style deletion, accidental bulk updates, or malicious tampering, and how lifecycle rules and versioning can reduce impact and speed recovery when combined with logging and access control. You’ll also cover practical tradeoffs such as cost growth, operational complexity, and the need to ensure versioning and retention settings are consistent across sensitive datasets. The goal is a clear approach to designing storage behavior that supports investigations, restores data reliably, and produces defensible evidence of control. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fe872401/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 79 — Discovering sensitive data: classify what matters and reduce unknown data sprawl </title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Episode 79 — Discovering sensitive data: classify what matters and reduce unknown data sprawl </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f8c334ba-a91d-4acc-818b-9dc2c9b7ca46</guid>
      <link>https://share.transistor.fm/s/5d5d230b</link>
      <description>
        <![CDATA[<p>This episode focuses on data discovery as the starting point for meaningful protection, because you cannot secure what you do not know exists, and the GCLD exam expects you to connect classification to practical control decisions. You’ll define sensitive data in operational terms, then learn how classification establishes priorities for encryption, access restrictions, monitoring, and retention. We’ll discuss why data sprawl happens in cloud—easy copying, fast experimentation, duplicated datasets, and logs or exports left behind—and how that sprawl increases breach impact and complicates incident response. You’ll also explore governance tactics such as assigning ownership, requiring labeling or tagging, and setting rules that prevent sensitive data from being stored in inappropriate locations without approvals. The outcome is an evidence-driven program where sensitive data is identified, tracked, and reduced over time instead of expanding silently. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on data discovery as the starting point for meaningful protection, because you cannot secure what you do not know exists, and the GCLD exam expects you to connect classification to practical control decisions. You’ll define sensitive data in operational terms, then learn how classification establishes priorities for encryption, access restrictions, monitoring, and retention. We’ll discuss why data sprawl happens in cloud—easy copying, fast experimentation, duplicated datasets, and logs or exports left behind—and how that sprawl increases breach impact and complicates incident response. You’ll also explore governance tactics such as assigning ownership, requiring labeling or tagging, and setting rules that prevent sensitive data from being stored in inappropriate locations without approvals. The outcome is an evidence-driven program where sensitive data is identified, tracked, and reduced over time instead of expanding silently. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:09:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5d5d230b/0b848065.mp3" length="38306894" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>956</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on data discovery as the starting point for meaningful protection, because you cannot secure what you do not know exists, and the GCLD exam expects you to connect classification to practical control decisions. You’ll define sensitive data in operational terms, then learn how classification establishes priorities for encryption, access restrictions, monitoring, and retention. We’ll discuss why data sprawl happens in cloud—easy copying, fast experimentation, duplicated datasets, and logs or exports left behind—and how that sprawl increases breach impact and complicates incident response. You’ll also explore governance tactics such as assigning ownership, requiring labeling or tagging, and setting rules that prevent sensitive data from being stored in inappropriate locations without approvals. The outcome is an evidence-driven program where sensitive data is identified, tracked, and reduced over time instead of expanding silently. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5d5d230b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 80 — Find sensitive data in storage, databases, logs, and object metadata consistently </title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Episode 80 — Find sensitive data in storage, databases, logs, and object metadata consistently </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">05cd9e13-fa04-4088-9bf1-6ce24316fa51</guid>
      <link>https://share.transistor.fm/s/e94ed146</link>
      <description>
        <![CDATA[<p>This episode teaches how to search for sensitive data consistently across the places it often hides, including object storage, databases, application logs, and metadata that reveals meaning even when content is encrypted. You’ll connect this to exam scenarios by focusing on control outcomes: knowing where sensitive records live, proving access restrictions match data criticality, and being able to scope incidents quickly when exposure is suspected. We’ll discuss examples like secrets accidentally written to logs, exports copied into object storage for analysis, or metadata and naming conventions that reveal regulated content types. You’ll also learn troubleshooting considerations such as false positives, incomplete coverage across accounts and regions, and inconsistent tagging that breaks automation and reporting. The goal is a repeatable discovery approach that feeds classification, access control, and monitoring, so sensitive data becomes governed and visible rather than scattered and unknown. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to search for sensitive data consistently across the places it often hides, including object storage, databases, application logs, and metadata that reveals meaning even when content is encrypted. You’ll connect this to exam scenarios by focusing on control outcomes: knowing where sensitive records live, proving access restrictions match data criticality, and being able to scope incidents quickly when exposure is suspected. We’ll discuss examples like secrets accidentally written to logs, exports copied into object storage for analysis, or metadata and naming conventions that reveal regulated content types. You’ll also learn troubleshooting considerations such as false positives, incomplete coverage across accounts and regions, and inconsistent tagging that breaks automation and reporting. The goal is a repeatable discovery approach that feeds classification, access control, and monitoring, so sensitive data becomes governed and visible rather than scattered and unknown. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:10:10 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e94ed146/5168b49c.mp3" length="35939157" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>897</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to search for sensitive data consistently across the places it often hides, including object storage, databases, application logs, and metadata that reveals meaning even when content is encrypted. You’ll connect this to exam scenarios by focusing on control outcomes: knowing where sensitive records live, proving access restrictions match data criticality, and being able to scope incidents quickly when exposure is suspected. We’ll discuss examples like secrets accidentally written to logs, exports copied into object storage for analysis, or metadata and naming conventions that reveal regulated content types. You’ll also learn troubleshooting considerations such as false positives, incomplete coverage across accounts and regions, and inconsistent tagging that breaks automation and reporting. The goal is a repeatable discovery approach that feeds classification, access control, and monitoring, so sensitive data becomes governed and visible rather than scattered and unknown. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e94ed146/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 81 — Store sensitive data safely with encryption, key management, and strict access controls</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Episode 81 — Store sensitive data safely with encryption, key management, and strict access controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86315104-6c3d-4d98-89b8-11d7c51e75ae</guid>
      <link>https://share.transistor.fm/s/14c64a8a</link>
      <description>
        <![CDATA[<p>This episode focuses on the control stack that makes sensitive data storage defensible on the GCLD exam and in real cloud programs: encryption, key management, and tightly scoped access working together. You’ll define encryption at rest in practical terms, then connect it to key management responsibilities such as ownership, rotation expectations, separation of duties, and preventing “everyone can decrypt” administrative designs. We’ll cover how strict access controls reduce the impact of credential misuse by limiting who can read, copy, or bulk export sensitive datasets, and why “read access” and “list/export/delete access” must be treated differently. You’ll also explore real-world failure modes, including default keys used everywhere without governance, broad roles that bypass data boundaries, and missing audit evidence that makes it impossible to prove who accessed what. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the control stack that makes sensitive data storage defensible on the GCLD exam and in real cloud programs: encryption, key management, and tightly scoped access working together. You’ll define encryption at rest in practical terms, then connect it to key management responsibilities such as ownership, rotation expectations, separation of duties, and preventing “everyone can decrypt” administrative designs. We’ll cover how strict access controls reduce the impact of credential misuse by limiting who can read, copy, or bulk export sensitive datasets, and why “read access” and “list/export/delete access” must be treated differently. You’ll also explore real-world failure modes, including default keys used everywhere without governance, broad roles that bypass data boundaries, and missing audit evidence that makes it impossible to prove who accessed what. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:10:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/14c64a8a/82a9e9b4.mp3" length="25587363" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>638</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the control stack that makes sensitive data storage defensible on the GCLD exam and in real cloud programs: encryption, key management, and tightly scoped access working together. You’ll define encryption at rest in practical terms, then connect it to key management responsibilities such as ownership, rotation expectations, separation of duties, and preventing “everyone can decrypt” administrative designs. We’ll cover how strict access controls reduce the impact of credential misuse by limiting who can read, copy, or bulk export sensitive datasets, and why “read access” and “list/export/delete access” must be treated differently. You’ll also explore real-world failure modes, including default keys used everywhere without governance, broad roles that bypass data boundaries, and missing audit evidence that makes it impossible to prove who accessed what. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/14c64a8a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 82 — Use sensitive data responsibly by controlling purpose, retention, and minimum exposure</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Episode 82 — Use sensitive data responsibly by controlling purpose, retention, and minimum exposure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6d0e804-bc3f-41c2-b3aa-7688442af2f5</guid>
      <link>https://share.transistor.fm/s/28ce85e3</link>
      <description>
        <![CDATA[<p>This episode explains responsible data use as a governance discipline that connects directly to GCLD-style questions about reducing risk while still enabling business outcomes. You’ll define purpose limitation as ensuring data is accessed and processed only for approved reasons, then show how unclear purpose leads to sprawling access, uncontrolled copies, and “because we might need it” retention that increases breach impact. We’ll discuss retention as a risk control, including why keeping data longer than needed expands the window for compromise and complicates incident response scoping and regulatory decisions. You’ll also learn how minimum exposure applies in practice by limiting who sees raw records, reducing unnecessary fields, and designing workflows that avoid moving sensitive data into logs, tickets, or shared analysis buckets. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains responsible data use as a governance discipline that connects directly to GCLD-style questions about reducing risk while still enabling business outcomes. You’ll define purpose limitation as ensuring data is accessed and processed only for approved reasons, then show how unclear purpose leads to sprawling access, uncontrolled copies, and “because we might need it” retention that increases breach impact. We’ll discuss retention as a risk control, including why keeping data longer than needed expands the window for compromise and complicates incident response scoping and regulatory decisions. You’ll also learn how minimum exposure applies in practice by limiting who sees raw records, reducing unnecessary fields, and designing workflows that avoid moving sensitive data into logs, tickets, or shared analysis buckets. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:11:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/28ce85e3/b1eb9f44.mp3" length="24045092" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>600</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains responsible data use as a governance discipline that connects directly to GCLD-style questions about reducing risk while still enabling business outcomes. You’ll define purpose limitation as ensuring data is accessed and processed only for approved reasons, then show how unclear purpose leads to sprawling access, uncontrolled copies, and “because we might need it” retention that increases breach impact. We’ll discuss retention as a risk control, including why keeping data longer than needed expands the window for compromise and complicates incident response scoping and regulatory decisions. You’ll also learn how minimum exposure applies in practice by limiting who sees raw records, reducing unnecessary fields, and designing workflows that avoid moving sensitive data into logs, tickets, or shared analysis buckets. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/28ce85e3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 83 — Prevent data leakage with monitoring, blocking controls, and tested response playbooks </title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Episode 83 — Prevent data leakage with monitoring, blocking controls, and tested response playbooks </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cabf04c0-ed29-4c2b-90d9-94f8f31182b9</guid>
      <link>https://share.transistor.fm/s/66ad326b</link>
      <description>
        <![CDATA[<p>This episode teaches how to prevent data leakage by combining visibility, preventative enforcement, and response readiness, which is a frequent exam theme because each element fails alone. You’ll learn how monitoring detects early signals such as unusual download patterns, unexpected sharing events, and new access paths created by policy changes, and why baselines and context are needed to separate normal operations from real risk. We’ll discuss blocking controls that stop high-risk actions, including overly permissive sharing, bulk exports from sensitive stores, and transfers to untrusted destinations, while still allowing approved workflows through controlled exceptions. You’ll also explore how tested response playbooks reduce chaos by defining containment steps, evidence collection, and communication patterns before an event occurs, and why playbooks must be rehearsed to be trusted under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to prevent data leakage by combining visibility, preventative enforcement, and response readiness, which is a frequent exam theme because each element fails alone. You’ll learn how monitoring detects early signals such as unusual download patterns, unexpected sharing events, and new access paths created by policy changes, and why baselines and context are needed to separate normal operations from real risk. We’ll discuss blocking controls that stop high-risk actions, including overly permissive sharing, bulk exports from sensitive stores, and transfers to untrusted destinations, while still allowing approved workflows through controlled exceptions. You’ll also explore how tested response playbooks reduce chaos by defining containment steps, evidence collection, and communication patterns before an event occurs, and why playbooks must be rehearsed to be trusted under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:11:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/66ad326b/764f1a41.mp3" length="24563363" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>613</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to prevent data leakage by combining visibility, preventative enforcement, and response readiness, which is a frequent exam theme because each element fails alone. You’ll learn how monitoring detects early signals such as unusual download patterns, unexpected sharing events, and new access paths created by policy changes, and why baselines and context are needed to separate normal operations from real risk. We’ll discuss blocking controls that stop high-risk actions, including overly permissive sharing, bulk exports from sensitive stores, and transfers to untrusted destinations, while still allowing approved workflows through controlled exceptions. You’ll also explore how tested response playbooks reduce chaos by defining containment steps, evidence collection, and communication patterns before an event occurs, and why playbooks must be rehearsed to be trusted under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/66ad326b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 84 — Risk management and compliance: translate cloud risk into defensible business decisions </title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Episode 84 — Risk management and compliance: translate cloud risk into defensible business decisions </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9dc44b50-386b-4ce5-ab9a-583b6e1d5669</guid>
      <link>https://share.transistor.fm/s/e759c9d2</link>
      <description>
        <![CDATA[<p>This episode focuses on turning cloud security risk into decisions leadership can defend, which is central to the GCLD exam’s emphasis on governance, prioritization, and accountability. You’ll define risk in practical terms—likelihood and impact tied to assets, threats, and exposure—and learn how to describe it in business language without losing technical accuracy. We’ll cover how compliance requirements influence priorities, but also why compliance alone is not the same as security, especially when controls are implemented as checkboxes without evidence of effectiveness. You’ll work through scenarios where teams must choose between competing investments, such as strengthening identity controls versus expanding monitoring, and learn how to justify choices based on reduction of real attack paths and measurable outcomes. The goal is a repeatable method for making and documenting decisions that hold up during incidents, audits, and executive review. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on turning cloud security risk into decisions leadership can defend, which is central to the GCLD exam’s emphasis on governance, prioritization, and accountability. You’ll define risk in practical terms—likelihood and impact tied to assets, threats, and exposure—and learn how to describe it in business language without losing technical accuracy. We’ll cover how compliance requirements influence priorities, but also why compliance alone is not the same as security, especially when controls are implemented as checkboxes without evidence of effectiveness. You’ll work through scenarios where teams must choose between competing investments, such as strengthening identity controls versus expanding monitoring, and learn how to justify choices based on reduction of real attack paths and measurable outcomes. The goal is a repeatable method for making and documenting decisions that hold up during incidents, audits, and executive review. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:26:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e759c9d2/70cedf98.mp3" length="23606239" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>589</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on turning cloud security risk into decisions leadership can defend, which is central to the GCLD exam’s emphasis on governance, prioritization, and accountability. You’ll define risk in practical terms—likelihood and impact tied to assets, threats, and exposure—and learn how to describe it in business language without losing technical accuracy. We’ll cover how compliance requirements influence priorities, but also why compliance alone is not the same as security, especially when controls are implemented as checkboxes without evidence of effectiveness. You’ll work through scenarios where teams must choose between competing investments, such as strengthening identity controls versus expanding monitoring, and learn how to justify choices based on reduction of real attack paths and measurable outcomes. The goal is a repeatable method for making and documenting decisions that hold up during incidents, audits, and executive review. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e759c9d2/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 85 — Map controls to requirements so audits become evidence-driven rather than narrative-driven </title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>Episode 85 — Map controls to requirements so audits become evidence-driven rather than narrative-driven </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2b19d1f2-570b-41f9-b7c3-11b32e375bfc</guid>
      <link>https://share.transistor.fm/s/de435ca5</link>
      <description>
        <![CDATA[<p>This episode explains how to map security controls to requirements in a way that produces objective evidence, which is often what exam questions are really testing when they ask about audit readiness and governance maturity. You’ll learn how to translate requirements into clear control statements, then define what “good evidence” looks like: logs, configurations, access reviews, and change records that directly demonstrate the control operating as intended. We’ll discuss why narrative-only compliance creates fragility, including how inconsistent documentation, missing ownership, and untested assumptions collapse under auditor scrutiny or after an incident. You’ll also explore practical approaches for organizing mappings, keeping them current as services change, and ensuring evidence collection is automated where possible so it is reliable and repeatable. The outcome is a control mapping mindset that supports both audit success and real operational security, because the same evidence used for auditors also supports investigations and governance decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to map security controls to requirements in a way that produces objective evidence, which is often what exam questions are really testing when they ask about audit readiness and governance maturity. You’ll learn how to translate requirements into clear control statements, then define what “good evidence” looks like: logs, configurations, access reviews, and change records that directly demonstrate the control operating as intended. We’ll discuss why narrative-only compliance creates fragility, including how inconsistent documentation, missing ownership, and untested assumptions collapse under auditor scrutiny or after an incident. You’ll also explore practical approaches for organizing mappings, keeping them current as services change, and ensuring evidence collection is automated where possible so it is reliable and repeatable. The outcome is a control mapping mindset that supports both audit success and real operational security, because the same evidence used for auditors also supports investigations and governance decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:26:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/de435ca5/d93cef33.mp3" length="21910375" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>546</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to map security controls to requirements in a way that produces objective evidence, which is often what exam questions are really testing when they ask about audit readiness and governance maturity. You’ll learn how to translate requirements into clear control statements, then define what “good evidence” looks like: logs, configurations, access reviews, and change records that directly demonstrate the control operating as intended. We’ll discuss why narrative-only compliance creates fragility, including how inconsistent documentation, missing ownership, and untested assumptions collapse under auditor scrutiny or after an incident. You’ll also explore practical approaches for organizing mappings, keeping them current as services change, and ensuring evidence collection is automated where possible so it is reliable and repeatable. The outcome is a control mapping mindset that supports both audit success and real operational security, because the same evidence used for auditors also supports investigations and governance decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/de435ca5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 86 — Prepare for cloud audits by aligning logs, configurations, and access reviews to evidence </title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Episode 86 — Prepare for cloud audits by aligning logs, configurations, and access reviews to evidence </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">63c1a5d5-9511-440f-8c69-3c2eb15ff854</guid>
      <link>https://share.transistor.fm/s/60c6812a</link>
      <description>
        <![CDATA[<p>This episode teaches practical audit preparation as an engineering and governance alignment exercise: logs must exist and be retained, configurations must reflect policy, and access reviews must be performed and documented in a way that produces defensible evidence. You’ll connect the audit goal to cloud reality by focusing on what auditors can validate independently, such as control-plane logging, immutable log storage, encryption settings, and permission boundaries tied to real owners. We’ll discuss how to reduce audit disruption by keeping evidence continuously ready, including scheduled access reviews, standardized baselines, and change management records that explain why exceptions exist and when they expire. You’ll also explore common audit failure patterns like inconsistent controls across accounts, missing retention due to cost shortcuts, and access review processes that exist in name but cannot be proven. The goal is to treat audit readiness as a byproduct of good operations, not a last-minute scramble that exposes hidden weaknesses. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches practical audit preparation as an engineering and governance alignment exercise: logs must exist and be retained, configurations must reflect policy, and access reviews must be performed and documented in a way that produces defensible evidence. You’ll connect the audit goal to cloud reality by focusing on what auditors can validate independently, such as control-plane logging, immutable log storage, encryption settings, and permission boundaries tied to real owners. We’ll discuss how to reduce audit disruption by keeping evidence continuously ready, including scheduled access reviews, standardized baselines, and change management records that explain why exceptions exist and when they expire. You’ll also explore common audit failure patterns like inconsistent controls across accounts, missing retention due to cost shortcuts, and access review processes that exist in name but cannot be proven. The goal is to treat audit readiness as a byproduct of good operations, not a last-minute scramble that exposes hidden weaknesses. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:26:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/60c6812a/b9c61483.mp3" length="22768234" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>568</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches practical audit preparation as an engineering and governance alignment exercise: logs must exist and be retained, configurations must reflect policy, and access reviews must be performed and documented in a way that produces defensible evidence. You’ll connect the audit goal to cloud reality by focusing on what auditors can validate independently, such as control-plane logging, immutable log storage, encryption settings, and permission boundaries tied to real owners. We’ll discuss how to reduce audit disruption by keeping evidence continuously ready, including scheduled access reviews, standardized baselines, and change management records that explain why exceptions exist and when they expire. You’ll also explore common audit failure patterns like inconsistent controls across accounts, missing retention due to cost shortcuts, and access review processes that exist in name but cannot be proven. The goal is to treat audit readiness as a byproduct of good operations, not a last-minute scramble that exposes hidden weaknesses. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/60c6812a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 87 — Perform practical cloud security assessments that surface misconfigurations before attackers do</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Episode 87 — Perform practical cloud security assessments that surface misconfigurations before attackers do</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5a895c4d-efac-4caa-8812-d48f783f882f</guid>
      <link>https://share.transistor.fm/s/c808ff39</link>
      <description>
        <![CDATA[<p>This episode brings the series together by focusing on practical assessments that find misconfigurations and weak governance before they become incidents, aligning with the GCLD expectation that leaders measure reality, not intentions. You’ll learn how to structure assessments around high-impact areas like identity privilege, public exposure, logging gaps, encryption coverage, and risky automation pathways, then translate findings into prioritized remediation with clear ownership. We’ll discuss how to validate effective permissions and reachability, how to confirm that guardrails and baselines are actually enforced, and how to use assessment results to strengthen both prevention and detection programs. You’ll also cover pitfalls such as shallow checklist reviews that miss real attack paths, focusing only on one account or region, and failing to verify fixes after remediation, which allows drift to reintroduce risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode brings the series together by focusing on practical assessments that find misconfigurations and weak governance before they become incidents, aligning with the GCLD expectation that leaders measure reality, not intentions. You’ll learn how to structure assessments around high-impact areas like identity privilege, public exposure, logging gaps, encryption coverage, and risky automation pathways, then translate findings into prioritized remediation with clear ownership. We’ll discuss how to validate effective permissions and reachability, how to confirm that guardrails and baselines are actually enforced, and how to use assessment results to strengthen both prevention and detection programs. You’ll also cover pitfalls such as shallow checklist reviews that miss real attack paths, focusing only on one account or region, and failing to verify fixes after remediation, which allows drift to reintroduce risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:27:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c808ff39/ff3602b0.mp3" length="26028326" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>649</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode brings the series together by focusing on practical assessments that find misconfigurations and weak governance before they become incidents, aligning with the GCLD expectation that leaders measure reality, not intentions. You’ll learn how to structure assessments around high-impact areas like identity privilege, public exposure, logging gaps, encryption coverage, and risky automation pathways, then translate findings into prioritized remediation with clear ownership. We’ll discuss how to validate effective permissions and reachability, how to confirm that guardrails and baselines are actually enforced, and how to use assessment results to strengthen both prevention and detection programs. You’ll also cover pitfalls such as shallow checklist reviews that miss real attack paths, focusing only on one account or region, and failing to verify fixes after remediation, which allows drift to reintroduce risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c808ff39/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Welcome to Certified: The GIAC GCLD Audio Course</title>
      <itunes:title>Welcome to Certified: The GIAC GCLD Audio Course</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">612fef99-a8a0-48a0-8a60-d9ee90c21a43</guid>
      <link>https://share.transistor.fm/s/6b9d4f3b</link>
      <description>
        <![CDATA[<p>This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late. You’ll build a practical, defensible security posture across compute, containers, storage, and managed services by using hardened baselines, policy enforcement, continuous validation, and clear ownership. Along the way, you’ll learn how to reduce attack surface with immutable deployment patterns, least privilege workload identities, safe sharing defaults, and recovery-focused controls like versioning and lifecycle rules.</p><p>You’ll also strengthen detection and response by choosing high-signal monitoring that reveals attacker movement, correlating identity abuse across logins, tokens, and privilege changes, and tuning alerts so responders focus on what actually matters. The course includes actionable playbooks for investigating cloud alerts, preventing data leakage with blocking controls and step-up authentication for risky actions, and preparing audit-ready evidence that aligns logs, configurations, access reviews, and exceptions. The result is a cloud security approach that is operational, repeatable, and built for teams who need measurable risk reduction—not just best-practice slogans.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late. You’ll build a practical, defensible security posture across compute, containers, storage, and managed services by using hardened baselines, policy enforcement, continuous validation, and clear ownership. Along the way, you’ll learn how to reduce attack surface with immutable deployment patterns, least privilege workload identities, safe sharing defaults, and recovery-focused controls like versioning and lifecycle rules.</p><p>You’ll also strengthen detection and response by choosing high-signal monitoring that reveals attacker movement, correlating identity abuse across logins, tokens, and privilege changes, and tuning alerts so responders focus on what actually matters. The course includes actionable playbooks for investigating cloud alerts, preventing data leakage with blocking controls and step-up authentication for risky actions, and preparing audit-ready evidence that aligns logs, configurations, access reviews, and exceptions. The result is a cloud security approach that is operational, repeatable, and built for teams who need measurable risk reduction—not just best-practice slogans.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:32:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6b9d4f3b/dc086ecf.mp3" length="733536" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>92</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and data exposure paths that are easy to miss until it’s too late. You’ll build a practical, defensible security posture across compute, containers, storage, and managed services by using hardened baselines, policy enforcement, continuous validation, and clear ownership. Along the way, you’ll learn how to reduce attack surface with immutable deployment patterns, least privilege workload identities, safe sharing defaults, and recovery-focused controls like versioning and lifecycle rules.</p><p>You’ll also strengthen detection and response by choosing high-signal monitoring that reveals attacker movement, correlating identity abuse across logins, tokens, and privilege changes, and tuning alerts so responders focus on what actually matters. The course includes actionable playbooks for investigating cloud alerts, preventing data leakage with blocking controls and step-up authentication for risky actions, and preparing audit-ready evidence that aligns logs, configurations, access reviews, and exceptions. The result is a cloud security approach that is operational, repeatable, and built for teams who need measurable risk reduction—not just best-practice slogans.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6b9d4f3b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
