Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
TV & Film
Sports
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/57/f9/cd/57f9cda2-e315-17fd-aa34-b4f47d2ecac4/mza_9956755762007951065.jpg/600x600bb.jpg
Decoded: The Cybersecurity Podcast
Edward Henriquez
203 episodes
5 days ago
This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Show more...
Technology
RSS
All content for Decoded: The Cybersecurity Podcast is the property of Edward Henriquez and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Show more...
Technology
Episodes (20/203)
Decoded: The Cybersecurity Podcast
SABSA: Business-Driven Enterprise Security Architecture and Risk Management

The provided sources offer a comprehensive look at the Sherwood Applied Business Security Architecture (SABSA) framework, emphasizing its role as a business-driven methodology for developing enterprise security architectures. Several texts highlight how SABSA shifts the focus from purely technical controls to aligning security with high-level business objectives, managing both threats and opportunities, and ensuring information assurance across the organization. Specifically, the texts explain SABSA's layered model for security architecture, which provides views for different organizational stakeholders, and detail how it integrates with other frameworks like TOGAF and concepts like Enterprise Risk Management (ERM) and Information Security Management (ISM). Furthermore, one source critically assesses SABSA's traditional weakness in systematically incorporating socio-technical factors in risk analysis, proposing enhancements to address the complex interplay of culture, technology, and organizational structure in cyber security risk.


Show more...
5 days ago
12 minutes 41 seconds

Decoded: The Cybersecurity Podcast
TOGAF ADM and Enterprise Architecture Concepts

These sources collectively address the topic of Enterprise Architecture (EA), primarily through the lens of The Open Group Architecture Framework (TOGAF). The pocket guide provides a comprehensive overview of TOGAF Version 9.1, detailing its structure, the phases of the Architecture Development Method (ADM), and key concepts such as Architecture Views and Architecture Viewpoints. A discussion thread from Reddit attempts to clarify the distinction between the Architecture Viewpoint (the perspective) and the Architecture View (the resulting representation) for stakeholders, often relying on practical analogies. Finally, a case study demonstrates the practical application of the TOGAF ADM to improve the business processes of a car spare parts distributor, PT Dirgamitra Pacific, by designing a new integrated website system to replace inefficient manual and disparate processes.

Show more...
5 days ago
11 minutes 31 seconds

Decoded: The Cybersecurity Podcast
Digital Trust and Risk Management: The Invisible Armor

These sources collectively provide a strategic overview of how modern enterprises manage technology risk and assurance, using professional roles and mnemonic devices to clarify complex concepts. The podcast script introduces technology assurance and risk management as essential "invisible armor," defining them through analogies like a spaceship crew where one entity validates systems and the other watches for threats. Building upon this foundation, the role description for the Senior Principal Architect in Technology Risk Assurance details a pivotal technical position responsible for designing systems that are inherently secure, compliant, and resilient, acting as the "technical conscience" of the organization. Finally, the description of the Business Information Security Officer (BISO) outlines a bridging function that translates technical cybersecurity risks into business impact, ensuring security strategies align with organizational growth and promoting security ownership within business units.


Show more...
1 week ago
11 minutes 55 seconds

Decoded: The Cybersecurity Podcast
Technology and Enterprise Risk Governance

These sources collectively provide guidance and analysis on governance, risk management, and architectural alignment within large organizations, particularly concerning information technology (IT) and information and communications technology (ICT). The Institute of Internal Auditors (IIA) offers a Supplemental Guidance and Global Technology Audit Guide (GTAG) that details the process for auditing IT governance, emphasizing the alignment of organizational objectives with IT strategy and risk appetite. The National Institute of Standards and Technology (NIST) Special Publication focuses on integrating ICT risk management (ICTRM) into Enterprise Risk Management (ERM), defining the roles and processes for managing technology risks across systemic, organizational, and enterprise levels using risk registers and profiles. Finally, an academic paper explores the challenges and inhibitors to effective stakeholder engagement in Enterprise Architecture (EA) practice, distinguishing between strategic and initiative-based engagement, while the Health Sector Coordinating Council (HSCC) emphasizes the importance of a holistic committee approach for managing legacy technology security in healthcare delivery organizations (HDOs).

Show more...
4 weeks ago
36 minutes 39 seconds

Decoded: The Cybersecurity Podcast
Garrett Gee's Hacker Mindset and Travel Empire

The collected sources provide an overview of Garrett Gee's book, The Hacker Mindset, and his entrepreneurial background as a travel content creator. Multiple sources highlight the book as a guide for personal and professional achievement, suggesting that the principles of computer hacking can be applied to everyday life to overcome obstacles and find financial freedom, outlining a 5-Step Methodology and six core principles such as "Be on Offense" and "Pivot." Gee’s personal story is explored through his time as a cybersecurity expert for the government and his sale of an iPhone app called Scan to Snapchat for $54 million, which provided the capital for his family's initial global travels, detailed in a podcast interview. This interview also discusses the Bucket List Family's evolution into a hospitality brand and their current project of developing a family-focused animated cartoon to continue sharing their message while protecting their children’s privacy. Finally, the sources confirm the book's status as a must-read nonfiction title and a USA Today Bestseller.


Show more...
1 month ago
13 minutes 44 seconds

Decoded: The Cybersecurity Podcast
AI Transforms SOC: Reactive to Proactive Defense

The source material consists of excerpts from an episode of "Decode the Cybersecurity Podcast," hosted by Edward Henriquez, which focuses on the transition of Security Operations Centers (SOCs) from a reactive operational model to a proactive defense posture. The host utilizes a whitepaper and related content from the company Dropzone as a framework to examine how AI SOC analysts are the key technology enabling this fundamental shift. The discussion explores the limitations of traditional, reactive SOCs, where analysts spend roughly seventy-five percent of their time on tasks like alert triage, and contrasts this with the characteristics of a proactive SOC focused on threat hunting, detection engineering, and surface reduction. The podcast segments explain the specific capabilities, architectural features, trade-offs, and practical rollout phases for adopting AI-driven security solutions that aim to dramatically reduce alert investigation time and amplify human analysts.

Show more...
1 month ago
14 minutes 50 seconds

Decoded: The Cybersecurity Podcast
Zero-Click Spyware: Pegasus, WhatsApp, and iOS Attacks

The provided sources discuss the serious threat of zero-click spyware attacks like those utilizing NSO Group's Pegasus and Intellexa's Predator malware. These attacks are particularly dangerous because they compromise devices, such as iPhones and Android phones, without requiring any user interaction, such as clicking a link or answering a call. The texts describe major incidents, including the 2019 WhatsApp breach and various iMessage vulnerabilities that allowed for remote code execution and data extraction, often targeting journalists and activists. In response to these sophisticated threats, Apple developed its Lockdown Mode to restrict device functionality and shrink the attack surface for a small number of high-risk users. The sources emphasize that while these exploits are highly valuable on the black market and difficult to detect, maintaining up-to-date software remains a critical defense against both known and zero-day vulnerabilities.

Show more...
1 month ago
15 minutes 14 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 7: Final - Review

The source material provides an overview of the Complete Security Architecture Framework, which is divided into six progressive phases often structured like a pyramid. These phases—Governance & Strategy, Identity & Access Management, Infrastructure Security, Application & Data Security, Incident Response & Recovery, and Monitoring & Continuous Improvement—build upon each other to create a defense-in-depth approach. The text explains the function of each phase and offers numerous examples of real-world software vendors and tools that organizations use to implement specific security controls, such as Palo Alto for firewalls or Okta for identity management. The source concludes by presenting a full-architecture example and a memory framework (GIIAIM) to help listeners recall the order of the six essential security components.


Show more...
1 month ago
16 minutes 11 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 2: Core Security Architecture: IAM, Applications, Cloud

Security Architecture: “Decoded” an overview of the core components of security architecture, presented as a podcast script discussing practical systems used in modern organizations. The text focuses on Identity and Access Management (IAM), explaining its three pillars—Authentication, Authorization, and Accounting—along with common models like RBAC and ABAC. Next, it addresses Application and API Security, emphasizing the importance of "Shift Left" development and adherence to the OWASP Top 10 list of vulnerabilities. Finally, the source covers Cloud Security Architecture, detailing the Shared Responsibility Model between providers and users, and mentioning essential tools like CSPM and CWPP for monitoring cloud environments.


Show more...
1 month ago
16 minutes 47 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 6: Security Monitoring and Continuous Cybersecurity Improvement

"Security Monitoring and Continuous Cybersecurity Improvement," hosted by Edward Henriquez, which covers the final phase of establishing security architecture. This phase focuses on the essential nature of security monitoring to maintain visibility through tools like SIEM systems and intrusion detection software. The script emphasizes that security is an ongoing cycle, detailing continuous improvement practices such as regular control reviews and integrating threat intelligence to adapt to evolving risks. Furthermore, the source highlights the importance of key metrics and feedback loops by listing measurable indicators, including Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR), which track effectiveness and guide subsequent planning and updates. Ultimately, the source concludes that this process is summarized by the repeating cycle: Monitor, Measure, Improve, Repeat.

Show more...
1 month ago
11 minutes 49 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 5: Cybersecurity Incident Response: The PICERL Framework

"Cybersecurity Incident Response and Recovery: PICERL," hosted by Edward Henriquez, which focuses on Phase 5 of a security architecture learning journey. It explains the crucial steps for addressing security incidents using the PICERL acronym, which stands for Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. The discussion emphasizes that incident response is a team sport, requiring clear responsibilities for the Incident Response Team, Management, Legal, and Communications personnel. Furthermore, the material outlines that recovery is centered on resilience rather than simple restoration, focusing on gradual system return, integrity validation, and continuous improvement through post-incident reviews. Ultimately, the podcast aims to provide listeners with clear, actionable steps for managing and learning from cybersecurity events.

Show more...
1 month ago
12 minutes 34 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 4: Cybersecurity Security Operations: MDRR and Essential Tools

"Cybersecurity Security Operations: MDRR and Essential Tools," focuses entirely on Phase 4 of Security Architecture: Security Operations. The podcast host, Edward Henriquez, organizes the discussion around the Core Functions of Security Operations, which he summarizes using the acronym MDRR: Monitor, Detect, Respond, and Recover. Furthermore, the source highlights Key Tools and Technologies crucial for security operations, including SIEM, EDR, SOAR, and Threat Intelligence Platforms, explaining their respective roles in defense. Finally, the text concludes by outlining Best Practices and Continuous Improvement strategies, emphasizing the importance of establishing a dedicated Security Operations Center (SOC) and continually measuring metrics like Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).

Show more...
1 month ago
11 minutes 58 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 3: Advanced Security Architecture: Design and Resilience

Phase 3: Advanced Design, intended to equip listeners with tools to defend, adapt, and recover from cyber threats. The discussion outlines three core areas: Data Security Architecture, which emphasizes using encryption, tokenization and masking, and Data Loss Prevention (DLP); Resilience and Threat Modeling, which details the use of the STRIDE framework and MITRE ATT&CK, implemented alongside Security Information and Event Management (SIEM) for monitoring and established Incident Response plans; and Enterprise Architecture Integration, which stresses the importance of adopting a Secure by Design approach and integrating security with broader Policies, Governance, and Risk Management. The podcast utilizes memory hooks throughout, such as the three-step mantra: Encrypt, Replace, Prevent, to summarize these advanced security concepts.


Show more...
1 month ago
14 minutes 56 seconds

Decoded: The Cybersecurity Podcast
Security Architecture Episode 1: Foundations of Security Architecture Principles and Frameworks

Security Architecture: "Decoded: The Cybersecurity Podcast," focuses on the foundations of security architecture. This introductory material defines four essential principles for building secure systems, beginning with the crucial CIA Triad: Confidentiality, Integrity, and Availability. The script also clarifies the fundamental terminology of security, explaining how threats exploit vulnerabilities, which creates risks. Furthermore, the material introduces the strategic concept of Defense in Depth, illustrating it as a system of layered controls, akin to the barriers of a medieval castle or the layers of an onion. Finally, the text enumerates key security models and standards, such as NIST, ISO/IEC 27001, and SABSA, which serve as necessary frameworks for security professionals.

Show more...
1 month ago
12 minutes 8 seconds

Decoded: The Cybersecurity Podcast
Microsoft Entra ID Global Admin Hijacking Flaw

The provided text originates from a cybersecurity news website, offering an overview of various security topics, tutorials, and available downloads. The central news piece describes a critical vulnerability, CVE-2025-55241, found in Microsoft Entra ID (formerly Azure AD), which could have allowed an attacker with an "actor token" to achieve Global Admin privileges in any company's tenant globally. This flaw, which utilized the deprecated Azure AD Graph API, was particularly dangerous because the tokens lacked proper security controls, such as logging and revocation capabilities, and bypassed Conditional Access restrictions. The text confirms that the researcher, Dirk-jan Mollema, reported the issue to Microsoft, which subsequently patched the critical vulnerability with the maximum CVSS score of 10.0. Surrounding this article are lists of latest security news, such as data breaches and new malware tools, technical tutorials on topics like accessing the Dark Web, and virus removal guides and decrypter tool downloads.


Show more...
1 month ago
10 minutes 29 seconds

Decoded: The Cybersecurity Podcast
AI, Social Engineering, and CAPTCHA Security

These sources collectively examine the rapidly evolving landscape of CAPTCHA technology and the escalating threat of AI-driven cyberattacks. The Wikipedia excerpt introduces CAPTCHA as a Turing test to differentiate humans from bots, noting its purpose, characteristics, and increasing circumvention by both machine learning and human labor. Several other articles and reports emphasize how Artificial Intelligence (AI) is being exploited to create more sophisticated threats, such as AI-generated phishing emails that bypass security filters, and fake CAPTCHA pages hosted on development platforms to facilitate phishing campaigns. Consequently, organizations are urged to enhance their defenses, with the Accenture report stressing the need for a "Reinvention-Ready Zone" security posture to combat AI-powered threats and underscoring that current security efforts are outpaced by AI adoption. The Prosopo article highlights the shift away from frustrating traditional CAPTCHA toward invisible, behavior-based, and privacy-centric authentication methods as AI makes old puzzles obsolete.

Show more...
1 month ago
20 minutes

Decoded: The Cybersecurity Podcast
Chrome's Seventeen-Year Journey: Speed, Security, Stability, and Simplicity

The article from AddyOsmani.com, titled "Google Chrome at 17 - A history of our browser," provides a comprehensive overview of Chrome's evolution since its 2008 launch, focusing on its core principles of speed, security, stability, and simplicity. The author, a Chrome team member, discusses the browser's origins with its multi-process architecture and V8 JavaScript engine, and details continuous efforts in performance optimization, including record-breaking Speedometer scores and improvements across devices. The text also highlights Chrome's robust security measures, such as sandboxing, Site Isolation, and AI-powered phishing detection, alongside its commitment to stability through fault isolation and memory management. Finally, it explores Chrome's ubiquitous presence from desktop to mobile and ChromeOS, its role in advancing the web platform through Project Fugu and PWAs, and the recent integration of AI features like Gemini for enhanced productivity and personalization.


Show more...
2 months ago
20 minutes 37 seconds

Decoded: The Cybersecurity Podcast
September 2025 Windows Security Update Overview

These sources primarily discuss Microsoft's September 2025 Patch Tuesday updates, highlighting the 81 vulnerabilities addressed, including two actively exploited zero-day flaws and ten critical issues. Several articles emphasize the importance of prompt patching for various Microsoft products like Windows, Office, and Azure, with one source noting the SMB protocol vulnerability (CVE-2025-55234) as a significant risk. The Reddit thread offers a community-driven perspective on deploying these patches, with system administrators sharing experiences and discussing common installation hang-ups, while another article points out that SAP had even more severe critical flaws than Microsoft this month. Microsoft's official message center provides detailed information on the security updates and ongoing changes like certificate-based authentication hardening, offering administrators crucial guidance and resources.


Show more...
2 months ago
23 minutes 42 seconds

Decoded: The Cybersecurity Podcast
The GhostAction Supply Chain Attack

The provided sources detail the GhostAction supply chain attack, a significant cybersecurity incident affecting GitHub projects. This attack involved malicious workflow files being committed to hundreds of repositories, stealing thousands of secrets such as npm, PyPI, and DockerHub tokens. GitGuardian researchers discovered and reported on the attack, identifying its widespread nature across various programming languages and projects. While the stolen secrets pose a risk for further malicious activity, proactive measures like revoking compromised tokens and commits are recommended for affected developers to mitigate the impact. The incident highlights the importance of robust security practices in open-source ecosystems.

Show more...
2 months ago
19 minutes 49 seconds

Decoded: The Cybersecurity Podcast
Information Security: Attacks, Strategies, Tools

A comprehensive overview of current cybersecurity issues, highlighting both active threats and proactive defense strategies. Several articles detail recent attacks, such as the exploitation of an Apache ActiveMQ flaw, the compromise of Microsoft logins through ADFS redirects, and the DripDropper malware, underscoring the constant evolution of attacker tactics. In response, the sources emphasize strategic shifts like adopting Detection-as-Code for robust security rule management and embracing cryptoagility for digital resilience against expiring certificates and emerging cryptographic vulnerabilities. Furthermore, the collection touches upon new security tools and initiatives, including Microsoft Entra Private Access for on-premises conditional access and the development of red-team tools, while also reporting on significant data breaches and the burgeoning market for zero-day exploits.


Show more...
3 months ago
13 minutes 36 seconds

Decoded: The Cybersecurity Podcast
This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.