PodcastsTecnologíaDecoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Edward Henriquez
Decoded: The Cybersecurity Podcast
Último episodio

Episodios disponibles

5 de 205
  • Browser Zero Trust: Hardening Security Controls
    Themis episode provides an opinion article from CSO Online, authored by Sunil Gentyala, which advocates for a comprehensive, browser-centric Zero Trust Architecture (ZTA) to combat modern cybersecurity threats. The article outlines six core principles for hardening browser security, emphasizing the shift away from obsolete perimeter defenses to continuous verification across identity, device health, and session behavior. Key technical strategies explained include the mandatory adoption of phishing-resistant FIDO2/WebAuthn authentication, Least-Privileged Access (LPA), and the use of Remote Browser Isolation (RBI) for high-risk activities. Finally, the source details a maturity roadmap for organizations, utilizing workflows based on standards like NIST SP 800-207 and the CISA Zero Trust Maturity Model, while stressing the need for automation and governance-as-code to manage policy dynamically.
    --------  
    41:26
  • Weaponizing Language: Red Teaming the Claude Code Agent
    This episode describes how to replicate a cyber espionage campaign that compromised Anthropic's Claude Code agent using advanced prompt engineering rather than traditional software exploits. Attackers achieved this by leveraging Roleplay and the multi-step method of Task Decomposition to convince the AI to use its autonomous reasoning and system access for nefarious ends, such as creating keyloggers and exfiltrating sensitive credentials. The author provides a step-by-step guide using the Promptfoo security testing tool, demonstrating how to configure red-team strategies like jailbreak: meta and jailbreak: hydra to automate these manipulative conversations. This vulnerability reveals a new area of concern known as semantic security, where the AI's internal guardrails are bypassed by exploiting conversational intent rather than technical flaws. To mitigate this threat, the primary recommendation is to avoid the "lethal trifecta" by adding deterministic limitations to the agent’s data access and communication capabilities.
    --------  
    13:15
  • SABSA: Business-Driven Enterprise Security Architecture and Risk Management
    The provided sources offer a comprehensive look at the Sherwood Applied Business Security Architecture (SABSA) framework, emphasizing its role as a business-driven methodology for developing enterprise security architectures. Several texts highlight how SABSA shifts the focus from purely technical controls to aligning security with high-level business objectives, managing both threats and opportunities, and ensuring information assurance across the organization. Specifically, the texts explain SABSA's layered model for security architecture, which provides views for different organizational stakeholders, and detail how it integrates with other frameworks like TOGAF and concepts like Enterprise Risk Management (ERM) and Information Security Management (ISM). Furthermore, one source critically assesses SABSA's traditional weakness in systematically incorporating socio-technical factors in risk analysis, proposing enhancements to address the complex interplay of culture, technology, and organizational structure in cyber security risk.
    --------  
    12:41
  • TOGAF ADM and Enterprise Architecture Concepts
    These sources collectively address the topic of Enterprise Architecture (EA), primarily through the lens of The Open Group Architecture Framework (TOGAF). The pocket guide provides a comprehensive overview of TOGAF Version 9.1, detailing its structure, the phases of the Architecture Development Method (ADM), and key concepts such as Architecture Views and Architecture Viewpoints. A discussion thread from Reddit attempts to clarify the distinction between the Architecture Viewpoint (the perspective) and the Architecture View (the resulting representation) for stakeholders, often relying on practical analogies. Finally, a case study demonstrates the practical application of the TOGAF ADM to improve the business processes of a car spare parts distributor, PT Dirgamitra Pacific, by designing a new integrated website system to replace inefficient manual and disparate processes.
    --------  
    11:31
  • Digital Trust and Risk Management: The Invisible Armor
    These sources collectively provide a strategic overview of how modern enterprises manage technology risk and assurance, using professional roles and mnemonic devices to clarify complex concepts. The podcast script introduces technology assurance and risk management as essential "invisible armor," defining them through analogies like a spaceship crew where one entity validates systems and the other watches for threats. Building upon this foundation, the role description for the Senior Principal Architect in Technology Risk Assurance details a pivotal technical position responsible for designing systems that are inherently secure, compliant, and resilient, acting as the "technical conscience" of the organization. Finally, the description of the Business Information Security Officer (BISO) outlines a bridging function that translates technical cybersecurity risks into business impact, ensuring security strategies align with organizational growth and promoting security ownership within business units.
    --------  
    11:55

Más podcasts de Tecnología

Acerca de Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Sitio web del podcast

Escucha Decoded: The Cybersecurity Podcast, Topes de Gama Unplugged y muchos más podcasts de todo el mundo con la aplicación de radio.es

Descarga la app gratuita: radio.es

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Decoded: The Cybersecurity Podcast: Podcasts del grupo

Aplicaciones
Redes sociales
v8.1.1 | © 2007-2025 radio.de GmbH
Generated: 12/11/2025 - 10:40:56 AM