Powered by RND
PodcastsTechnologyDecoded: The Cybersecurity Podcast

Decoded: The Cybersecurity Podcast

Edward Henriquez
Decoded: The Cybersecurity Podcast
Latest episode

Available Episodes

5 of 199
  • Garrett Gee's Hacker Mindset and Travel Empire
    The collected sources provide an overview of Garrett Gee's book, The Hacker Mindset, and his entrepreneurial background as a travel content creator. Multiple sources highlight the book as a guide for personal and professional achievement, suggesting that the principles of computer hacking can be applied to everyday life to overcome obstacles and find financial freedom, outlining a 5-Step Methodology and six core principles such as "Be on Offense" and "Pivot." Gee’s personal story is explored through his time as a cybersecurity expert for the government and his sale of an iPhone app called Scan to Snapchat for $54 million, which provided the capital for his family's initial global travels, detailed in a podcast interview. This interview also discusses the Bucket List Family's evolution into a hospitality brand and their current project of developing a family-focused animated cartoon to continue sharing their message while protecting their children’s privacy. Finally, the sources confirm the book's status as a must-read nonfiction title and a USA Today Bestseller.
    --------  
    13:44
  • AI Transforms SOC: Reactive to Proactive Defense
    The source material consists of excerpts from an episode of "Decode the Cybersecurity Podcast," hosted by Edward Henriquez, which focuses on the transition of Security Operations Centers (SOCs) from a reactive operational model to a proactive defense posture. The host utilizes a whitepaper and related content from the company Dropzone as a framework to examine how AI SOC analysts are the key technology enabling this fundamental shift. The discussion explores the limitations of traditional, reactive SOCs, where analysts spend roughly seventy-five percent of their time on tasks like alert triage, and contrasts this with the characteristics of a proactive SOC focused on threat hunting, detection engineering, and surface reduction. The podcast segments explain the specific capabilities, architectural features, trade-offs, and practical rollout phases for adopting AI-driven security solutions that aim to dramatically reduce alert investigation time and amplify human analysts.
    --------  
    14:50
  • Zero-Click Spyware: Pegasus, WhatsApp, and iOS Attacks
    The provided sources discuss the serious threat of zero-click spyware attacks like those utilizing NSO Group's Pegasus and Intellexa's Predator malware. These attacks are particularly dangerous because they compromise devices, such as iPhones and Android phones, without requiring any user interaction, such as clicking a link or answering a call. The texts describe major incidents, including the 2019 WhatsApp breach and various iMessage vulnerabilities that allowed for remote code execution and data extraction, often targeting journalists and activists. In response to these sophisticated threats, Apple developed its Lockdown Mode to restrict device functionality and shrink the attack surface for a small number of high-risk users. The sources emphasize that while these exploits are highly valuable on the black market and difficult to detect, maintaining up-to-date software remains a critical defense against both known and zero-day vulnerabilities.
    --------  
    15:14
  • Security Architecture Episode 7: Final - Review
    The source material provides an overview of the Complete Security Architecture Framework, which is divided into six progressive phases often structured like a pyramid. These phases—Governance & Strategy, Identity & Access Management, Infrastructure Security, Application & Data Security, Incident Response & Recovery, and Monitoring & Continuous Improvement—build upon each other to create a defense-in-depth approach. The text explains the function of each phase and offers numerous examples of real-world software vendors and tools that organizations use to implement specific security controls, such as Palo Alto for firewalls or Okta for identity management. The source concludes by presenting a full-architecture example and a memory framework (GIIAIM) to help listeners recall the order of the six essential security components.
    --------  
    16:11
  • Security Architecture Episode 3: Advanced Security Architecture: Design and Resilience
    Phase 3: Advanced Design, intended to equip listeners with tools to defend, adapt, and recover from cyber threats. The discussion outlines three core areas: Data Security Architecture, which emphasizes using encryption, tokenization and masking, and Data Loss Prevention (DLP); Resilience and Threat Modeling, which details the use of the STRIDE framework and MITRE ATT&CK, implemented alongside Security Information and Event Management (SIEM) for monitoring and established Incident Response plans; and Enterprise Architecture Integration, which stresses the importance of adopting a Secure by Design approach and integrating security with broader Policies, Governance, and Risk Management. The podcast utilizes memory hooks throughout, such as the three-step mantra: Encrypt, Replace, Prevent, to summarize these advanced security concepts.
    --------  
    14:56

More Technology podcasts

About Decoded: The Cybersecurity Podcast

This cybersecurity study guide presents a comprehensive overview of key cybersecurity concepts through short answer questions and essay prompts. Topics covered include data security measures like encryption and message digests, authentication methods and their vulnerabilities, disaster recovery and business continuity planning, risk management strategies, and malware types.
Podcast website

Listen to Decoded: The Cybersecurity Podcast, Dwarkesh Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Decoded: The Cybersecurity Podcast: Podcasts in Family

Social
v7.23.9 | © 2007-2025 radio.de GmbH
Generated: 10/21/2025 - 9:02:55 AM