InfoSec Bites cover art

InfoSec Bites

InfoSec Bites

By: HelloInfoSec
Listen for free

About this listen

Welcome to Hello InfoSec, your ultimate hub for all things cybersecurity! Dive into our thrilling podcast series, InfoSec Bites, where we unleash deep dives into Information Security, jaw-dropping Major Security Incidents, cutting-edge Cloud Information Security, crucial Privacy topics, revolutionary Artificial Intelligence, mind-bending Quantum Computing, and so much more! Get ready to geek out with expert insights and stay ahead of the curve—hit that like button, subscribe now, and turn on notifications for fresh episodes that will blow your mind! https://www.youtube.com/@HelloInfoSecHelloInfoSec
Episodes
  • Federal Information Processing Standards(FIPS): Security, Adoption, and Key Standards
    Dec 5 2025

    The discussion in this podcast offers a comprehensive overview of Federal Information Processing Standards (FIPS), which are guidelines developed by the National Institute of Standards and Technology (NIST) to ensure security, interoperability, and data protection across U.S. federal computer systems. FIPS standards are mandatory for federal agencies under laws like FISMA and serve as a crucial framework for risk mitigation against cyber threats, though their adoption is often voluntary in the private sector. It specifically examine three core standards: FIPS 140, which mandates security requirements for cryptographic modules; FIPS 197, which establishes the Advanced Encryption Standard (AES) for data encryption; and FIPS 199, which provides a framework for categorising information systems based on potential impact levels (low, moderate, high). These standards collectively prevent security incidents by enforcing validated, tested security controls, and they are increasingly influencing global security practices.

    Show More Show Less
    40 mins
  • FIDO2: Deep Dive into The New Passwordless Authentication Standard
    Nov 28 2025

    The discussion in this podcast provides an extensive, expert-level overview of FIDO2, which is presented as the new gold standard for passwordless authentication. It explains that FIDO2 fundamentally replaces the vulnerable "shared secret" password model with a cryptographic public-key system, where a private key is securely stored on the user's device, making it inherently resistant to phishing and credential stuffing attacks. The discussion meticulously breaks down the technical architecture, detailing the two core components—WebAuthn and CTAP—and the cryptographic challenge-response process for user registration and authentication. Ultimately, the analysis concludes that FIDO2, with its decentralized security model and user-friendly passkey concept, offers a transformative solution for enterprises seeking to reduce costs and strengthen their security posture against pervasive cyber threats.

    Show More Show Less
    29 mins
  • Virtualisation and VDI: Architecture, Security, Exploitation, and Resilience
    Nov 21 2025

    The discussion in this podcast provides an extensive analysis of the security challenges, exploitation techniques, and resilience strategies necessary for modern Virtual Machine (VM) and Virtual Desktop Infrastructure (VDI) environments. It details the fundamental security trade-offs between Type 1 (bare metal) and Type 2 (hosted) hypervisors, noting that enterprise solutions mandate the superior isolation of Type 1. It systematically examines critical attack vectors, including Virtual Machine Escape (VME), which targets complex paravirtualised devices, and microarchitectural side-channel attacks like Spectre and Meltdown. Furthermore, the discussion stresses that the most frequent and severe compromises target the centralised VDI control plane components, such as connection brokers and perimeter gateways, rather than low-level hypervisor flaws. Finally, the analysis concludes by presenting a comprehensive Zero Trust Architecture (ZTA) framework, recommending mandatory controls like network microsegmentation and rigorous session policy enforcement to contain breaches and secure the infrastructure.

    Show More Show Less
    38 mins
No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.