Bare Metal Cyber

Bare Metal Cyber

Welcome to Bare Metal Cyber, the podcast that bridges cybersecurity and education in a way that’s engaging, informative, and practical. Hosted by Dr. Jason Edwards, a seasoned cybersecurity expert and educator, this weekly podcast brings to life the insights, tips, and stories from his widely-read LinkedIn articles. Each episode dives into pressing cybersecurity topics, real-world challenges, and actionable advice to empower professionals, educators, and learners alike. Whether navigating the complexities of cyber defense or looking for ways to integrate cybersecurity into education, Bare Metal Cyber delivers valuable perspectives to help you stay ahead in an ever-evolving digital world. Subscribe and join the thousands already benefiting from Jason’s expertise!

Episodes

August 26, 2025 28 mins

In this episode, we explore the strange yet critical world of adversarial machine learning—where tiny, unseen manipulations can fool AI systems into making dangerous and bizarre mistakes. From autonomous cars misinterpreting road signs to AI-driven medical devices misdiagnosing patients, we uncover real-world scenarios illustrating how subtle digital tweaks can create major real-life consequences.

We’ll also discuss how cyb...

Mark as Played

Will AI trigger the first white-collar recession—or just change what those jobs look like? This episode follows the quiet early tells—executive hiring freezes, six-figure postings sliding, silent software seat cuts, and a surge of offboarding tickets—to explain how task-level automation can thin openings, flatten wages, and hollow out the rungs juniors used to climb. We separate headline panic from real indicators and show...

Mark as Played

In this episode of BareMetalCyber, we delve into the shadowy world of state-sponsored cyber sabotage, examining how nations increasingly leverage digital attacks for espionage, economic disruption, and geopolitical advantage. We explore sophisticated hacking tactics—from zero-day exploits and psychological warfare to supply chain infiltration—and reveal why attribution remains so notoriously difficult in today's digital co...

Mark as Played

In this episode of BareMetalCyber, we narrate the article Ctrl+Alt+Comply: The Wild World of Cyber Regulations, taking you through the tangled web of international cybersecurity compliance. From the rigid power moves of the EU’s GDPR to the complex demands of China’s PIPL and the legislative chaos of U.S. state laws, we explore how the world governs digital risk—and how organizations are expected to keep up.

 

We break down ...

Mark as Played

In today's episode, we dive into the dark side of our increasingly connected world, exploring how ordinary IoT devices—like coffee makers, fish tanks, and even printers—have turned sinister, unleashing unexpected chaos on unsuspecting networks. We'll examine unforgettable stories of IoT gone rogue, like the Mirai botnet's internet-crashing exploits, the casino hacked through an innocent-looking fish tank, and how everyday ...

Mark as Played

In today's episode, we explore how ChatOps—the integration of collaboration and operations through platforms like Slack and Teams—has reshaped modern workplaces, delivering unprecedented speed and agility. But these powerful productivity tools come with hidden dangers, attracting cyber intruders eager to exploit casual conversations, misplaced trust, and overlooked configurations to breach security unnoticed.

 

We’ll uncover...

Mark as Played

In today's episode, we're tackling one of cybersecurity's biggest challenges: the human factor. Employees, often considered the weakest link in an organization's cyber defenses, don't have to remain vulnerabilities. Instead, they can become powerful cybersecurity allies—transforming from click-happy risks into vigilant cyber warriors. We'll explore how engaging, humor-driven training methods, realistic simulations, and pro...

Mark as Played

In this episode of BareMetalCyber, we dive deep into the emerging frontlines of digital warfare, where traditional weapons have given way to malicious code and covert cyber operations. As nations increasingly turn to cyber espionage, sabotage, and sophisticated AI-driven attacks, the lines between crime, warfare, and espionage blur—placing everyday citizens and critical infrastructure directly in the crossfire.

Join us as w...

Mark as Played

In today's episode, we explore one of the most challenging cybersecurity issues organizations face—the insider threat. Unlike external cyberattacks, these threats emerge from trusted employees, each driven by distinct motivations ranging from personal grievances and financial incentives to outright sabotage. We'll delve deeply into the psychology behind insider threats, recognize digital footprints of betrayal, and share s...

Mark as Played

In today's episode, we dive deep into the sinister and rapidly evolving world of deepfake cybercrime. Once relegated to harmless internet pranks, deepfake technology now poses significant threats—from sophisticated financial frauds to espionage operations targeting major corporations. We'll explore how deepfakes deceive both humans and technology, and discuss key strategies your organization must employ to defend itself ef...

Mark as Played

In today's episode of the Bare Metal Cyber podcast, we dive deep into an often-overlooked crisis in cybersecurity: analyst burnout in the Security Operations Center. We'll examine why SOC analysts are increasingly overwhelmed by endless alerts, high-stakes decision-making, and relentless workloads—and why relying solely on automation as a cure can sometimes lead to unintended consequences.

 

Then, we'll explore practical str...

Mark as Played

In today’s episode, we dive deep into the hidden realm of Shadow IT—those unsanctioned technologies quietly spreading through nearly every modern organization. While they often begin with harmless intentions, these hidden apps and devices can quickly escalate into serious cybersecurity risks, complicate compliance, and introduce vulnerabilities that organizations struggle to see coming.

 

We’ll discuss why employees turn to ...

Mark as Played

Third-party cybersecurity breaches are rapidly becoming one of the most serious threats facing organizations today. Attackers exploit vendor vulnerabilities, bypassing traditional defenses and compromising critical systems, often undetected. In this episode, we explore practical approaches for uncovering hidden vendor risks, utilizing AI-driven insights and advanced threat detection to proactively manage and mitigate suppl...

Mark as Played

In this episode of the Bare Metal Cyber podcast, we explore the cybersecurity challenges facing Extended Reality—everything from hijacked avatars to biometric surveillance, and deepfake impersonations to XR-based social engineering. As these immersive technologies become part of everyday life, we unpack the very real threats hiding behind virtual smiles and spatial data.

 

We’ll walk you through the evolving XR ecosystem, sh...

Mark as Played

In this episode of BareMetalCyber, we explore the dark side of artificial intelligence and reveal how solo hackers are turning publicly available AI tools into dangerous digital weapons. From bypassing safety layers with clever prompts to launching devastatingly effective phishing and deepfake campaigns, we dive into how these attackers manipulate technology once considered purely beneficial.

 

We also discuss the challenges...

Mark as Played

In this episode, we take a deep dive into the future of identity management and why passwordless authentication is gaining traction. Passwords have long been a security liability, fueling phishing attacks, credential breaches, and user frustration. By replacing them with biometrics, security keys, and adaptive authentication, organizations can enhance security while improving user experience. But going passwordless isn’t j...

Mark as Played

In this episode, we dive deep into the growing cyber threats targeting Industrial Control Systems (ICS) and SCADA environments—critical infrastructure that keeps power grids running, water flowing, and manufacturing plants operational. These systems, originally designed for reliability rather than security, are now prime targets for ransomware groups, nation-state actors, and supply chain attacks. From legacy vulnerabiliti...

Mark as Played

In this episode, I take you through the world of Security Orchestration, Automation, and Response—Security Orchestration, Automation, and Response—breaking down how it transforms security operations from reactive chaos to streamlined efficiency. We’ll explore how Security Orchestration, Automation, and Response integrates disparate security tools, automates repetitive tasks, and orchestrates fast, effective incident respon...

Mark as Played

In this episode, I take a deep dive into the future of identity management and why passwordless authentication is gaining traction. Passwords have long been a security liability, fueling phishing attacks, credential breaches, and user frustration. By replacing them with biometrics, security keys, and adaptive authentication, organizations can enhance security while improving user experience. But going passwordless isn’t ju...

Mark as Played

In this podcast episode, I explore the persistent cybersecurity issue involving U.S. government officials using personal communication methods—like private emails and encrypted messaging apps—for official business. Drawing from notable examples across multiple administrations, from Bush-era email scandals and Obama's private server controversy to recent messaging app incidents under Trump, I highlight the systemic nature o...

Mark as Played

Popular Podcasts

    If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

    Crime Junkie

    Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're a seasoned true crime enthusiast or new to the genre, you'll find yourself on the edge of your seat awaiting a new episode every Monday. If you can never get enough true crime... Congratulations, you’ve found your people. Follow to join a community of Crime Junkies! Crime Junkie is presented by audiochuck Media Company.

    NFL Daily with Gregg Rosenthal

    Gregg Rosenthal and a rotating crew of elite NFL Media co-hosts, including Patrick Claybon, Colleen Wolfe, Steve Wyche, Nick Shook and Jourdan Rodrigue of The Athletic get you caught up daily on all the NFL news and analysis you need to be smarter and funnier than your friends.

    The Bobby Bones Show

    Listen to 'The Bobby Bones Show' by downloading the daily full replay.

    New Heights with Jason & Travis Kelce

    Football’s funniest family duo — Jason Kelce of the Philadelphia Eagles and Travis Kelce of the Kansas City Chiefs — team up to provide next-level access to life in the league as it unfolds. The two brothers and Super Bowl champions drop weekly insights about the weekly slate of games and share their INSIDE perspectives on trending NFL news and sports headlines. They also endlessly rag on each other as brothers do, chat the latest in pop culture and welcome some very popular and well-known friends to chat with them. Check out new episodes every Wednesday. Follow New Heights on the Wondery App, YouTube or wherever you get your podcasts. You can listen to new episodes early and ad-free, and get exclusive content on Wondery+. Join Wondery+ in the Wondery App, Apple Podcasts or Spotify. And join our new membership for a unique fan experience by going to the New Heights YouTube channel now!

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.