All Episodes

Displaying 41 - 60 of 164 in total

Episode 41 — Federation and Identity Trust Relationships

In this episode, we examine how federation enables users from one domain to access resources in another without needing separate authentication credentials. We explain...

Episode 42 — Certificate Management Fundamentals

This episode focuses on the role of digital certificates in securing cloud communications and verifying system identities. We cover the components of a certificate, in...

Episode 43 — Multifactor Authentication — Configurations and Use Cases

In this episode, we explore multifactor authentication (MFA) as a core security control in cloud environments. We define the three common factor types—something you kn...

Episode 44 — Single Sign-On and SAML in Cloud Environments

This episode explains how single sign-on (SSO) reduces friction for users by enabling access to multiple applications with a single authentication event. We detail how...

Episode 45 — Public Key Infrastructure — Concepts and Cloud Use Cases

In this episode, we explore the architecture and functions of Public Key Infrastructure (PKI), which supports secure communications through encryption, authentication,...

Episode 46 — Secret and Key Management — Secure Credential Handling

In this episode, we cover the essential practices for managing sensitive information such as API keys, encryption keys, passwords, and tokens in cloud environments. We...

Episode 47 — Network Segmentation — VLAN, VXLAN, GENEVE, and Micro-Segmentation

This episode explains how network segmentation improves performance, security, and manageability in cloud architectures. We break down traditional VLANs for broadcast ...

Episode 48 — DNS Security — DNSSEC, DoH, DoT

In this episode, we explore how securing the Domain Name System (DNS) protects against spoofing, cache poisoning, and man-in-the-middle attacks. We explain DNSSEC’s ro...

Episode 49 — Time Synchronization and NTP Security

This episode discusses the importance of accurate timekeeping for authentication, logging, and system coordination in cloud environments. We explain how the Network Ti...

Episode 50 — Network Encryption — IPSec, TLS, HTTPS

In this episode, we detail the protocols that protect data in transit across cloud networks. IPSec is covered as a suite for securing IP communications, including its ...

Episode 51 — Secure Tunneling — SSH, GRE, L2TP, PPTP

In this episode, we cover the tunneling protocols that enable secure or encapsulated communications in cloud and hybrid network architectures. Secure Shell (SSH) is ex...

Episode 52 — Cloud Network Services — Stateful/Stateless Firewalls and WAF

This episode explains how network security appliances and services operate in cloud environments. We begin with stateful firewalls, which track active sessions and all...

Episode 53 — IPS, IDS, NAC, and Advanced Network Protection

In this episode, we look at intrusion prevention systems (IPS), intrusion detection systems (IDS), and network access control (NAC) as part of a broader cloud security...

Episode 54 — Packet Brokers and DLP Tools in Cloud Monitoring

This episode explains how packet brokers and data loss prevention (DLP) tools enhance visibility and control in cloud environments. Packet brokers aggregate and filter...

Episode 55 — Log and Event Monitoring for Network Security

In this episode, we cover the role of log and event monitoring in detecting and responding to security incidents. We explain the types of logs generated by firewalls, ...

Episode 56 — Network Flow Analysis and Anomaly Detection

In this episode, we explore how network flow analysis provides valuable insights into traffic patterns, bandwidth utilization, and potential security threats in cloud ...

Episode 57 — Hardening Network Configurations — Ports, Protocols, Firmware

This episode focuses on reducing attack surfaces by hardening network device configurations. We explain the process of closing unused ports, disabling insecure or unne...

Episode 58 — Traffic Control — Ingress, Egress, Proxies, and Filtering

In this episode, we explain the methods used to control and secure inbound (ingress) and outbound (egress) traffic in cloud environments. We detail how firewalls, acce...

Episode 59 — DDoS Protection in the Cloud — Design and Defense

This episode explores how to design cloud environments to withstand Distributed Denial of Service (DDoS) attacks. We discuss layered defense strategies, including upst...

Episode 60 — OS and Application Security Policies — Passwords, Lockouts, Whitelisting

In this episode, we focus on the security policies that protect operating systems and applications in cloud environments. We cover password complexity and expiration r...

Broadcast by