Get exam-ready with the BareMetalCyber PrepCast, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Cloud Operations Podcasts
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Cloud Talk brings you discussions on topics like digital transformation, Kubernetes, IoT, edge computing and multicloud, as told through the perspectives of the people and the companies who are living this transformation on a daily basis. In Cloud Talk, host Jeff DeVerter interviews some of the most influential figures on the frontlines of cloud technology, helping you stay connected. Jeff is CTO at Rackspace and has spent over 20 years immersed in the world of cutting-edge technology.
…
continue reading
A podcast about everything that happens after \`git push\` Justin Garrison & Autumn Nash explore all things DevOps, infra, cloud & running apps in production. Whether you're cloud native, Kubernetes curious, a pro SRE, or just operating a VPS... you'll love coming along for the ride. Some people search for ShipIt or ShipItFM and can't find the show, so now the strings ShipIt and ShipItFM are in our description too.
…
continue reading
All episodes from Late Night Linux, Linux Dev Time, Linux After Dark, 2.5 Admins, Linux Matters, Hybrid Cloud Show, and Ask The Hosts.
…
continue reading
The Cloud and Clear podcast explores the journey of SADA at the tip of the spear in helping organizations transform the way their people work, and the way their industry goes to market in the context of Google Cloud. It features experts from SADA, partners, and our customers discussing and debating what digital transformation means in the real world.
…
continue reading
Late Night Linux is a podcast that takes a look at what’s happening with Linux and the wider tech industry. Every week, Joe, Félim, Graham and Will discuss the latest news and releases, and the broader issues and trends in the world of free and open source software. Expect drinking, swearing, strong opinions, and Félim being trolled about AI and the cloud.
…
continue reading
The Nutanix Community Podcast is a weekly podcast. It is an informal and technical look at topics around Nutanix, Cloud and the online IT community. It will serve as a campfire and coffee shop for the extended Nutanix community.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Cloud Returns covers ALL types of software investing, whether seed, venture capital, growth equity, private equity, debt, and the public markets. Our target audience: SaaS investors AND operators raising capital that listen to SaaStr, Twenty Minute VC (20VC), The Logan Bartlett Show, or Thoma Bravo’s Behind the Deal and still want to learn even more.
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Join 3 experienced Open Source professionals as they discuss the impact Linux has in their daily lives. Upbeat family-friendly banter, conversation and discussion for Linux enthusiasts and casual observers of all ages. A new episode every two weeks covering terminal productivity, desktop experience, development, gaming, hosting, hardware, community, cloud-native and all the Linux Matters that matter.
…
continue reading
The McKinsey Podcast, our new flagship podcast series, takes you inside our global firm, and features conversations with experts on issues that matter most in business and management. McKinsey & Company is a management-consulting firm that helps businesses, governments, and not-for-profit organizations realize their most important goals. Topics covered in this series include strategy, technology, leadership, marketing, operations, organization, and the role of business in society.
…
continue reading
IT Leaders is the podcast for IT Directors, CIOs, and technology decision-makers seeking actionable insights and executive-level leadership strategies. Produced by the IT Leaders Council and powered by Expedient, each episode features expert guest speakers, peer-to-peer discussions, and real-world stories from the front lines of enterprise IT. Recorded live at leadership events in Indianapolis, IN, Columbus, OH, and expanding nationwide, IT Leaders delivers vendor-neutral content focused on ...
…
continue reading
Welcome to the VMAccel Podcast where we discuss with industry experts the latest tech and trends in the vast world of FPGAs, cloud and infrastructure.
…
continue reading
A guide to the unique mindset and approach that drives Silicon Valley style disruption. Build product, raise money, and scale your startup like the best. TSP hosts Chris Saad and Yaniv Bernstein share practical advice based on decades of experience at Google, Uber, and their own startups.
…
continue reading
We are in the throws of the digital revolution. During this time, it can be challenging to sift through all of the hype and find what works, what is still viable two years from now, and what contributes to your organization. Many IT organizations need help with confusing messages and conflicting technologies. We help organizations sort through the chatter and embrace digital transformation. The world of digital transformation is constantly changing, and you need to know what is viable today. ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Industry experts talk open source software, open trends more broadly, and the inventions they make possible.
…
continue reading
This is the official podcast of the Space & Satellite Professionals International. On this channel, we release podcasts in two series: Making Leaders and Better Satellite World. Find out more about SSPI at www.sspi.org
…
continue reading
Des O'Connor (@desoconnor__), Cloud Intelligence Lead at Dell Technologies UK is joined by key technologist and expert voices at the cutting edge of Multi-Cloud Solutions to probe key issues and trends. Throughout the Cloud & Clear Series we will address key topics including agility and resilience, cost models, cloud security, technical innovation and sustainability.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The data revolution is here. Leaders who don’t adapt will be left behind. In this podcast, we interview business leaders who have made their companies more data-driven. They share their stories and the strategies they have used to drive results.
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Views and insights from our experts at CGI in the UK.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
continue reading
What’s Next with Aki Anastasiou is South Africa’s most popular technology show. The who’s who of South Africa’s technology and business world are interviewed on the show.
…
continue reading
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
Grit explores what it takes to create, build, and scale world-class organizations. It features weekly episodes highlighting the leaders who are pushing their companies to make a difference. This series is hosted by Joubin Mirzadegan, go to market operating partner at Kleiner Perkins, a venture capital firm investing in history-making founders.
…
continue reading
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
…
continue reading
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
…
continue reading
Netenrich invites security professionals to learn how they can optimize their security operations, remove silos, and gain increased efficiencies with the tools and systems they have. This podcast series is focused on effective detection, investigation, and response techniques where data and analytics is at the foundation. Hear from leading cybersecurity experts on how they’re transforming security ops. Netenrich boosts security and digital operations effectiveness so that organizations can a ...
…
continue reading
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
…
continue reading
SC Media and Tines are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Regular video updates from The New Economy. Providing in-depth analysis, expert opinion and intelligent features on innovation in technology, energy, and business strategy.
…
continue reading
The ITPro Podcast is a weekly show for technology professionals and business leaders. Each week hosts Rory Bathgate and Jane McCallion are joined by an expert guest to take a deep dive into the most important issues for the IT community. New episodes premiere every Friday. Visit itpro.com/uk/the-it-pro-podcast for more information, or follow ITPro on LinkedIn for regular updates.
…
continue reading
The Edge Native Podcast is the first major podcast on hot topics in the edge cloud native community. Sebastian Scheele, and his friends talk to coders, builders, and experts at the forefront of the edge native revolution. Say goodbye to boring car rides and workout sessions as you hear about the latest trends and hottest technologies that will drive the edge to be at least four times the spend as public cloud. Subscribe to the Edge Native Podcast and join us.
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
The "Shawn Ryan Show" is hosted by Shawn Ryan, former U.S. Navy SEAL, CIA Contractor, and Founder of Vigilance Elite. We tell REAL stories about REAL people from all walks of life. We discuss the ups and downs, wins and losses, successes and struggles, the good and bad in a respectful but candid way with our guest. We're better than entertainment, we're the REAL thing. Please enjoy the show.
…
continue reading
The Manufacturing Matters podcast aims to get to the heart of automation technology and how it plays into the growing manufacturing industry. Join us for insights and interviews discussing trends, innovations, and advanced automation technologies, such as robotics, machine vision, AI, and much more. Follow our social channels here: http://linktr.ee/m_mp
…
continue reading
FP&A Tomorrow is where Paul Barnhurst, aka The FP&A Guy, discusses what FP&A looks like today and help shape what it should look like tomorrow by interviewing the best and brightest people in FP&A globally.
…
continue reading
The world of technology is complex. Each episode of TechSperience will uncover helpful technology, cybersecurity, cloud, and workplace transformation tips to help the everyday IT professional. Tune in for advice from leading IT experts covering retail, manufacturing, healthcare, K-12, higher education, and more.
…
continue reading
When it comes to technology, you may have questions. So do we. Every other week, we demystify the tech industry, one answer at a time. Join us as we bring together a chorus of perspectives from within Red Hat to break down the big, emerging ideas that matter both today and beyond. Compiler is hosted by Angela Andrews and Brent Simoneaux. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading

1
Episode 114 — Domain 4.0 Operations and Support — Overview
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35This episode introduces Domain 4 of the Cloud+ exam, which covers operational tasks, monitoring, and lifecycle management for cloud environments. We outline key areas including logging and alerting, performance monitoring, patch management, and backup/restore operations. The focus is on maintaining service availability, efficiency, and compliance o…
…
continue reading

1
Better Satellite World: Accelerate Change, Episode 2 - Digital Speed: Cloud-Native Operations and the New Space Architecture
44:52
44:52
Play later
Play later
Lists
Like
Liked
44:52In SSPI's Accelerate Change podcast series, sponsored by SES, we explore how creative collaboration is transforming the pace of innovation across the space and satellite industry. SES is championing a new era - one where partnerships, agile technologies, and bold ideas are breaking old cycles and building a more connected future. Through conversati…
…
continue reading
Digital Transformation for the week of August 25, 2025, including news from Advanced Communications, Artificial Intelligence, and Cybersecurity. NASA's new proposal to enhance communication for lunar and Martian missions highlights the crucial role of technology in connecting families. As we embrace cutting-edge advancements like 6G and AI, we're r…
…
continue reading

1
Looking at the Future of Automotive Development
27:50
27:50
Play later
Play later
Lists
Like
Liked
27:50There are many things in our lives that we have created that are important to our very ability to function as a society, and vehicles are among those things. The invention of the car literally changed society almost overnight, and every advance in society since has manifested itself in the automotive world, from the radio to the tape deck to satell…
…
continue reading

1
Seeing the cloud in action with Maksim Malygin
21:24
21:24
Play later
Play later
Lists
Like
Liked
21:24How do we put the theories and discussions from the five Nutanix Cloud Interlock episodes into practice? In the season finale, we invite Maksim Malygin back to the hot seat to focus on simplifying cloud adoption, scaling cloud operations and optimizing cloud efficiency. We also highlight real customer use cases to draw inspiration.Nutanix Enterpris…
…
continue reading
The AI crawler bot arms race has developed more quickly than we hoped, Google pretends to care what the community thinks, full Linux desktop apps are probably coming to Android, Thunderbird shares more details of their paid services and we are interested, and PuTTY has a great new domain name. News It seems like the AI crawlers learned how to solve…
…
continue reading
The AI crawler bot arms race has developed more quickly than we hoped, Google pretends to care what the community thinks, full Linux desktop apps are probably coming to Android, Thunderbird shares more details of their paid services and we are interested, and PuTTY has a great new domain name. News It seems like the AI crawlers learned how to solve…
…
continue reading

1
Startup Tech Stacks: Make Your Product Stand Out & Get Used w/ Joseph Ruscio
1:04:17
1:04:17
Play later
Play later
Lists
Like
Liked
1:04:17What makes a great tech infrastructure startup? And how do the best ones successfully navigate, and stand out from, the overcrowded market? In this episode, Yaniv is joined by Joseph Ruscio, General Partner at Heavybit and former CTO of Vibrato, to unpack the dos and don'ts of tech infrastructure startups, how open source fuels growth, and why AI i…
…
continue reading

1
NB540: PQE In PAN-OS; FBI Warns 7-Year Old Cisco Bug Under Attack
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco IOS and IOS-XE devices (a patch has been available for seven years), and a compromised XZ Utils backdoor is still lurking in some Docker images. Palo Alto Networks has added support... Read more »…
…
continue reading

1
Leading with the Art of Innovation ft. Michael Carducci
48:08
48:08
Play later
Play later
Lists
Like
Liked
48:08By Expedient
…
continue reading

1
The Power of Saying 'I Don't Know:' Unlocking Growth and Innovation ft. Kathy Brown
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45By Expedient
…
continue reading

1
#230 Keith Stansell - Operation Jacque & Surviving FARC Captivity
4:56:19
4:56:19
Play later
Play later
Lists
Like
Liked
4:56:19Keith Stansell is a former U.S. Marine and Northrop Grumman employee who was captured by the Revolutionary Armed Forces of Colombia (FARC) on February 13, 2003, after his surveillance plane crashed in the Colombian jungle during an anti-narcotics mission. Held hostage for 1,967 days alongside contractors Marc Gonsalves and Thomas Howes, Stansell en…
…
continue reading

1
How Dropbox Beat Big Tech in the Cloud Wars
1:32:34
1:32:34
Play later
Play later
Lists
Like
Liked
1:32:34How do you win when your competitors are the biggest companies in the world? This week on Grit, Dropbox co-founder and CEO Drew Houston retraces the path from a bus-stop prototype to competing head-on with Google, Apple, and Microsoft. He explains why grit is “learning to run toward discomfort,” and the moments he realized founders keep going “for …
…
continue reading
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
…
continue reading

1
Episode 164 — Troubleshooting Automation and Orchestration — Mismatches and Failures
14:19
14:19
Play later
Play later
Lists
Like
Liked
14:19This episode addresses problems in automation and orchestration workflows. Mismatches can occur when scripts or templates are out of sync with infrastructure changes, causing failed deployments or inconsistent configurations. Deprecated API calls or incompatible orchestration sequences can halt processes entirely. Failures may also result from miss…
…
continue reading

1
Episode 163 — Network Tools — Using Ping, Tracert, IP, NSLookup, Netstat, and More
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12In this episode, we explain how to use essential network troubleshooting tools effectively. Ping verifies connectivity and measures latency, while Tracert or Traceroute maps the path packets take through the network. IP or ifconfig commands show network interface configurations. NSLookup or dig queries DNS records directly to diagnose name resoluti…
…
continue reading

1
Episode 162 — DNS, VLAN/VXLAN, Proxies, MTU, QoS, and Time Sync Errors
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05This episode looks at multi-layered networking issues that can disrupt cloud services. DNS errors may involve incorrect records, propagation delays, or misapplied DNSSEC settings. VLAN or VXLAN misconfigurations can isolate workloads unexpectedly. Proxy issues may break application access or degrade performance. MTU mismatches can cause dropped pac…
…
continue reading

1
Episode 161 — Troubleshooting Load Balancer Behavior — Protocols, Headers, Front/Back Ends
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54In this episode, we cover diagnosing issues with load balancers in cloud environments. Problems can arise when the load balancer is configured with the wrong protocol, causing mismatches between client and server communication methods. Incorrect handling of headers—such as missing X-Forwarded-For or session cookies—can break client tracking or rout…
…
continue reading

1
Episode 160 — Routing and NAT Problems — Static, Dynamic, VPN, Source/Destination
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55In this episode, we discuss how routing errors and Network Address Translation (NAT) misconfigurations can impact connectivity and data flow. Static routes may be outdated or incorrectly entered, while dynamic routing protocols can fail due to misaligned configurations or missing updates. NAT problems may involve incorrect source or destination map…
…
continue reading

1
Episode 159 — Troubleshooting Network Configuration — ACLs, Subnets, Peering
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21This episode focuses on resolving connectivity problems caused by incorrect network configurations. Access Control List (ACL) errors can block legitimate traffic, subnet misconfigurations may prevent communication between resources, and peering issues can disrupt cross-network data flows. We also highlight diagnostic approaches such as reviewing AC…
…
continue reading

1
Episode 158 — Vendor and Platform Issues — API Limits, Migration Errors, Cost
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we explore problems that stem from vendor-imposed limitations or platform-specific behaviors. API rate limits can cause integration failures, while migration errors may result from incompatible configurations or unsupported features. Cost-related issues can also arise unexpectedly due to pricing model misunderstandings or resource …
…
continue reading

1
Episode 157 — Troubleshooting Licensing and Subscription Conflicts
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54This episode examines issues that arise when licensing or subscription entitlements are not aligned with deployed resources. These conflicts can result in service interruptions, feature limitations, or compliance violations. Common causes include expired licenses, mismatched license types, and improper assignment of subscription tiers. We also cove…
…
continue reading

1
Episode 156 — Troubleshooting Scaling and Capacity — Compute, Storage, Bandwidth
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22In this episode, we focus on diagnosing issues where scaling configurations fail to meet demand or capacity is exceeded. Compute-related problems may arise when auto-scaling rules are misconfigured, instance limits are reached, or workloads are not properly balanced. Storage issues often occur due to hitting provisioned capacity limits, performance…
…
continue reading

1
Episode 155 — Deployment Config Errors — Templates, Tags, Scripts, and Containers
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52In this episode, we examine how misconfigured templates, incorrect tags, faulty automation scripts, or improperly built containers can lead to deployment failures or inconsistencies. These errors may prevent resources from being properly provisioned, disrupt workflows, or introduce security gaps. We also outline troubleshooting steps like reviewing…
…
continue reading

1
Episode 154 — Deployment Performance Issues — Latency and Resource Lag
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35This episode focuses on performance degradation that can occur after deployment. Latency may result from suboptimal network routing, overloaded servers, or insufficient bandwidth. Resource lag can be caused by under-provisioned compute, storage bottlenecks, or poor load balancing. We also discuss tools and techniques to measure performance, identif…
…
continue reading

1
Episode 153 — Troubleshooting Deployment — Connectivity Failures and Outages
13:57
13:57
Play later
Play later
Lists
Like
Liked
13:57In this episode, we explore the causes of connectivity failures and outages during cloud deployments. Problems can occur due to misconfigured routing tables, incorrect IP assignments, firewall restrictions, or DNS resolution errors. These issues often disrupt service availability and delay project timelines. We also cover systematic troubleshooting…
…
continue reading

1
Episode 152 — Investigating Internal and External Attack Symptoms
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18This episode examines how to identify signs of both internal and external threats within cloud environments. Internal attack indicators may include unusual access patterns, privilege escalation, or unauthorized data transfers. External attacks often present as repeated failed login attempts, suspicious IP addresses, or abnormal network traffic volu…
…
continue reading

1
Episode 151 — Troubleshooting Unsupported Protocols and Cipher Use
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10In this episode, we address issues that arise when legacy or insecure protocols and ciphers are still in use within a cloud environment. Unsupported protocols like older SSL versions or weak ciphers can cause compatibility failures with modern systems and expose data to security risks. These problems often appear during integration of legacy system…
…
continue reading

1
Episode 150 — Troubleshooting Security Appliances — WAF, IPS, IDS, NAC
12:53
12:53
Play later
Play later
Lists
Like
Liked
12:53In this episode, we examine problems related to security appliances such as Web Application Firewalls (WAFs), Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), and Network Access Control (NAC) solutions. Misconfigurations, firmware issues, or integration problems can limit their effectiveness or disrupt normal operations. We al…
…
continue reading

1
Episode 149 — Troubleshooting Exposed Endpoints and Insecure Interfaces
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55This episode focuses on identifying and resolving issues where endpoints or interfaces are unintentionally exposed to the public internet. Common causes include overly permissive firewall rules, default configurations, or lack of authentication. These exposures can allow attackers to probe for vulnerabilities or directly exploit services. We also c…
…
continue reading

1
Episode 148 — Troubleshooting Data Security — Encryption, Classification, and Exposure
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26In this episode, we explore how encryption failures, incorrect data classification, and accidental exposure can create serious security incidents. Encryption problems may involve weak ciphers, improper key management, or unencrypted channels. Misclassification of sensitive data can result in inadequate protection, while exposure often stems from mi…
…
continue reading

1
Episode 147 — Troubleshooting Policies — Misconfigurations and Misapplications
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27This episode addresses problems that arise when security or operational policies are misconfigured or incorrectly applied. Examples include overly restrictive firewall rules, improper access control settings, or conflicting automation policies. These errors can disrupt workflows, block legitimate traffic, or leave resources vulnerable to attack. We…
…
continue reading

1
Episode 146 — Troubleshooting Certificates — Expired, Revoked, or Misconfigured
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59In this episode, we examine common certificate-related issues and how they impact cloud services. Expired certificates can cause service outages, prevent secure connections, and disrupt authentication flows. Revoked certificates, often invalidated due to compromise, require immediate replacement to maintain trust. Misconfigured certificates—such as…
…
continue reading

1
Episode 145 — Troubleshooting Security Groups — Directory and Network
11:48
11:48
Play later
Play later
Lists
Like
Liked
11:48In this episode, we explain how security group misconfigurations can cause connectivity or access problems. Directory security groups manage access to identity resources, while network security groups control traffic to and from specific subnets or instances. Misalignment between these layers can create inconsistent access behavior. We also cover t…
…
continue reading

1
Episode 144 — Troubleshooting Security — Authentication and Authorization Failures
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27This episode focuses on diagnosing and resolving issues with authentication and authorization systems. Authentication failures can stem from incorrect credentials, expired certificates, or mismatched authentication methods. Authorization failures occur when valid users are denied access due to misconfigured policies, roles, or conditional access se…
…
continue reading

1
Episode 143 — Troubleshooting Security — Missing or Incomplete Privileges
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03In this episode, we explore troubleshooting issues caused by missing or incomplete privileges in a cloud environment. These problems can prevent users or services from accessing necessary resources, executing commands, or integrating with other systems. Common causes include misconfigured role assignments, incomplete policy definitions, or overlook…
…
continue reading

1
Episode 142 — Troubleshooting Step 6 — Documenting Findings and Outcomes
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15This episode emphasizes the importance of documenting every phase of the troubleshooting process. Detailed records should include the problem description, investigation steps, theories tested, actions taken, and final resolution. Documentation not only supports knowledge sharing but also improves efficiency when similar issues arise in the future. …
…
continue reading

1
Episode 141 — Troubleshooting Step 5 — Verifying Functionality and Preventing Recurrence
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43In this episode, we cover the critical step of verifying that the implemented fix has fully resolved the issue. Verification involves functional testing, monitoring affected systems, and confirming with end users that normal operations have been restored. This process should include checking related components or dependent services to ensure no sec…
…
continue reading

1
Episode 140 — Troubleshooting Step 4 — Creating and Implementing the Action Plan
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20In this episode, we outline how to develop and execute an action plan that resolves the confirmed issue. Planning includes defining the specific changes, scheduling them to minimize impact, and ensuring all required resources and approvals are in place. Implementation should follow best practices for change management, including backups and rollbac…
…
continue reading

1
Episode 139 — Troubleshooting Step 3 — Testing the Theory and Re-Evaluating if Needed
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43This episode covers the process of testing your theory to confirm the root cause of a problem. We explain how to perform controlled changes or simulations to verify whether the suspected cause produces or resolves the observed symptoms. Documenting the results of these tests is critical for both operational records and potential escalations. We als…
…
continue reading

1
Episode 138 — Troubleshooting Step 2 — Establishing a Theory and Researching Symptoms
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06In this episode, we explain how to formulate a theory of probable cause based on collected evidence. This involves reviewing system documentation, researching known issues, and comparing current symptoms to baseline performance data. Testing the simplest and most likely causes first can save significant time and reduce disruption. We also address h…
…
continue reading

1
Episode 137 — Troubleshooting Step 1 — Identifying the Problem and Gathering Info
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44This episode focuses on the first and most critical step in troubleshooting: identifying the problem. We discuss methods for collecting detailed information, including user reports, log analysis, monitoring data, and environmental checks. Asking the right questions and confirming recent changes to the system or environment helps narrow down potenti…
…
continue reading

1
Episode 136 — Domain 5.0 Troubleshooting — Overview
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04In this episode, we introduce Domain 5 of the Cloud+ exam, which focuses on identifying, diagnosing, and resolving issues in cloud environments. We outline the exam’s emphasis on a structured troubleshooting methodology, covering problem identification, theory testing, action planning, verification, and documentation. This domain integrates technic…
…
continue reading

1
Episode 135 — Dashboards and Cloud Reporting — Cost, Usage, Capacity, and Health
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42In this episode, we explain how dashboards consolidate key operational metrics for real-time visibility. Cost dashboards track spending across resources and services, usage dashboards monitor workload activity, capacity dashboards ensure resources remain within safe limits, and health dashboards display performance and availability indicators. Thes…
…
continue reading

1
Episode 134 — Upgrade Methods — Blue-Green, Canary, and Active-Passive
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19This episode explores upgrade deployment strategies that reduce risk and downtime. Blue-green deployments run two identical environments, switching traffic to the updated one once validated. Canary releases roll out updates to a small subset of users first, monitoring for issues before full deployment. Active-passive upgrades involve switching from…
…
continue reading

1
Episode 133 — Rollbacks and Patch Policy Enforcement (e.g., n-1)
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode, we cover rollback procedures for reversing patches or updates that cause instability or security issues. Effective rollback planning includes keeping backups, maintaining version histories, and ensuring minimal downtime during reversions. We also discuss patch policy enforcement models like n-1, which keeps systems one version behi…
…
continue reading

1
Episode 132 — Cloud Patching — What, When, and How
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07This episode focuses on patching strategies to keep cloud environments secure and stable. We explain the types of patches—security updates, bug fixes, and feature enhancements—and how to prioritize them based on severity and exposure. Timing is critical, with patch windows scheduled to minimize disruption while addressing vulnerabilities promptly. …
…
continue reading