Artwork
iconShare
 
Manage episode 507410962 series 3641336
Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Architecture is the quiet force that decides whether attacks fizzle or cascade. In this episode, we trace the shift from perimeter-era assumptions to layered, breach-assumed design—showing how segmentation, microsegmentation, and zero trust limit lateral movement and turn flat networks into resilient, observable systems. You’ll hear how real incidents like the Target breach expose structural weaknesses, why TLS replaced SSL, how QUIC trades visibility for speed, and where PKI can wobble when certificate authorities fail. We also unpack Heartbleed as an implementation lesson, not a protocol failure, and connect those dots to supply chain risk and dependency hygiene.

Then we turn principles into a playbook. We map design choices to outcomes with defense in depth, least privilege, and continuous verification; explore SDN and SDP for programmable, just-in-time access; and show how monitoring, disaster recovery, and clear trust boundaries make resilience a property of the system, not a wish. You’ll get practical guidance for balancing cost, complexity, and human factors so controls stay usable and auditable across cloud and hybrid environments. If you want security that scales with change—not against it—this episode gives you the architectural mindset to build it, maintain it, and prove it—developed by BareMetalCyber.com.

  continue reading

63 episodes