Welcome to the Bare Metal Cyber Podcast Network, home to unique and engaging podcasts that explore the world of cybersecurity, education, and beyond. Whether you're a seasoned professional, a student breaking into the field, or just curious about technology and leadership, we have something for you!

Latest Episodes

Beyond the Call: Colonel John Riley Kane at Ploesti, 1943

Beyond the Call: Colonel John Riley Kane at Ploesti, 1943 follows a United States Army air group commander through one of World War II’s most dangerous low-level bombing raids, as he leads damaged B-24 Liberators into the firestorm over Romania’s vital oil refineries. Listeners hear the story of Kane’s early life in Texas, the long flight from North Africa, the chaos of Operation Tidal Wave, and the split-second decisions that defined his command under relentless antiaircraft fire. The episode also reflects on the strategic importance of Ploesti, the cost paid by his crews, and the character traits that shaped his courage and responsibility. Beyond the Call is the Monday feature of Dispatch: U.S. Military History Magazine, and the podcast is developed by Trackpads dot com.

Certified: Your First Step into Tech with CompTIA Tech+

The narrated version of our Monday “Certified” feature walks you through CompTIA Tech+ (Tech+) in simple, practical language. You will hear what Tech+ actually is, how it differs from heavier technical certifications, and why it is such a good fit for tech-curious beginners and early-career professionals. We explore who this certification is designed for, the kinds of real-world situations it expects you to understand, and how it helps you turn everyday experience with devices, apps, and cloud tools into solid digital fundamentals. The tone stays calm, friendly, and focused on helping you feel less overwhelmed and more confident. You will also get a clear sense of what the Tech+ exam really tests, how it connects to later steps like CompTIA A+ and security or cloud paths, and where it can fit in a realistic early-career roadmap. The narration is based on the Monday “Certified” feature from Bare Metal Cyber Magazine, so you get the same structure, examples, and guidance in an audio-friendly format. If you want to go deeper, you can continue your journey with the dedicated Tech+ audio course inside the Bare Metal Cyber Audio Academy, designed to fit into your commute, walks, or gym time.

Concrete and Code: Smart Buildings as the Quiet New Attack Surface

Smart buildings used to be a facilities concern; now they behave like distributed systems that can be probed, abused, or ransomed. In this narrated edition of “Concrete and Code: Smart Buildings as the Quiet New Attack Surface,” we walk through how access control, building management systems, cloud dashboards, and vendor VPNs have converged into a single, often unowned, cyber-physical domain. You’ll hear why leaders need to treat operational technology (OT) and smart building stacks with the same architectural seriousness as cloud and identity, and how long-lived capital decisions quietly shape your risk posture for decades. Across the episode, we unpack the core sections of the Wednesday “Headline” feature from Bare Metal Cyber Magazine: the evolution from static buildings to software-defined environments, the real anatomy of smart building stacks, the ways buildings become ransom assets, and the governance vacuum that often surrounds them. We finish with pragmatic leadership moves: reference architectures for campuses, non-negotiables for vendor access and segmentation, and procurement levers that turn vague “smart” upgrades into defensible, testable systems. If you’re responsible for risk, resilience, or technology strategy, this is a chance to rethink how you see the walls around your data and people.

Keeping API Keys, Tokens, and Passwords Out of the Wrong Hands

Secrets management for API keys, tokens, and passwords is often the quiet difference between a minor configuration mistake and a major breach. In this narrated audio version of my Tuesday “Insights” feature from Bare Metal Cyber Magazine, we walk through what secrets management really means in day-to-day work. You will hear how vaults, runtime retrieval, rotation, and access policies fit together, and why they matter for developers, operators, and security teams trying to keep up with modern cloud-native environments. The episode also explores where secrets management shows up in real workflows, from CI pipelines and microservices to admin tools and support processes. We unpack quick wins like removing hard-coded credentials from source control, as well as deeper patterns such as dynamic credentials and just-in-time access. Along the way, you will get a clear view of the benefits, trade-offs, common failure modes, and healthy signals that show secrets are being treated as real operational assets, not just background details.

Beyond the Call: George Benjamin Jr

Beyond the Call: Private First Class George Benjamin Jr. at Leyte, 1944 follows a young radio operator of the United States Army as he rises under fire, rallies a stalled attack, rescues a trapped tank crew, and ultimately gives his life trying to shield his comrades from a deadly explosion in the Philippines campaign of World War II. Listeners hear the story of the Leyte fighting, the terrain and tactics that shaped his final day, and a clear explanation of what his Medal of Honor citation meant on the ground. Beyond the Call is the Monday feature of Dispatch: U.S. Military History Magazine, and this podcast is developed by Trackpads dot com.