Episode 33 — Supply Chain, SaaS, USB, Human, IoT, OT, Physical, Bluetooth, RF, and NFC Threats (2.3)
This episode explains how attack paths often begin outside an organization’s directly managed systems. Students should understand supply chain risks involving third-party providers, managed service providers, logistics providers, SaaS platforms, contractors, and visitors. The episode also covers malicious USB devices, IoT devices, operational technology, physical access, Bluetooth, radio frequency, and near-field communication threats. For Security+ scenarios, students should look beyond the main server or application and consider trusted relationships, unmanaged devices, exposed physical interfaces, wireless proximity attacks, and vendor access. Real-world controls include vendor reviews, segmentation, device restrictions, physical security, monitoring, and clear access rules for external parties. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with. And dont forget Cyberauthor.me for the companion study guide and flash cards!