Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
171 - Remote Browser Isolation
|
May 11, 2024 |
170 - eBPF - Part 2
|
May 04, 2024 |
169 - eBPF - Part 1
|
Apr 27, 2024 |
168 - Preparing for and responding to ransomeware attack - Part 2
|
Apr 20, 2024 |
167 - Preparing for and responding to ransomeware attack
|
Apr 13, 2024 |
166 - The SysInternal Utilities
|
Apr 06, 2024 |
165 - How AI is helping Incident Responders
|
Mar 30, 2024 |
164 - What Is Platform Approach To Security? - Part 2
|
Mar 23, 2024 |
163 - What Is Platform Approach To Security? - Part 1
|
Mar 16, 2024 |
162 - LEAP 2024 - Riyadh
|
Mar 09, 2024 |
161 - Qatar Web Summit
|
Mar 02, 2024 |
160 - The Hidden Risks of Default Configurations - Part 2
|
Feb 24, 2024 |
159 - The Hidden Risks of Default Configurations - Part 1
|
Feb 17, 2024 |
158 - Is quantum computing a threat to cryptography, really? - Part 2
|
Feb 10, 2024 |
157 - Is quantum computing a threat to cryptography, really? - Part 1
|
Feb 03, 2024 |
156 - The risks of exposing Web UI
|
Jan 27, 2024 |
155 - iVanti's widespread exploitation
|
Jan 20, 2024 |
154 - Exfil or DLP - Part 2
|
Jan 13, 2024 |
153 - Exfil or DLP - Part 1
|
Jan 06, 2024 |
152 - Recap of most popular episodes of 2023
|
Dec 30, 2023 |
151 - Cyber Security Review Of 2023
|
Dec 23, 2023 |
150 - Supply Chain Security
|
Dec 16, 2023 |
149 - Be cyber vigilant this holiday
|
Dec 09, 2023 |
148 - What is the Dark Web?
|
Dec 02, 2023 |
147 - Web shells - Understanding Their Role in Cyber Attacks
|
Nov 25, 2023 |
146 - Symbolic Language in cyber security
|
Nov 18, 2023 |
145 - Indication of compromise best practice
|
Nov 11, 2023 |
144 - The New Common Vulnerability Scoring System
|
Nov 04, 2023 |
143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco
|
Oct 28, 2023 |
142 - Discussion With Eric Vedel Directory CISO Advisory at Cisco
|
Oct 21, 2023 |
141 - Threat Modeling - Part 2
|
Oct 14, 2023 |
140 - Threat Modeling - Part 1
|
Oct 07, 2023 |
139 - Initial Access - When the Rubber Hits the Road During the Attack Phases - Part 2
|
Sep 30, 2023 |
138 - Initial Access - When the Rubber Hits the Road During the Attack Phases
|
Sep 23, 2023 |
137 - Introduction to Cybersecurity - Part 2
|
Sep 16, 2023 |
136 - Introduction to Cybersecurity - Part 1
|
Sep 09, 2023 |
135 - Cybersecurity's Key - Choosing the Right Tools
|
Sep 02, 2023 |
134 - How does Generative AI help in Cybersecurity
|
Aug 26, 2023 |
133- Interview with Cohaesus Group - Part 2
|
Aug 19, 2023 |
132 - Interview with Cohaesus Group - Part 1
|
Aug 12, 2023 |
131 - How do ransomeware rollback features actually work?
|
Aug 05, 2023 |
130 - What is the difference between Incidence Response and Threat Hunting?
|
Jul 29, 2023 |
129 - What is new in PCI DSS v4.0?
|
Jul 22, 2023 |
128 - How to Achieve Cyber Resilience - Best Practices for Effective Incident Response - Part 2
|
Jul 15, 2023 |
127 - How to Achieve Cyber Resilience: Best Practices for Effective Incident Response - Part 1
|
Jul 08, 2023 |
126 - Unmasking cyber threats - The power of cyber threat intel
|
Jul 01, 2023 |
125 - Verizon Data breach Investigation Report - Key Takeaways
|
Jun 24, 2023 |
124 - Comparing data lake and data warehouse
|
Jun 17, 2023 |
123-Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 2
|
Jun 10, 2023 |
122 - Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 1
|
Jun 03, 2023 |
121 - The MITRE ATT&CK Navigator
|
May 27, 2023 |
120 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 2
|
May 20, 2023 |
119 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 1
|
May 13, 2023 |
118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2
|
May 06, 2023 |
117 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 1
|
Apr 29, 2023 |
116 - Classified Chaos - The Persistent Threat of Data Leaks - Part 2
|
Apr 22, 2023 |
115 - Classified Chaos: The Persistent Threat of Data Leaks - Part 1
|
Apr 15, 2023 |
114 - Ensuring Business Continuity Through Strong Security Measures
|
Apr 08, 2023 |
113 - Navigating Cloud Security: A Look at Public, Hybrid, and Private Cloud
|
Apr 01, 2023 |
112 - OAuth Protocol - Part 2
|
Mar 25, 2023 |
111 - OAuth Protocol - Part 1
|
Mar 18, 2023 |
110 - Know Your Enemy: Why Threat Intelligence Matters
|
Mar 11, 2023 |
109 - Finding malware in encrypted traffic
|
Mar 04, 2023 |
108 - Securing your home network
|
Feb 25, 2023 |
107 - Understanding CVSS Scoring System
|
Feb 18, 2023 |
106 - Optimise your last line of defense
|
Feb 11, 2023 |
105 - Be prepared for the next password manager breach
|
Feb 04, 2023 |
104 - What is NetFlow Protocol used for? - Part 2
|
Jan 28, 2023 |
103 - What is NetFlow Protocol used for? - Part 1
|
Jan 21, 2023 |
102 - OSQuery
|
Jan 14, 2023 |
101- Atomic Red Team
|
Jan 07, 2023 |
100 - The Best of 2022
|
Dec 31, 2022 |
99 - Revisiting the impactful major 2022 cybersecurity events
|
Dec 24, 2022 |
98 - Post-Compromise
|
Dec 17, 2022 |
97 - Privilege Escalation 101 and how to mitigate it
|
Dec 10, 2022 |
96 - Are containers more secure?
|
Dec 03, 2022 |
95 - Benefits of RestAPI and why should you care?
|
Nov 26, 2022 |
94 - Is MSSP right for you?
|
Nov 19, 2022 |
93 - Why companies are breached even when they have MFA on?
|
Nov 12, 2022 |
92 - How to start your cyber security career?
|
Nov 05, 2022 |
91 - Continuous security validation
|
Oct 29, 2022 |
90 - Where do you start with Zero Trust?
|
Oct 22, 2022 |
89 - GITEX 2022 Dubai
|
Oct 15, 2022 |
88 - Insider treat, the danger within - Part 2
|
Oct 08, 2022 |
87 - Insider treat, the danger within - Part 1
|
Oct 01, 2022 |
86 - SIEM versus XDR - Who is the winner?
|
Sep 24, 2022 |
85 - Turning your network into a sensor
|
Sep 17, 2022 |
84 - Post-Exploitation used by cyber criminals - Part 2
|
Sep 10, 2022 |
83 - Post-Exploitation used by cyber criminals - Part 1
|
Sep 03, 2022 |
82 - Consultant and contractor control
|
Aug 27, 2022 |
81 - Critical! Know where you passwords are!
|
Aug 20, 2022 |
80 - How machine learning helps the cybersecurity industry - Part 2
|
Aug 13, 2022 |
79 - How machine learning helps the cybersecurity industry - Part 1
|
Aug 06, 2022 |
78 - Fileless Malware
|
Jul 30, 2022 |
77 - Tools and methodologies to apply to your defense strategy
|
Jul 23, 2022 |
76 - NIST’s Quantum-Resistant Algorithms
|
Jul 16, 2022 |
75 - Solution Approach to Security
|
Jul 09, 2022 |
74 - PowerShell Continued
|
Jul 02, 2022 |
73 - PowerShell - Use it wisely
|
Jun 27, 2022 |
72 - Beating cyber threats with an efficient security team
|
Jun 19, 2022 |
71 - HTML Smuggling attack
|
Jun 11, 2022 |
70 - Network Segmentation
|
Jun 04, 2022 |
69 - Key takeways in Verison 2022's Data Breach Investigations Report
|
May 28, 2022 |
68 - How to keep your email safe from prying eyes?
|
May 20, 2022 |
67 - Reducing your attack surface
|
May 14, 2022 |
66 - Security Assessment
|
May 07, 2022 |
65 - Top software errors leading to vulnerabilities
|
Apr 30, 2022 |
64 - What are the different types of vulnerabilities?
|
Apr 23, 2022 |
63 - How can everyday person protect themself from cyber attack?
|
Apr 16, 2022 |
62 - Digital Forensics 101 - Part 2
|
Apr 09, 2022 |
61 - Digital Forensics 101 - Part 1
|
Apr 02, 2022 |
60 - GISEC 2022 Dubai
|
Mar 26, 2022 |
59 - Secure Access
|
Mar 19, 2022 |
58 - iOT Security
|
Mar 12, 2022 |
57 - Concept of XDR
|
Mar 05, 2022 |
56 -Identity and authentication
|
Feb 26, 2022 |
55 -Lessons from the Irish Health Services Executive Hack - Part 2
|
Feb 19, 2022 |
54 - Lessons from the Irish Health Services Executive Hack - Part 1
|
Feb 12, 2022 |
53 - Common Vulnerability Scoring System (CVSS)
|
Feb 05, 2022 |
52 - Linux Malware Increased in 2021
|
Jan 29, 2022 |
51 - A new RAT campaign
|
Jan 23, 2022 |
50 - Apple Private Relay
|
Jan 15, 2022 |
49 - Mac Malware
|
Jan 09, 2022 |
48 - CIS Controls
|
Jan 01, 2022 |
47 - The best of 2021!
|
Dec 25, 2021 |
46 - Apache Log4j Continues
|
Dec 18, 2021 |
45 - Critical Vulnerability in Apache Log4j
|
Dec 11, 2021 |
44 - Holiday best practice
|
Dec 04, 2021 |
43 - Passwordless future
|
Nov 27, 2021 |
42 - OWASP Top 10
|
Nov 20, 2021 |
41 - Endpoint security and the shift to remote work
|
Nov 13, 2021 |
40 - NIST Cybersecurity Framework
|
Nov 06, 2021 |
39 - What 80M Ransomware Analysis Revealed
|
Oct 31, 2021 |
38 - Modern Vulnerability Management
|
Oct 23, 2021 |
37 - What is FLOC?
|
Oct 16, 2021 |
36 - Cookies
|
Oct 09, 2021 |
35 - It Is Cyber Security Month!
|
Oct 02, 2021 |
34 - Office 365 Email Security - A Talk with ISGM
|
Sep 26, 2021 |
33 - Modern Security Operation Center - Part 2
|
Sep 18, 2021 |
32 - Modern Security Operation Center - Part 1
|
Sep 11, 2021 |
31 - Red Teaming
|
Sep 04, 2021 |
30 - MITRE Engenuity ATT&CK Evaluation
|
Aug 28, 2021 |
29 - Apple’s CSAM Detection System
|
Aug 21, 2021 |
28 - The BlackMatter Interview
|
Aug 15, 2021 |
27 - Interview With Information Security Media Group
|
Aug 07, 2021 |
26 - CyberChef
|
Jul 31, 2021 |
25 - Intrusion Analysis - Part 2
|
Jul 24, 2021 |
24 - Intrusion Analysis - Part 1
|
Jul 17, 2021 |
23 - Interview with CBA TV
|
Jul 13, 2021 |
22 - Is Internal Email Scan Necessary?
|
Jul 03, 2021 |
21 - Secure Access Service Edge (SASE)
|
Jun 26, 2021 |
20 - DLP - Part 2
|
Jun 19, 2021 |
19 - DLP - Part 1
|
Jun 11, 2021 |
18 - DNS Layer Security Part. 2
|
Jun 06, 2021 |
17 - DNS Layer Security Part. 1
|
May 29, 2021 |
16 - The Ransomware Task Force Recommendations
|
May 21, 2021 |
15 - PCI DSS
|
May 16, 2021 |
14 - Zero Trust
|
May 08, 2021 |
13 - What is Threat Hunting?
|
May 01, 2021 |
12 - The Changing Face Of Ransomware
|
Apr 27, 2021 |
11 - 2FA
|
Apr 17, 2021 |
10 - SMTP Authentication Protocols
|
Apr 10, 2021 |
09 - Dynamic Malware Analysis
|
Apr 05, 2021 |
08 - IR
|
Mar 27, 2021 |
07 - The MITRE ATT&CK Framework
|
Mar 24, 2021 |
06 - Hafnium
|
Mar 13, 2021 |
05 - Encrypting Your Data
|
Mar 07, 2021 |
04. Deception Attacks
|
Feb 28, 2021 |
03. The Last Line Of Defense
|
Feb 20, 2021 |
02. Your Adversary Is In, Now What?
|
Feb 13, 2021 |
01. Anatomy Of A Phishing Attack
|
Feb 06, 2021 |