YusufOnSecurity.com

By YusufOnSecurity.Com

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 171

Description

This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!

Episode Date
171 - Remote Browser Isolation
May 11, 2024
170 - eBPF - Part 2
May 04, 2024
169 - eBPF - Part 1
Apr 27, 2024
168 - Preparing for and responding to ransomeware attack - Part 2
Apr 20, 2024
167 - Preparing for and responding to ransomeware attack
Apr 13, 2024
166 - The SysInternal Utilities
Apr 06, 2024
165 - How AI is helping Incident Responders
Mar 30, 2024
164 - What Is Platform Approach To Security? - Part 2
Mar 23, 2024
163 - What Is Platform Approach To Security? - Part 1
Mar 16, 2024
162 - LEAP 2024 - Riyadh
Mar 09, 2024
161 - Qatar Web Summit
Mar 02, 2024
160 - The Hidden Risks of Default Configurations - Part 2
Feb 24, 2024
159 - The Hidden Risks of Default Configurations - Part 1
Feb 17, 2024
158 - Is quantum computing a threat to cryptography, really? - Part 2
Feb 10, 2024
157 - Is quantum computing a threat to cryptography, really? - Part 1
Feb 03, 2024
156 - The risks of exposing Web UI
Jan 27, 2024
155 - iVanti's widespread exploitation
Jan 20, 2024
154 - Exfil or DLP - Part 2
Jan 13, 2024
153 - Exfil or DLP - Part 1
Jan 06, 2024
152 - Recap of most popular episodes of 2023
Dec 30, 2023
151 - Cyber Security Review Of 2023
Dec 23, 2023
150 - Supply Chain Security
Dec 16, 2023
149 - Be cyber vigilant this holiday
Dec 09, 2023
148 - What is the Dark Web?
Dec 02, 2023
147 - Web shells - Understanding Their Role in Cyber Attacks
Nov 25, 2023
146 - Symbolic Language in cyber security
Nov 18, 2023
145 - Indication of compromise best practice
Nov 11, 2023
144 - The New Common Vulnerability Scoring System
Nov 04, 2023
143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco
Oct 28, 2023
142 - Discussion With Eric Vedel Directory CISO Advisory at Cisco
Oct 21, 2023
141 - Threat Modeling - Part 2
Oct 14, 2023
140 - Threat Modeling - Part 1
Oct 07, 2023
139 - Initial Access - When the Rubber Hits the Road During the Attack Phases - Part 2
Sep 30, 2023
138 - Initial Access - When the Rubber Hits the Road During the Attack Phases
Sep 23, 2023
137 - Introduction to Cybersecurity - Part 2
Sep 16, 2023
136 - Introduction to Cybersecurity - Part 1
Sep 09, 2023
135 - Cybersecurity's Key - Choosing the Right Tools
Sep 02, 2023
134 - How does Generative AI help in Cybersecurity
Aug 26, 2023
133- Interview with Cohaesus Group - Part 2
Aug 19, 2023
132 - Interview with Cohaesus Group - Part 1
Aug 12, 2023
131 - How do ransomeware rollback features actually work?
Aug 05, 2023
130 - What is the difference between Incidence Response and Threat Hunting?
Jul 29, 2023
129 - What is new in PCI DSS v4.0?
Jul 22, 2023
128 - How to Achieve Cyber Resilience - Best Practices for Effective Incident Response - Part 2
Jul 15, 2023
127 - How to Achieve Cyber Resilience: Best Practices for Effective Incident Response - Part 1
Jul 08, 2023
126 - Unmasking cyber threats - The power of cyber threat intel
Jul 01, 2023
125 - Verizon Data breach Investigation Report - Key Takeaways
Jun 24, 2023
124 - Comparing data lake and data warehouse
Jun 17, 2023
123-Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 2
Jun 10, 2023
122 - Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 1
Jun 03, 2023
121 - The MITRE ATT&CK Navigator
May 27, 2023
120 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 2
May 20, 2023
119 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 1
May 13, 2023
118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2
May 06, 2023
117 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 1
Apr 29, 2023
116 - Classified Chaos - The Persistent Threat of Data Leaks - Part 2
Apr 22, 2023
115 - Classified Chaos: The Persistent Threat of Data Leaks - Part 1
Apr 15, 2023
114 - Ensuring Business Continuity Through Strong Security Measures
Apr 08, 2023
113 - Navigating Cloud Security: A Look at Public, Hybrid, and Private Cloud
Apr 01, 2023
112 - OAuth Protocol - Part 2
Mar 25, 2023
111 - OAuth Protocol - Part 1
Mar 18, 2023
110 - Know Your Enemy: Why Threat Intelligence Matters
Mar 11, 2023
109 - Finding malware in encrypted traffic
Mar 04, 2023
108 - Securing your home network
Feb 25, 2023
107 - Understanding CVSS Scoring System
Feb 18, 2023
106 - Optimise your last line of defense
Feb 11, 2023
105 - Be prepared for the next password manager breach
Feb 04, 2023
104 - What is NetFlow Protocol used for? - Part 2
Jan 28, 2023
103 - What is NetFlow Protocol used for? - Part 1
Jan 21, 2023
102 - OSQuery
Jan 14, 2023
101- Atomic Red Team
Jan 07, 2023
100 - The Best of 2022
Dec 31, 2022
99 - Revisiting the impactful major 2022 cybersecurity events
Dec 24, 2022
98 - Post-Compromise
Dec 17, 2022
97 - Privilege Escalation 101 and how to mitigate it
Dec 10, 2022
96 - Are containers more secure?
Dec 03, 2022
95 - Benefits of RestAPI and why should you care?
Nov 26, 2022
94 - Is MSSP right for you?
Nov 19, 2022
93 - Why companies are breached even when they have MFA on?
Nov 12, 2022
92 - How to start your cyber security career?
Nov 05, 2022
91 - Continuous security validation
Oct 29, 2022
90 - Where do you start with Zero Trust?
Oct 22, 2022
89 - GITEX 2022 Dubai
Oct 15, 2022
88 - Insider treat, the danger within - Part 2
Oct 08, 2022
87 - Insider treat, the danger within - Part 1
Oct 01, 2022
86 - SIEM versus XDR - Who is the winner?
Sep 24, 2022
85 - Turning your network into a sensor
Sep 17, 2022
84 - Post-Exploitation used by cyber criminals - Part 2
Sep 10, 2022
83 - Post-Exploitation used by cyber criminals - Part 1
Sep 03, 2022
82 - Consultant and contractor control
Aug 27, 2022
81 - Critical! Know where you passwords are!
Aug 20, 2022
80 - How machine learning helps the cybersecurity industry - Part 2
Aug 13, 2022
79 - How machine learning helps the cybersecurity industry - Part 1
Aug 06, 2022
78 - Fileless Malware
Jul 30, 2022
77 - Tools and methodologies to apply to your defense strategy
Jul 23, 2022
76 - NIST’s Quantum-Resistant Algorithms
Jul 16, 2022
75 - Solution Approach to Security
Jul 09, 2022
74 - PowerShell Continued
Jul 02, 2022
73 - PowerShell - Use it wisely
Jun 27, 2022
72 - Beating cyber threats with an efficient security team
Jun 19, 2022
71 - HTML Smuggling attack
Jun 11, 2022
70 - Network Segmentation
Jun 04, 2022
69 - Key takeways in Verison 2022's Data Breach Investigations Report
May 28, 2022
68 - How to keep your email safe from prying eyes?
May 20, 2022
67 - Reducing your attack surface
May 14, 2022
66 - Security Assessment
May 07, 2022
65 - Top software errors leading to vulnerabilities
Apr 30, 2022
64 - What are the different types of vulnerabilities?
Apr 23, 2022
63 - How can everyday person protect themself from cyber attack?
Apr 16, 2022
62 - Digital Forensics 101 - Part 2
Apr 09, 2022
61 - Digital Forensics 101 - Part 1
Apr 02, 2022
60 - GISEC 2022 Dubai
Mar 26, 2022
59 - Secure Access
Mar 19, 2022
58 - iOT Security
Mar 12, 2022
57 - Concept of XDR
Mar 05, 2022
56 -Identity and authentication
Feb 26, 2022
55 -Lessons from the Irish Health Services Executive Hack - Part 2
Feb 19, 2022
54 - Lessons from the Irish Health Services Executive Hack - Part 1
Feb 12, 2022
53 - Common Vulnerability Scoring System (CVSS)
Feb 05, 2022
52 - Linux Malware Increased in 2021
Jan 29, 2022
51 - A new RAT campaign
Jan 23, 2022
50 - Apple Private Relay
Jan 15, 2022
49 - Mac Malware
Jan 09, 2022
48 - CIS Controls
Jan 01, 2022
47 - The best of 2021!
Dec 25, 2021
46 - Apache Log4j Continues
Dec 18, 2021
45 - Critical Vulnerability in Apache Log4j
Dec 11, 2021
44 - Holiday best practice
Dec 04, 2021
43 - Passwordless future
Nov 27, 2021
42 - OWASP Top 10
Nov 20, 2021
41 - Endpoint security and the shift to remote work
Nov 13, 2021
40 - NIST Cybersecurity Framework
Nov 06, 2021
39 - What 80M Ransomware Analysis Revealed
Oct 31, 2021
38 - Modern Vulnerability Management
Oct 23, 2021
37 - What is FLOC?
Oct 16, 2021
36 - Cookies
Oct 09, 2021
35 - It Is Cyber Security Month!
Oct 02, 2021
34 - Office 365 Email Security - A Talk with ISGM
Sep 26, 2021
33 - Modern Security Operation Center - Part 2
Sep 18, 2021
32 - Modern Security Operation Center - Part 1
Sep 11, 2021
31 - Red Teaming
Sep 04, 2021
30 - MITRE Engenuity ATT&CK Evaluation
Aug 28, 2021
29 - Apple’s CSAM Detection System
Aug 21, 2021
28 - The BlackMatter Interview
Aug 15, 2021
27 - Interview With Information Security Media Group
Aug 07, 2021
26 - CyberChef
Jul 31, 2021
25 - Intrusion Analysis - Part 2
Jul 24, 2021
24 - Intrusion Analysis - Part 1
Jul 17, 2021
23 - Interview with CBA TV
Jul 13, 2021
22 - Is Internal Email Scan Necessary?
Jul 03, 2021
21 - Secure Access Service Edge (SASE)
Jun 26, 2021
20 - DLP - Part 2
Jun 19, 2021
19 - DLP - Part 1
Jun 11, 2021
18 - DNS Layer Security Part. 2
Jun 06, 2021
17 - DNS Layer Security Part. 1
May 29, 2021
16 - The Ransomware Task Force Recommendations
May 21, 2021
15 - PCI DSS
May 16, 2021
14 - Zero Trust
May 08, 2021
13 - What is Threat Hunting?
May 01, 2021
12 - The Changing Face Of Ransomware
Apr 27, 2021
11 - 2FA
Apr 17, 2021
10 - SMTP Authentication Protocols
Apr 10, 2021
09 - Dynamic Malware Analysis
Apr 05, 2021
08 - IR
Mar 27, 2021
07 - The MITRE ATT&CK Framework
Mar 24, 2021
06 - Hafnium
Mar 13, 2021
05 - Encrypting Your Data
Mar 07, 2021
04. Deception Attacks
Feb 28, 2021
03. The Last Line Of Defense
Feb 20, 2021
02. Your Adversary Is In, Now What?
Feb 13, 2021
01. Anatomy Of A Phishing Attack
Feb 06, 2021