Latest Trojan horse Podcast Episodes
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1
YusufOnSecurity.com - July 06, 2024 18:00 - 28 minutesWe love to hear from you! It's easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The frequency and scale of these i...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
178 - Trusted Relationship Attacks
YusufOnSecurity.com - June 29, 2024 19:00 - 42 minutesWe love to hear from you! In this episode, we’re focusing on the rising trend of IT outsourcing and its implications for cybersecurity. As more businesses delegate non-core tasks to third-party providers, they inadvertently open doors to trust relationship attacks. We'll explore how attackers e...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
177 - The importance Of Automation And Orchestration In Cyber Security - Part 2
YusufOnSecurity.com - June 22, 2024 18:00 - 41 minutesWe love to hear from you! This week's episode will continue with part 2 of "The Importance of Automation and Orchestration in Cyber Security." As I said in the episode one, the need for efficient and effective security measures has never been more critical. I suggest you listen to E1, before...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
176 - The importance Of Automation And Orchestration In Cyber Security - Part 1
YusufOnSecurity.com - June 15, 2024 18:00 - 36 minutesWe love to hear from you! In this week's episode of the podcast we dissect "The Importance of Automation and Orchestration in Cyber Security." As you are well aware cyber threats are becoming increasingly sophisticated and frequent. The need for efficient and effective security measures has n...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
176 - The importance Of Automation And Orchestration In Cyber Security
YusufOnSecurity.com - June 15, 2024 18:00 - 36 minutesWe love to hear from you! In this week's episode of the podcast we dissect "The Importance of Automation and Orchestration in Cyber Security." As you are well aware cyber threats are becoming increasingly sophisticated and frequent. The need for efficient and effective security measures has n...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
175 - The Dangers Of Remote Workers
YusufOnSecurity.com - June 08, 2024 19:00 - 47 minutesWe love to hear from you! In this week's episode, we're tackling a topic that has become increasingly relevant in our post-pandemic world: the hidden dangers posed by remote work. As more companies embrace flexible work arrangements, the convenience and efficiency of working from home bring new...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
174 - Digital Twin Technology And Its Application In Security
YusufOnSecurity.com - June 01, 2024 19:00 - 38 minutesWe love to hear from you! In this week's episode we're exploring an exciting and transformative innovation: Digital Twins technology and its groundbreaking application in cybersecurity. Imagine having a virtual replica of your entire digital infrastructure—a detailed, dynamic model that mirror...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
173 - SSL VPN versus IPsec VPN - Part 2
YusufOnSecurity.com - May 25, 2024 19:00 - 30 minutesWe love to hear from you! In this episode we continue with part 2 on comparing SSL VPN and IPsec VPN, two popular technologies used for secure remote access. As I said last week, understanding the nuances of these technologies is therefore crucial. We'll explore how each VPN works, their secur...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
172 - SSL VPN versus IPsec VPN - Part 1
YusufOnSecurity.com - May 18, 2024 07:00 - 35 minutesWe love to hear from you! In this week's episode we're diving into the world of VPNs, Specifically we will compare SSL VPN and IPsec VPN, two popular technologies used for secure remote access. In the post pandemic area, remote work become part of the new normal post. Understanding the nuance...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
171 - Remote Browser Isolation
YusufOnSecurity.com - May 11, 2024 19:00 - 48 minutesWe love to hear from you! In this week's episode, we will be exploring the fascinating world of remote browser isolation technology or RBI as it appreciated. We will delve into what remote browser isolation is, how it works, and the limitations it faces. Join us as we uncover the complexities o...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
170 - eBPF - Part 2
YusufOnSecurity.com - May 04, 2024 18:00 - 42 minutesWe love to hear from you! In part 2 on eBPF we continue demystifying this promising new technology that is strengthening the cyber space. Please listen to the previous episode i.e. Episode 169 before you to listen to this one. Having said that, lets recap a top trending security news, shall...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
169 - eBPF - Part 1
YusufOnSecurity.com - April 27, 2024 19:00 - 46 minutesWe love to hear from you! In this episode, we're diving deep to demystif a groundbreaking technology that's gathering pace on the security front. It is not something most people are aware of. This technology is bringing enhanced visibility, increased performance to enabling powerful security...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
168 - Preparing for and responding to ransomeware attack - Part 2
YusufOnSecurity.com - April 20, 2024 19:00 - 33 minutesWe love to hear from you! In this week's episode, we will continue with part 2 on "Preparing for and responding to ransomeware attack" As I said last week, ransomware is a threat that will be around us for the foreseeable future. Do listen to part 1 before you listen to this episode. With that...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
167 - Preparing for and responding to ransomeware attack
YusufOnSecurity.com - April 13, 2024 19:00 - 34 minutesWe love to hear from you! Ransomware is a threat that will be around us for the foreseeable future. In this week's episode we will look at the history of ransomware, the common TTPs in use by threat actors such as Turla, how to align our incident response to that threat and others, and finally...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
166 - The SysInternal Utilities
YusufOnSecurity.com - April 06, 2024 19:00 - 46 minutesWe love to hear from you! This week we will dive into a collection of powerful system utilities and tools designed to help users diagnose, troubleshoot, and monitor Windows operating system. These utilities provide advanced functionality beyond what is typically available in Windows, as they of...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
165 - How AI is helping Incident Responders
YusufOnSecurity.com - March 30, 2024 19:00 - 35 minutesWe love to hear from you! AI is getting into all sorts of places but no less than in cybersecurity in both a good way and bad ways. In a good way with bolstering Incident response live cycle but unfortunately in a bad way with generating convincing phishing email or assisting with script and co...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
164 - What Is Platform Approach To Security? - Part 2
YusufOnSecurity.com - March 23, 2024 12:00 - 32 minutesWe love to hear from you! In our second episode, we continue exploring the concept of adopting a platform security. In this second part we will continue where we left off from last week and will encourage you to listed to the first episode if you have not done so. Before we get into the mai...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
163 - What Is Platform Approach To Security? - Part 1
YusufOnSecurity.com - March 16, 2024 19:00 - 34 minutesWe love to hear from you! Welcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. In this episode, we explore the recently much talked about concept of adopting a platform security. As technology ...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
163 - What is platform approach to security? - Part 1
YusufOnSecurity.com - March 16, 2024 19:00 - 34 minutesWelcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. In this episode, we explore the recently much talked about concept of adopting a platform security. As technology advances, cyber criminals c...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
162 - LEAP 2024 - Riyadh
YusufOnSecurity.com - March 09, 2024 18:00 - 28 minutesWe love to hear from you! It was the LEAP event this past week. LEAP is a technology event in Saudi Arabia, Riyadh and it attracts every technology company imaginable especially in the cyber security domain. This is year was no different. At LEAP, I met with Port53, a firm that helps from SMB ...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
161 - Qatar Web Summit
YusufOnSecurity.com - March 02, 2024 19:00 - 45 minutesWe love to hear from you! This week I attended Qatar Web Summit. This is a technology and start-up summit held yearly in Doha, Qatar. There were a lot going on and I am lucky to have spent time with the Ken Fee, the CEO of Business Technology Architect shorten as BTA where we talked about secur...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
160 - The Hidden Risks of Default Configurations - Part 2
YusufOnSecurity.com - February 24, 2024 19:00 - 45 minutesWe love to hear from you! In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these settings are may introduce significant security risks that can leave systems vulnerable to exp...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
159 - The Hidden Risks of Default Configurations - Part 1
YusufOnSecurity.com - February 17, 2024 18:00 - 37 minutesWe love to hear from you! In today's interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security risks that can leave systems v...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
158 - Is quantum computing a threat to cryptography, really? - Part 2
YusufOnSecurity.com - February 10, 2024 19:00 - 37 minutesWe love to hear from you! This is the second episode of our two part episode on whether quantum computing is a threat to cryptography really. Make sure you listen to episode 1 first as we laid the foundation on what is coming up in this episode. As always lets review this week's top trending s...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
157 - Is quantum computing a threat to cryptography, really? - Part 1
YusufOnSecurity.com - February 03, 2024 19:00 - 39 minutesWe love to hear from you! Cryptography are the backbone of privacy since time immemorial. Toda is THE foundational block of the connected world without which the Internet will crumble as we know it. There is a feverish discussions happening and fast improving of a new era in computing - Quantum...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
157 - Is quantum computing a threat to cryptography, really?
YusufOnSecurity.com - February 03, 2024 19:00 - 39 minutesCryptography are the backbone of privacy since time immemorial. Toda is THE foundational block of the connected world without which the Internet will crumble as we know it. There is a feverish discussions happening and fast improving of a new era in computing - Quantum computing, and it is impro...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
156 - The risks of exposing Web UI
YusufOnSecurity.com - January 27, 2024 18:00 - 46 minutesWe love to hear from you! Welcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. Accessing and managing various applications and services remotely is a daily occurrence for a typical administrator...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
155 - iVanti's widespread exploitation
YusufOnSecurity.com - January 20, 2024 17:00 - 42 minutesWe love to hear from you! When things go wrong, they go wrong fast. This week will dive into the widespread exploitation on iVanti VPN solution that attracted a lot of attention from both the security community as well as from the bad guys. What went wrong? Stay tuned. Just before we get into i...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
154 - Exfil or DLP - Part 2
YusufOnSecurity.com - January 13, 2024 03:00 - 37 minutesWe love to hear from you! We are continuing demystifying a couple of terms that folks new to the realm of cyber security often mix up. Those are the terms Exfil or DLP. So by the end of the session you will surely understand where you stand the next time you will hear an Exfil has happened to...
![YusufOnSecurity.com artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts114/v4/d3/48/e5/d348e527-7d19-2b5d-9c84-670891351c58/mza_7560021267085777277.jpeg/100x100bb.jpg)
153 - Exfil or DLP?
YusufOnSecurity.com - January 06, 2024 19:00 - 40 minutesWe will kick off the year with demystifying a couple of terms that folks new to the realm of cyber security often mix up. Those are the terms Exfil or DLP. So by the end of the session you will surely understand where you stand the next time you will hear an Exfil has happened to so and so org...
Related Trojan horse Topics