YusufOnSecurity.com
YusufOnSecurity.Com
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
All episodes
Best episodes
Top 10 YusufOnSecurity.com Episodes
Goodpods has curated a list of the 10 best YusufOnSecurity.com episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to YusufOnSecurity.com for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite YusufOnSecurity.com episode by adding your comments to the episode page.
191 - Is The Browser The New Operating System?
YusufOnSecurity.com
09/28/24 • 26 min
Enjoying the content? Let us know your feedback!
Today we’re discussing an exciting trend in the world of technology—the browser is no longer just a window to the web. So we asked is it becoming the operating system itself?
From the early days of Mosaic and Netscape Navigator to today’s cloud-powered Chromebooks, the browser has evolved dramatically. In this episode, we’ll explore the security implication, the history of browsers, the famous browser wars, and how today’s browsers are blurring the lines between web interfaces and operating systems.
Having said that, lets recap a top trending security news shall we?
- Exploiting CUPS: How Recent Vulnerabilities Could Compromise Linux Security
https://www.evilsocket.net: Attacking On UNIX Systems Via CUPS Part I
-https://en.wikipedia.org: History of The Web Browsers
- https://en.wikipedia.org: Browser Wars
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
193 - Microsoft Windows Architecture
YusufOnSecurity.com
10/12/24 • 39 min
Enjoying the content? Let us know your feedback!
Today we’re going to peel back the layers of Microsoft Windows architecture. For many of us, Windows has been a part of our computing lives for decades, whether at work or at home. But how much do we really know about how it works under the hood? In this episode, we’ll take a closer look at what makes Windows tick, compare it with Unix/Linux systems, and explore how it has evolved over the years.
Before we get into the topic, lets review this week's top trending security news:
- Criminals Are Testing Their Ransomware Campaigns in Africa
https://www.performanta.com: Africa A testing Ground
- https://en.wikipedia.org: Architecture Of Windows NT
- https://techcommunity.microsoft.com: Windows Architecture The Basics
- https://learn.microsoft.com: Explore Windows Architecture/
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
194 - Interview With Red Sift
YusufOnSecurity.com
10/19/24 • 33 min
Enjoying the content? Let us know your feedback!
This week's episode is an interview with Nadim Lahoud from Red Sift at GITEX the Global IT Expo that is held yearly in Dubai. It is the largest tech startup gathering in the world.
Redsift is a company that provides a cloud-based DMARC, DKIM and SPF configuration and management platform called OnDMARC. They also provide:
-Continuous certificate discovery and monitoring as well as
-Brand Trust through AI-driven brand impersonation discovery and monitoring.
Before we get into that we will recap the top trending security this week. That is:
- FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms
https://fidoalliance.org: Specifications Credential Exchange Specifications
- https://redsift.com: About Red Sift
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
190 - DevSecOps
YusufOnSecurity.com
09/21/24 • 26 min
Enjoying the content? Let us know your feedback!
In this episode lets look at the world of DevSecOps—a vital practice in modern software development that has implication on security. We’ll trace the history of software development, discuss the evolution of methodologies, and examine the challenges that have led to the emergence of DevSecOps. So, whether you’re a seasoned developer who is curious about the cyber security world, or a veteran security practitioner, this is an episode you would not want to miss..
As always, lets review what is trending in the news front first.
- Microsoft officially deprecates Windows Server Update Service aka WSUS.
https://techcommunity.microsoft.com: Windows Server Update Services WSUS Deprecation
- https://www.cisco.com: Addressing Security Challenges in a Fast Evolving Landscape White Paper
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
06/22/24 • 41 min
Enjoying the content? Let us know your feedback!
This week's episode will continue with part 2 of "The Importance of Automation and Orchestration in Cyber Security."
As I said in the episode one, the need for efficient and effective security measures has never been more critical.
I suggest you listen to E1, before you dive into this one.
Without further ado, lets first get what is trending this week in term of news and updates.
- Hundreds of personal computer as well as Server Models could be Affected by a serious UEFI Vulnerability
https://eclypsium.com: UEFICanHazBufferOverflow Widespread Impact From Vulnerability In Popular PC And Server Firmware
- https://eclypsium.com: How Eclypsium Automates Binary Analysis At Scale
- https://en.wikipedia.org: Orchestration (computing)
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
06/15/24 • 36 min
Enjoying the content? Let us know your feedback!
In this week's episode of the podcast we dissect "The Importance of Automation and Orchestration in Cyber Security."
As you are well aware cyber threats are becoming increasingly sophisticated and frequent.
The need for efficient and effective security measures has never been more critical. Equally, automation and orchestration have never more important for organizations to defend themselves and to streamlining processes, reducing response times, and enhancing overall security posture.
In my view this is an important way of tipping the balance in favor of the defenders.
Having said that and before we get into the main topic, lets touch a trending piece of news this week. And that is:
- Phishing Email Abuses Windows Search Protocol
https://www.trustwave.com: Search Spoof Abuse O Windows Search T Redirect To Malware
- https://learn.microsoft.com: Using the search Protocol
- https://benjamin-altpeter.de: An Analysis of the State of Electron Security in the Wild
- https://en.wikipedia.org: Orchestration (computing)
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
174 - Digital Twin Technology And Its Application In Security
YusufOnSecurity.com
06/01/24 • 38 min
Enjoying the content? Let us know your feedback!
In this week's episode we're exploring an exciting and transformative innovation: Digital Twins technology and its groundbreaking application in cybersecurity.
Imagine having a virtual replica of your entire digital infrastructure—a detailed, dynamic model that mirrors every aspect of your environment.
In particular, we will look at how this cutting-edge technology enhances our ability to test, patch and update our environment and therefore anticipate, detect, and respond to cyber threats with unmatched precision and agility.
Before we get into the main topic, lets touch a top trending piece of news this week. And that is:
- Kaspersky releases free tool that scans Linux for known threats
https://www.bleepingcomputer.com: Kaspersky Releases Free Tool That Scans Linux For Known Threats
- https://en.wikipedia.org: Digital-Twin
- https://blogs.cisco.com/securit: Cisco HyperShield Reimagining Security
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
173 - SSL VPN versus IPsec VPN - Part 2
YusufOnSecurity.com
05/25/24 • 30 min
Enjoying the content? Let us know your feedback!
In this episode we continue with part 2 on comparing SSL VPN and IPsec VPN, two popular technologies used for secure remote access.
As I said last week, understanding the nuances of these technologies is therefore crucial. We'll explore how each VPN works, their security features, performance differences, and the scenarios where each excels. Please listen to episode 172 before you listen to this episode.
With that said, lets turn to a top trending news this week:
- Microsoft's "Recall" feature raises privacy concern.
- https://www.wired.com: Microsoft Recall AI May Be A Privacy Nightmare
- https://en.wikipedia.org: Virtual_private_network
- https://en.wikipedia.org: Transport Layer Security
https://www.bleepingcomputer.com: Norway Recommends Replacing SSL VPN To Prevent Breaches
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
172 - SSL VPN versus IPsec VPN - Part 1
YusufOnSecurity.com
05/18/24 • 35 min
Enjoying the content? Let us know your feedback!
In this week's episode we're diving into the world of VPNs, Specifically we will compare SSL VPN and IPsec VPN, two popular technologies used for secure remote access. In the post pandemic area, remote work become part of the new normal post. Understanding the nuances of these technologies is therefore crucial. We'll explore how each VPN works, their security features, performance differences, and the scenarios where each excels.
Having said that and before we get into VPN, lets turn to a top trending news this week and they are:
- Recap of RSA Conference. The biggest security conference in the US.
https://en.wikipedia.org: Virtual_private_network
- https://en.wikipedia.org: Transport Layer Security
https://www.bleepingcomputer.com: Norway Recommends Replacing SSL VPN To Prevent Breaches
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
197 - Advanced Malware evasion Techniques And Their Counter Measures
YusufOnSecurity.com
11/09/24 • 27 min
Enjoying the content? Let us know your feedback!
It is another week and another podcast shaw on YusufOnSecurity where we deep dive into the complex world of cybersecurity that concerns both professionals and anyone interested in how attackers continue to evolve their methods.
This week we will be covering advanced malware evasion techniques—strategies used by malicious software to avoid detection—and, crucially, the countermeasures that can help protect against these threats.
Before we get started, lets review a top trending piece news this week....and that is:
- SANS' Holiday Hack Challenge 2024 is Up
- https://www.sans.org: SANS' Holiday Hack Challenge 2024
- https://redcanary.com: Defense- Evasion Why Is It So Prominent How Can You Detect It?
- https://attack.mitre.org/tactics/TA0005/
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
Show more best episodes
Show more best episodes
FAQ
How many episodes does YusufOnSecurity.com have?
YusufOnSecurity.com currently has 197 episodes available.
What topics does YusufOnSecurity.com cover?
The podcast is about Security, Podcasts, Technology, Cyber Security and Virus.
What is the most popular episode on YusufOnSecurity.com?
The episode title '177 - The importance Of Automation And Orchestration In Cyber Security - Part 2' is the most popular.
What is the average episode length on YusufOnSecurity.com?
The average episode length on YusufOnSecurity.com is 37 minutes.
How often are episodes of YusufOnSecurity.com released?
Episodes of YusufOnSecurity.com are typically released every 7 days.
When was the first episode of YusufOnSecurity.com?
The first episode of YusufOnSecurity.com was released on Feb 6, 2021.
Show more FAQ
Show more FAQ