Yusuf On Security

Security news, opinion and advice

Cybersecurity topics that matter most.

Weekly podcast on cybersecurity domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!

Latest episode

230 – Security Of iOT

Latest episodes

230 – Security Of iOT

This week on YusufOnSecurity, we’re diving into a topic that’s become increasingly critical as our world grows more connected: the security of the Internet of Things, or IoT. From smart thermostats and wearable fitness trackers to industrial sensors...

229 – What is FIPS 140-3?

In today’s interconnected world, the security of our digital infrastructure relies heavily on cryptography—the science of protecting information by transforming it into unreadable formats for unauthorized users. But how do we know the cryptographic...

227 – Is UTM Still Relevant?

Today, we’ll answer a pressing question in cybersecurity: Is UTM still relevant in 2025? We’ll trace the origins of UTM, explain why it was created, break down its core features, compare it to newer technologies, and finish by busting a common...

All Episodes

224 – Cisco Talos Year 2024 In Review In this week’s episode, we are looking at the latest Cisco Talos’ 2024 report.  In this comprehensive report, we will delve into the major cybersecurity trends and threats observed over the past...

223 – RSAC 2025 – Part 2

This is the part 2 of RSAC 2025 episode. If you have not listened to episode 1 (that episode 222), I would suggest you listen to episode 1 before you listen this episode.Before you we get into part 2, lets review what has been happening last week on...

222 – RSAC 2025 – Part 1

It was RSAC week and it would be remiss of me if I did not give you a highlight on what went on this year, 2025. After all, RSAC has a critical role in security.  We will be reviewing the top key announcements from this year’s event, including...

209 – DeepSeek

Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek.Now, let me tell you, DeepSeek is shaking things up. They’re...

Latest from the blog

What will it take?

A great piece on what it will take to improve the safety of the connected world. Read it here.

Extended detection and response (XDR)

Extended detection and response (XDR) captures threat data from previously isolated security tools throughout the organizations tech stack to enable...

Log4j Vulnerabilities

Towards the end of November, a researcher from Alibaba discovered a fault (CVE-2021-44228) in a well known open-source logging library called...