Yusuf On Security

Security news, opinion and advice

Cybersecurity topics that matter most.

Weekly podcast on cybersecurity domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!

Latest episodes

181 – The CrowdStrike IT Outage

This week’s episode needs very little introduction: The CrowdStrike IT Outage.We will delve into the unprecedented IT outage caused by a corrupt update from CrowdStrike, which led to widespread Blue Screen of Death (BSOD) errors on Windows...

178 – Trusted Relationship Attacks

In this episode, we’re focusing on the rising trend of IT outsourcing and its implications for cybersecurity. As more businesses delegate non-core tasks to third-party providers, they inadvertently open doors to trust relationship attacks...

175 – The Dangers Of Remote Workers

In this week’s episode, we’re tackling a topic that has become increasingly relevant in our post-pandemic world: the hidden dangers posed by remote work.As more companies embrace flexible work arrangements, the convenience and efficiency...

171 – Remote Browser Isolation

In this week’s episode, we will be exploring the fascinating world of remote browser isolation technology or RBI as it appreciated. We will delve into what remote browser isolation is, how it works, and the limitations it faces. Join us as we...

170 – eBPF – Part 2

 In part 2 on eBPF we continue demystifying this promising new technology that is strengthening  the cyber space. Please listen to the previous episode i.e. Episode 169 before you to listen to this one. Having said that, lets recap a...

169 – eBPF – Part 1

In this episode, we’re diving deep to demystify a groundbreaking technology that’s gathering pace on the security front. It is not something most people are aware of. This technology is bringing enhanced visibility, increased performance...

166 – The SysInternal Utilities

This week we will dive into a collection of powerful system utilities and tools designed to help users diagnose, troubleshoot, and monitor Windows operating system.These utilities provide advanced functionality beyond what is typically available in...

162 – LEAP 2024 – Riyadh

It was the LEAP event this past week. LEAP is a technology event in Saudi Arabia, Riyadh and it attracts every technology company imaginable especially in the cyber security domain. This is year was no different.At LEAP, I met with Port53, a firm...

Latest from the blog

What will it take?

A great piece on what it will take to improve the safety of the connected world. Read it here.

Extended detection and response (XDR)

Extended detection and response (XDR) captures threat data from previously isolated security tools throughout the organizations tech stack to enable...

Log4j Vulnerabilities

Towards the end of November, a researcher from Alibaba discovered a fault (CVE-2021-44228) in a well known open-source logging library called...