Today, we’re diving into the world of cybersecurity with an eye to vulnerability scoring system. C We’ve got a topic that’s on the mind of anyone with interest in risk management, one that’s of paramount importance to anyone...
And in today’s episode we ponder over how technology continues to reach every aspect of our lives and now the places we call our castles…our homes. The other week at GITEX I also sat down with Floris Grandvarlet, EMEA...
This was GITEX 2023 Dubai week. GITEX, short for the “Gulf Information Technology Exhibition,” is a prominent annual technology event and trade show held in Dubai, United Arab Emirates. It is one of the largest and most influential...
This is the second part of our Threat Modeling episode. Please listen to last week week’s episode, that is episode 140 before you dive into this one.Having said that, lets have a look at the top security news this week: – : New...
In this week episode I step through what Threat Modeling is. And yes it a crucial aspect of cybersecurity that is often overlooked. Join us as we explain this concept, carefully examining its definition, and, more importantly, highlighting its...
Today’s episode is a continuation of what we’ve started last week: Initial Access. This is part 2. And as I said, it truly is the point where the rubber hits the road when it comes to the important stages to look out for during an...
138 – Initial Access – When the Rubber Hits the Road During the Attack Phases Edit Delete 138 – Initial Access – When the Rubber Hits the Road During the Attack Phases – Part 1 In today’s episode, we’re...
Welcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. I’m your your host Ibrahim Yusuf This is the second part of our two part series on...
Today we will step back and talk about the fundamentals to understanding this ever-evolving field: cyber security. And what better way than to cover “Introduction to Cyber Security” in this episode.But before that, we will recap...
In the ever-evolving landscape of digital threats and vulnerabilities, the importance of selecting the right tools for the job cannot be overstated. Just like a skilled craftsman relies on the right tools to create a masterpiece, cybersecurity...