9 episodes

بودكاست يهتم بأمن المعلومات


Disclaimer:
The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any organization or entity. This podcast is available for non-commercial use only.

سكيوريتي بالعرب‪ي‬ Osama Kamal

    • Technology
    • 4.6 • 9 Ratings

بودكاست يهتم بأمن المعلومات


Disclaimer:
The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any organization or entity. This podcast is available for non-commercial use only.

    SOC Detection Engineering - حمزة وديع

    SOC Detection Engineering - حمزة وديع

    References:


    https://www.linkedin.com/in/hamzaouadia/
    https://twitter.com/Cyb3rSn0rlax
    https://www.unh4ck.com/detection-engineering-dimensions/operationalization#precision-and-recall



    -----------------------------------



    Disclaimer:

    The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any organization or entity. This podcast is available for non-commercial use only.

    • 39 min
    Bug Bounty - إبراهيم حجازي

    Bug Bounty - إبراهيم حجازي

    https://www.facebook.com/Zigoo.eg

    https://www.linkedin.com/in/ebrahimhegazy/

    https://twitter.com/Zigoo0

    -------------------------------------

    References:

    https://github.com/disclose/bug-bounty-platforms

    https://www.youtube.com/watch?v=ckHQNUB51MQ&list=PLv7cogHXoVhVqQyou7hWWpUHwWZEcMR2x&index=9

    -------------------------------------

    Disclaimer:

    The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any organization or entity. This podcast is available for non-commercial use only.

    • 32 min
    Threat Intelligence - أحمد شوشة

    Threat Intelligence - أحمد شوشة

    https://www.linkedin.com/in/ahmedfshosha/

    https://twitter.com/Ahmedfshosha

    --------------------------------------

    References:

    https://guides.library.georgetown.edu/c.php?g=680916&p=7612659

    -------------------------------------

    Disclaimer:

    The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any organization or entity. This podcast is available for non-commercial use only.

    • 42 min
    SOC Automation - علي الوشلي

    SOC Automation - علي الوشلي

    https://twitter.com/ali_alwashali

    -------------------------------------

    References:

    https://www.youtube.com/watch?v=ddwOsJsaAbg&feature=youtu.be

    https://n8n.io/

    -------------------------------------

    Disclaimer:

    The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any organization or entity. This podcast is available for non-commercial use only.

    • 28 min
    Deception - أمجد مجدي

    Deception - أمجد مجدي

    Deception - أمجد مجدي 

    Profile: https://www.linkedin.com/in/amgadmagdy/

    References:

    https://github.com/paralax/awesome-honeypots

    https://canarytokens.org/generate



    Disclaimer:

    The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any  organization or entity. This podcast is available for non-commercial use only. 

    • 20 min
    Securing the Cloud Transformation أحمد عبدالحميد

    Securing the Cloud Transformation أحمد عبدالحميد

    Securing the Cloud Transformation  أحمد عبدالحميد

    https://www.linkedin.com/in/ahmed-abdel-hamid-366b2b1/



    Resources:

    Google: https://cloud.google.com/architecture/framework/security/shared-responsibility-shared-fate

    AWS: https://aws.amazon.com/compliance/shared-responsibility-model/

    Azure: https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility



    Disclaimer:

    The views, discussions, information, or opinions on this podcast by the host or guests are their own and do not represent their past or current employers. The host and guests speak in their own individual capacity and not on behalf of any  organization or entity. This podcast is available for non-commercial use only. 

    • 21 min

Customer Reviews

4.6 out of 5
9 Ratings

9 Ratings

Top Podcasts In Technology

Lex Fridman
Enab Podcast
Mohammad Aljobairi
Cal Newport
Sprints Team
Oracle Corporation

You Might Also Like

عبدالرحمن السويّل
Mics | مايكس
ثمانية/ thmanyah
بودكاست أبجورة
RathathPodcast
ثمانية/ thmanyah