37 episodes

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

Future of Cyber Security Rasool Irfan

    • Technology

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

    Episode 37 - Manage effective Container/ K8 Security Assessments

    Episode 37 - Manage effective Container/ K8 Security Assessments

    Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Get ready to compose security assessment on their containers comprising 4C’s (Code, Container, Cluster and Cloud Infra). Digital business require lean team with talented expertise to conduct assessment services. 


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 8 min
    Episode 36 - Vulnerability Management Maturity Assessment Program

    Episode 36 - Vulnerability Management Maturity Assessment Program

    Ensuring that existing vulnerability management program works well to enhance the operational maturity require assessment. Leverage external professionals to conduct assessments based on defined framework across building blocks and act to mature your vulnerability management program. Listen to this podcast for more details


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 6 min
    Episode 35 - Threat Hunting Capability Development Framework

    Episode 35 - Threat Hunting Capability Development Framework

    With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. Cyber threat intelligence enables security analysts with data enrichment, however good programming and coding skills helps threat hunter to uncover the unknowns.


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 7 min
    Episode 34 - Cyber security table top exercise (TTX)

    Episode 34 - Cyber security table top exercise (TTX)

    Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response plans. The level of participation and greater audience with variety of expertise to combat cyber security incidents quantify the TTX success. 


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 10 min
    Episode 33 - Microsoft Endpoint DLP use cases

    Episode 33 - Microsoft Endpoint DLP use cases

    Microsoft Endpoint DLP helps organizations to adopt data protection strategies with most common use cases such as protecting sensitive data based on regulatory compliance, prevent unintentional or accidental exposure of critical data and restricting unwanted activities on windows devices.  


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 5 min
    Episode 32 - Azure Information Protection - Getting Started and Best Practices

    Episode 32 - Azure Information Protection - Getting Started and Best Practices

    Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions. Microsoft Azure Information Protection has been widely purchased by many customers, but struggling to find ways to get started and require assistance in adopting best practices. Let's explore it in this podcast.


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 11 min

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Jack Rhysider
PJ Vogt
Gimlet