35 episodes

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

Future of Cyber Securit‪y‬ Rasool Irfan

    • Technology

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan

    Episode 35 - Threat Hunting Capability Development Framework

    Episode 35 - Threat Hunting Capability Development Framework

    With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. Cyber threat intelligence enables security analysts with data enrichment, however good programming and coding skills helps threat hunter to uncover the unknowns.


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 7 min
    Episode 34 - Cyber security table top exercise (TTX)

    Episode 34 - Cyber security table top exercise (TTX)

    Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response plans. The level of participation and greater audience with variety of expertise to combat cyber security incidents quantify the TTX success. 


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 10 min
    Episode 33 - Microsoft Endpoint DLP use cases

    Episode 33 - Microsoft Endpoint DLP use cases

    Microsoft Endpoint DLP helps organizations to adopt data protection strategies with most common use cases such as protecting sensitive data based on regulatory compliance, prevent unintentional or accidental exposure of critical data and restricting unwanted activities on windows devices.  


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 5 min
    Episode 32 - Azure Information Protection - Getting Started and Best Practices

    Episode 32 - Azure Information Protection - Getting Started and Best Practices

    Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions. Microsoft Azure Information Protection has been widely purchased by many customers, but struggling to find ways to get started and require assistance in adopting best practices. Let's explore it in this podcast.


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 11 min
    Episode 31 - Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk

    Episode 31 - Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk

    Cloud business leaders prefers multi cloud deployment strategies either within the region or across regions to have cost effective solution. IT security managers require security event management solutions prefers to have deployed on the cloud environment or either prefer SaaS offerings

    IBM QRadar and Splunk are the leading vendors in the market today offers wide range of SIEM use-cases. It require design and cost considerations to make it effective and fit for business purpose. 


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 8 min
    Episode 30 - Microsoft E5 can replace 16 Security vendors

    Episode 30 - Microsoft E5 can replace 16 Security vendors

    Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendors. However, if customer’s have unique requirements that are achievable only with marketplace security products should continue to leverage other security solutions.


    ---

    This episode is sponsored by
    · Anchor: The easiest way to make a podcast. https://anchor.fm/app

    ---

    Send in a voice message: https://anchor.fm/future-of-cybersecurity/message

    • 7 min

Top Podcasts In Technology