292 episodes

Welcome to the Cybersecurity FOREVER podcast!

This show is for Networking Engineers, Administrators, other IT Professionals who want to learn and remain updated with cybersecurity, security implementation overall.

Learn from Meena R., the Cybersecurity consultant, Trainer and a co-founder of Luminis Consulting Services Pvt Ltd, IN...!!!

Inside each episode, Meena intends to share Cybersecurity Secrets, and practically implementable knowledge for the audience. Content covers the 360-degree of cybersecurity!

She has been highly proficient in Networking, particularly with Cisco technologies..

Cybersecurity FOREVER Meena R

    • Technology

Welcome to the Cybersecurity FOREVER podcast!

This show is for Networking Engineers, Administrators, other IT Professionals who want to learn and remain updated with cybersecurity, security implementation overall.

Learn from Meena R., the Cybersecurity consultant, Trainer and a co-founder of Luminis Consulting Services Pvt Ltd, IN...!!!

Inside each episode, Meena intends to share Cybersecurity Secrets, and practically implementable knowledge for the audience. Content covers the 360-degree of cybersecurity!

She has been highly proficient in Networking, particularly with Cisco technologies..

    Day-292: What is the Difference Between Network Monitoring and Network Security Monitoring?

    Day-292: What is the Difference Between Network Monitoring and Network Security Monitoring?

    Today I will discuss:

    1. What is Network Monitoring?

    2. What is Network Security Monitoring?

    3. What is the importance of Network Monitoring and Network Security Monitoring in cybersecurity?



    Watch πŸ‘€ this video here:

    πŸ‘‰ https://www.facebook.com/cybersec.prism/videos/520677485993927

    Please Like the video and πŸ“£πŸ“£πŸ“£ share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch πŸ‘€ all the videos of Cybersecurity Series here:Β 

    Facebook Page : πŸ‘‰πŸ‘‰πŸ‘‰ Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button πŸ’› on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    πŸ™ŠπŸ™‰πŸ™ˆ


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/meena-r/message

    • 8 min
    Day-291: What Are The Main Principles Of Network Security?

    Day-291: What Are The Main Principles Of Network Security?

    Today I will discuss:

    1. What are the main principles of network security?Β 

    2. What are the components comes under network security?

    3. What is the Zero-Trust Framework?



    Watch πŸ‘€ this video here:

    πŸ‘‰ https://www.facebook.com/cybersec.prism/videos/2939342346389314

    Please Like the video and πŸ“£πŸ“£πŸ“£ share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch πŸ‘€ all the videos of Cybersecurity Series here:Β 

    Facebook Page : πŸ‘‰πŸ‘‰πŸ‘‰ Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button πŸ’› on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    πŸ™ŠπŸ™‰πŸ™ˆ


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/meena-r/message

    • 9 min
    Day-290: How Does Kerberos Authentication Work?

    Day-290: How Does Kerberos Authentication Work?

    Today I will discuss:

    1. What are the benefits of Kerberos?

    2. How does Kerberos authentication work?

    3. What are the main components of Kerberos?



    Watch πŸ‘€ this video here:

    πŸ‘‰ https://www.facebook.com/cybersec.prism/videos/194673408662321

    Please Like the video and πŸ“£πŸ“£πŸ“£ share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch πŸ‘€ all the videos of Cybersecurity Series here:Β 

    Facebook Page : πŸ‘‰πŸ‘‰πŸ‘‰ Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button πŸ’› on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    πŸ™ŠπŸ™‰πŸ™ˆ


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/meena-r/message

    • 8 min
    Day-289: What Benefits Cloud Computing Can Bring To Your Organization?

    Day-289: What Benefits Cloud Computing Can Bring To Your Organization?

    Today I will discuss:

    1. What are the factors should you consider for cloud computing?

    2. What are the benefits cloud computing can bring for your organization?

    3. Are your cloud computing vendors providing you secure cloud access?



    Watch πŸ‘€ this video here:

    πŸ‘‰ https://www.facebook.com/1641415809511832/videos/431169494815013

    Please Like the video and πŸ“£πŸ“£πŸ“£ share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch πŸ‘€ all the videos of Cybersecurity Series here:Β 

    Facebook Page : πŸ‘‰πŸ‘‰πŸ‘‰ Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button πŸ’› on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    πŸ™ŠπŸ™‰πŸ™ˆ


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/meena-r/message

    • 9 min
    Day-288: What is Business Continuity Management?

    Day-288: What is Business Continuity Management?

    Today I will discuss:

    1. What are the possible factors, which can disrupt a business?

    2. What is business continuity management (BCM) framework?

    3. What are the important areas should be in BCM?



    Watch πŸ‘€ this video here:

    πŸ‘‰ https://www.facebook.com/cybersec.prism/videos/2787783888158209

    Please Like the video and πŸ“£πŸ“£πŸ“£ share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch πŸ‘€ all the videos of Cybersecurity Series here:Β 

    Facebook Page : πŸ‘‰πŸ‘‰πŸ‘‰ Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button πŸ’› on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    πŸ™ŠπŸ™‰πŸ™ˆ


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/meena-r/message

    • 8 min
    Day-287: What Are The Different Ways Hackers Use For Attacking?

    Day-287: What Are The Different Ways Hackers Use For Attacking?

    Today I will discuss:

    1. What are the possible areas for vulnerabilities?

    2. How do hackers find weakest link in the organization?

    3. What are the different methods hackers can use to perform a cyber-attack?



    Watch πŸ‘€ this video here:

    πŸ‘‰ https://www.facebook.com/cybersec.prism/videos/455558545638792

    Please Like the video and πŸ“£πŸ“£πŸ“£ share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch πŸ‘€ all the videos of Cybersecurity Series here:Β 

    Facebook Page : πŸ‘‰πŸ‘‰πŸ‘‰ Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button πŸ’› on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    πŸ™ŠπŸ™‰πŸ™ˆ


    ---

    Send in a voice message: https://podcasters.spotify.com/pod/show/meena-r/message

    • 8 min

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR
Hard Fork
The New York Times