Artwork

Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

140 - Threat Modeling - Part 1

45:15
 
Share
 

Manage episode 379667570 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

In this week's episode I step through what Threat Modeling is. And yes it a crucial aspect of cybersecurity that is often overlooked. Join us as we explain this concept by carefully examining its definition, and, more importantly, highlighting its effectiveness as a powerful tool in the ever-changing threat, defenses and mitigation.
But before that here are the topics of what is trending this week:

  • SMS is still with us despite its weaknesses
  • The push to catch up with DMARC

- https://blog.google: New Gmail protections for a safer, less spammy inbox
- https://blog.postmaster.yahooinc.com: More Secure, Less Spam: Enforcing Email Standards for a Better Experience
- https://owasp.org: Threat Modeling
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

Chapters

1. Intro (00:00:00)

2. SMS is still with us despite its weakness (00:01:18)

3. The push to catch up with DMARC (00:11:48)

4. Threat Modeling - Part 1 (00:25:01)

180 episodes

Artwork
iconShare
 
Manage episode 379667570 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

In this week's episode I step through what Threat Modeling is. And yes it a crucial aspect of cybersecurity that is often overlooked. Join us as we explain this concept by carefully examining its definition, and, more importantly, highlighting its effectiveness as a powerful tool in the ever-changing threat, defenses and mitigation.
But before that here are the topics of what is trending this week:

  • SMS is still with us despite its weaknesses
  • The push to catch up with DMARC

- https://blog.google: New Gmail protections for a safer, less spammy inbox
- https://blog.postmaster.yahooinc.com: More Secure, Less Spam: Enforcing Email Standards for a Better Experience
- https://owasp.org: Threat Modeling
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

Chapters

1. Intro (00:00:00)

2. SMS is still with us despite its weakness (00:01:18)

3. The push to catch up with DMARC (00:11:48)

4. Threat Modeling - Part 1 (00:25:01)

180 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide