Artwork

Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

145 - Indication of compromise best practice

51:13
 
Share
 

Manage episode 385516340 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Enjoying the content? Let us know your feedback!

Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.

  • NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
  • The source of Okta breach....no price for guessing

- https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

Chapters

1. Intro (00:00:00)

2. NCSC quantum crypto guide (00:01:34)

3. The source of Okta breach (00:17:06)

4. IOC best practice (00:25:05)

197 episodes

Artwork
iconShare
 
Manage episode 385516340 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Enjoying the content? Let us know your feedback!

Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.

  • NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
  • The source of Okta breach....no price for guessing

- https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

Chapters

1. Intro (00:00:00)

2. NCSC quantum crypto guide (00:01:34)

3. The source of Okta breach (00:17:06)

4. IOC best practice (00:25:05)

197 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide