Go offline with the Player FM app!
145 - Indication of compromise best practice
Manage episode 385516340 series 2872461
Enjoying the content? Let us know your feedback!
Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.
- NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
- The source of Okta breach....no price for guessing
- https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
Chapters
1. Intro (00:00:00)
2. NCSC quantum crypto guide (00:01:34)
3. The source of Okta breach (00:17:06)
4. IOC best practice (00:25:05)
197 episodes
Manage episode 385516340 series 2872461
Enjoying the content? Let us know your feedback!
Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.
- NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
- The source of Okta breach....no price for guessing
- https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.
Chapters
1. Intro (00:00:00)
2. NCSC quantum crypto guide (00:01:34)
3. The source of Okta breach (00:17:06)
4. IOC best practice (00:25:05)
197 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.