Artwork

Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

176 - The importance Of Automation And Orchestration In Cyber Security - Part 1

36:37
 
Share
 

Manage episode 424385740 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

In this week's episode of the podcast we dissect "The Importance of Automation and Orchestration in Cyber Security."
As you are well aware cyber threats are becoming increasingly sophisticated and frequent.
The need for efficient and effective security measures has never been more critical. Equally, automation and orchestration have never more important for organizations to defend themselves and to streamlining processes, reducing response times, and enhancing overall security posture.
In my view this is an important way of tipping the balance in favor of the defenders.
Having said that and before we get into the main topic, lets touch a trending piece of news this week. And that is:

  • Phishing Email Abuses Windows Search Protocol

- https://www.trustwave.com: Search Spoof Abuse O Windows Search T Redirect To Malware
- https://learn.microsoft.com: Using the search Protocol
- https://benjamin-altpeter.de: An Analysis of the State of Electron Security in the Wild
- https://en.wikipedia.org: Orchestration (computing)

Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

178 episodes

Artwork
iconShare
 
Manage episode 424385740 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

In this week's episode of the podcast we dissect "The Importance of Automation and Orchestration in Cyber Security."
As you are well aware cyber threats are becoming increasingly sophisticated and frequent.
The need for efficient and effective security measures has never been more critical. Equally, automation and orchestration have never more important for organizations to defend themselves and to streamlining processes, reducing response times, and enhancing overall security posture.
In my view this is an important way of tipping the balance in favor of the defenders.
Having said that and before we get into the main topic, lets touch a trending piece of news this week. And that is:

  • Phishing Email Abuses Windows Search Protocol

- https://www.trustwave.com: Search Spoof Abuse O Windows Search T Redirect To Malware
- https://learn.microsoft.com: Using the search Protocol
- https://benjamin-altpeter.de: An Analysis of the State of Electron Security in the Wild
- https://en.wikipedia.org: Orchestration (computing)

Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

178 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide