Artwork

Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

177 - The importance Of Automation And Orchestration In Cyber Security - Part 2

41:01
 
Share
 

Manage episode 425035379 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

This week's episode will continue with part 2 of "The Importance of Automation and Orchestration in Cyber Security."
As I said in the episode one, the need for efficient and effective security measures has never been more critical.
I suggest you listen to E1, before you dive into this one.
Without further ado, lets first get what is trending this week in term of news and updates.

  • Hundreds of personal computer as well as Server Models could be Affected by a serious UEFI Vulnerability

- https://eclypsium.com: UEFICanHazBufferOverflow Widespread Impact From Vulnerability In Popular PC And Server Firmware
- https://eclypsium.com: How Eclypsium Automates Binary Analysis At Scale
- https://en.wikipedia.org: Orchestration (computing)

Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

178 episodes

Artwork
iconShare
 
Manage episode 425035379 series 2872461
Content provided by YusufOnSecurity.Com. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by YusufOnSecurity.Com or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We love to hear from you!

This week's episode will continue with part 2 of "The Importance of Automation and Orchestration in Cyber Security."
As I said in the episode one, the need for efficient and effective security measures has never been more critical.
I suggest you listen to E1, before you dive into this one.
Without further ado, lets first get what is trending this week in term of news and updates.

  • Hundreds of personal computer as well as Server Models could be Affected by a serious UEFI Vulnerability

- https://eclypsium.com: UEFICanHazBufferOverflow Widespread Impact From Vulnerability In Popular PC And Server Firmware
- https://eclypsium.com: How Eclypsium Automates Binary Analysis At Scale
- https://en.wikipedia.org: Orchestration (computing)

Be sure to subscribe!
If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.com
You will find a list of all previous episodes in there too.

  continue reading

178 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide