YusufOnSecurity.com
Skupno trajanje:
20 h 03 min
253 - Shadow IT and SaaS Sprawl - The Hidden Security Risk in Your Organization
YusufOnSecurity.com
14:01
252 - Windows password security - What is under the hood?
YusufOnSecurity.com
32:43
251 - The Future of Security Operations- Are SIEM, XDR, and SOAR Converging or Moving Apart?
YusufOnSecurity.com
22:24
250 - PenTesting vs Red Teaming vs Vulnerability Assessment-Which One Do You Need?
YusufOnSecurity.com
20:45
249 - What Is Credential Stuffing? How Hackers Use Your Old Passwords Against You
YusufOnSecurity.com
30:01
248 - The Truth About Security Awareness Training- Why 95% of Programs Don't Work
YusufOnSecurity.com
29:11
247 - AI-Powered Browsers-The Privacy and Security Risks No One Talks About
YusufOnSecurity.com
23:48
246 - Is AI-Generated Code Safe-The Hidden Dangers of Vibe Coding
YusufOnSecurity.com
21:32
245 - 50 Documents Can Poison AI Models - CISA KEV Adds 12 Decade-Old Vulnerabilities and Salesforce Ransomware
YusufOnSecurity.com
30:38
244 - The Recent Cyberattacks on European Airports - A Wake-Up Call for Critical Infrastructure
YusufOnSecurity.com
43:18
243 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 2
YusufOnSecurity.com
28:38
242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1
YusufOnSecurity.com
23:11
241 - AI vs. Cybersecurity-How LLMs Are Reshaping the Defender-Attacker Battle
YusufOnSecurity.com
55:17
240 - The Great OAuth Heist: How Salesloft's Breach Exposed Major Cybersecurity Firms
YusufOnSecurity.com
37:25
239 - Volt Typhoon Report-How Critical Infrastructure Was Targeted and Compromised
YusufOnSecurity.com
25:38
238 - Patchwork and Transparency -Microsoft’s August Security Updates & Google's Project Zero Redefined
YusufOnSecurity.com
15:21
237 - Generative AI Security-How Companies Protect Against Attacks and Data Risks
YusufOnSecurity.com
22:35
236 - The Hidden Danger in Your Cloud-Why Misconfiguration Is the Real Vulnerability
YusufOnSecurity.com
30:31
235 - The Microsoft SharePoint vulnerability
YusufOnSecurity.com
27:51
234 - Protecting the Invisible-How to Secure Infrastructure without Agents
YusufOnSecurity.com
27:49
233 - CI-CD Pipelines and Associated Security Risks
YusufOnSecurity.com
27:33
232 - Catching up with security
YusufOnSecurity.com
32:29
231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage
YusufOnSecurity.com
29:15
230 - Security Of iOT
YusufOnSecurity.com
37:45
229 - What is FIPS 140-3
YusufOnSecurity.com
22:55
228 - How the Emergence of AI-Powered Malware works
YusufOnSecurity.com
26:19
227 - Is UTM Still Relevant?
YusufOnSecurity.com
44:36
226 - Inside A Stealthy Malware Powering Modern Cyber Attacks
YusufOnSecurity.com
47:28
225 - What Is a Content Delivery Network—And Do They Really Protect Businesses?
YusufOnSecurity.com
24:29
224 - Cisco Talos Year 2024 In Review
YusufOnSecurity.com
34:38
223 - RSAC 2025 - Part 2
YusufOnSecurity.com
21:55
222 - RSAC 2025 - Part 1
YusufOnSecurity.com
35:54
221 - FBI’s 2024 Annual Internet Crime Report
YusufOnSecurity.com
32:16
220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces
YusufOnSecurity.com
32:41
219 - What Is Agentic AI?
YusufOnSecurity.com
33:36
218 - Fast Flux-The Cybercriminal's Hide and Seek
YusufOnSecurity.com
26:49
217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2
YusufOnSecurity.com
28:32
216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1
YusufOnSecurity.com
32:15
215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks
YusufOnSecurity.com
37:04
214 - What are polyglot files and how bad are they?
YusufOnSecurity.com
31:58