The place to learn all about the cybersecurity from basics to advance topics . Every week, you will get a view of whats happening in the cyber verse. We will cover Cybersecurity, Cloud, Artificial intelligence, threats, breaches emerging technologies and novel ideas. Learn more with us. Stay Tuned!PS: The view are mine and not my employers.https://twitter.com/prashant_cyber
Send us a textAnkur Shah, co-founder and CEO of Straiker, shares his career journey, highlighting his experience in various tech sectors before focusing on the current AI landscape. Together, we discussed the impact of AI on building applications and the resulting *cybersecurity challenges , including AI as a potential threat vector and the unique security needs of the evolving AI supply chain. The conversation also touches on emerging security solutions and offers advice for individuals interested in learning about this rapidly changing field, emphasising practical building and experimentation.#aisecurity #aicybersecurity Main Themes and Important Ideas:- AI as a Transformative Mega-Trend- AI's Dual Impact on Cyber Security- Securing AI Systems- The Unique Security Challenges of AI-Enabled Applications- New AI Supply Chain- Developing AI Security Solutions- Emerging AI Security Categories- Recommendations for Enterprises and IndividualsSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a text#aicybersecurity #aicybersecurity Today's episode introduces the landscape of securing AI, beginning with how AI is utilized in cybersecurity and the increasing accessibility of AI infrastructure through major cloud providers. It outlines common applications of generative AI and large language models across various industries. The core of the discussion then shifts to the potential threats within the AI infrastructure itself, breaking down vulnerabilities across components like core infrastructure, AI models, data, plugins, and AI agents. The episode details specific attack vectors for each of these areas, emphasizing the expanded attack surface presented by interconnected AI systems. Drawing upon resources like OWASP and vendor documentation, the podcast provides an overview of emerging security concerns in the rapidly evolving field of AI. The episode concludes by outlining the intention to further explore these threats and potential solutions in future discussions with industry experts.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a textGet up to speed with everything that mattered in cybersecurity this month. In this episode of The Cyberman Show, we break down March 2025's top cyber incidents, threat actor tactics, security product launches, and vulnerabilities actively exploited in the wild.Here's what we cover:
Send us a textIn this week's episode, we explore the exciting evolution of Security Information and Event Management (SIEM)—the Next-Generation SIEM (NGSIEM). Traditional SIEM solutions have long been crucial for cybersecurity, but they're facing significant challenges with modern infrastructures. Discover how NGSIEM tackles these limitations through advanced AI analytics, machine learning, cloud-native deployment, enhanced data parsing, and powerful automation capabilities. Don't miss this deep dive into how AI and Generative AI are transforming incident response, threat hunting, and cybersecurity collaboration for good!
Send us a textThe cybersecurity landscape is shifting fast, and platform consolidation is becoming the go-to strategy for enterprises looking to simplify security operations. In this episode, we dive deep into cybersecurity platforms, what do they mean, the areas where consolidation is happening, analyst view and much more.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a textThis episode focuses on Secure enterprise Browser. We coverWhat is SEB, Gartners View, Market Growth, Key Features and Benefits of Enterprise Browsers and Extensions, How it Works, Typical component in SEB Products, Usecases, What happens to existing default browsers, How is it related to SSE etcSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a textHighlight of 2024 that should not be missed including Cybersecurity Incidents, Interesting Mergers and acquisitions and emerging technology.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.In todays, episode, we will explore how the AI architecture looks like, understand these components, and threats that exist at each layer.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today's cybersecurity podcast report contains activity in cybersecurity industry including: IntroductionWhere is the money goingCybersecurity IncidentsInteresting TTPs2024 Gartner MQ for Single Vendor SASEVulnerabilities Worth NotingSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.In todays, episode I have collated how AI based cybersecurity industry is growing. This includes use of AI to improve existing products or creating new products that solve existing issues. Watch the show for details.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Dive into the latest insights from Gartner's Single Vendor SASE Report for 2024 in this episode of The Cyberman show . We break down the key findings and trends shaping the Secure Access Service Edge (SASE) landscape, focusing on single-vendor solutions and their impact on cybersecurity. Whether you're a security professional, IT leader, or tech enthusiast, this episode provides actionable intelligence on how single-vendor SASE solutions are evolving and what it means for your organization's security posture. Tune in to stay ahead in the rapidly changing world of cybersecurity.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Join us in this insightful episode as we delve into the world of Network Detection and Response (NDR). Discover how NDR enhances your network security by detecting threats in real-time, providing deep visibility into network activities, and enabling rapid incident response.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.The recap contains activity in cybersecurity industry including- Mergers and Acquisitions- Breaches from various industries like healthcare, media, IT, Retail etc- Interesting reports and articles that I recommend for reading.- Gartner MQ for SIEM for 2024Link to the blog that has linkshttps://thecyberman.substack.com/Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Todays episode contains basics of API Security. The podcast covers the following topics:00:00 Introduction00:51 What is API?04:53 Common Terms Associated with API09:23 API Landscape10:58 What is API Security?12:32 API Security Risks15:02 OWASP Top 10 for API Security15:39 API Attack Workflow18:29 Story of Real API related Security Incident19:17 API Security Best Practises20:21 API Security Market Landscape24:41 Appsec vs API SecurityLink to my blog on "API Security Checklist" https://thecyberman.substack.com/p/api-security-checklistSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Welcome to AI-Cyberwatch, your monthly deep dive into the cutting-edge intersection of AI and cybersecurity! Discover how AI is reshaping the cyber landscape, from the innovative tools empowering industries to the cunning tactics employed by adversaries. Join us as we unveil a new framework designed to keep you informed and ahead of the curve. Whether you're a seasoned professional or just starting your cybersecurity journey, AI-Cyberwatch is your go-to source for staying updated and engaged. Tune in now and be part of the revolution!Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Notes from RedCanarys' annual threat report includingKey trends, top 10 threats, and the most prevalent adversary techniques. Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Full recap of April 2024 including key cyber Incidents, cybersecurity events in AI related tech, regulations,Nation State involvement in cyber attacks, Funding and acquisitions, software vulnerabilities worth the mention, New TTPs etcSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShowTwitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Discover the power of secure enterprise browsers to protect your business data. This latest podcast explains how these browsers enhance cybersecurity, ensuring safe internet usage Don't miss out on expert tips on Instagram also.https://www.instagram.com/thecybermanshow/! Subscribe for more cybersecurity insights. #CyberSecuritySupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Its important to learn how threat actors are making moves and how they are evolving. Todays episode contains my notes from the Recorded Future's Annual Report 2023 on threat intelligence.#cybersecuritySupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Full recap of March including key cyber Incidents, cybersecurity events in AI related tech, regulations,Nation State involvement in cyber attacks,software vulnerabilities worth the mention, New TTPs etcSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Lessons from recent report from Palo Alto Unit52 Incident Response Report threat actors, intial access methods, impact, target industries, use of AI and recommendations etc. Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Notes from State of AI in Cloud Report and what cybersecurity professionals should do about it? EP75Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.How to get start with security basics for IaaS, PaaS or SaaS platforms. We start with cloud types , native controls, advance controls, compliance etc,Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today we learn what autonomous SOC is, what are the key capabilities it has, how large vendors are building the autonomous SOC Capabilities and my personal views on this tech.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.today, I share what I learnt from the recent report that I read from Reversing labs on software supply chain security. Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message. Let's learn about Cloud Detection and response technology today and how it can be used by Digital native/ Cloud first organisations for security monitoring. We cover the need for it, how its different from SIEM, Its capabilities, whos talking about it and how to learn it.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Become a cloud security architect by following this 3 level roadmap on the cyberman show.Link to shared drive with podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko?usp=drive_linkSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Lets recap the key events that happened in 2023 that are shaping the future of cybersecurity industry. I have covered Emerging product categories, acquisitions, Top 10 vulnerabilities, Incidents, Interesting publications and how much returns were given by publicly traded cybersecurity companies in stock marketsSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.I recently read the The Forrester Wave SSPM Report for Q4 2023. This episode summarizes the key points from the report and my personal views on the report.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Learn about ASPM Application Security Posture Management(ASPM) in todays podcast. You will learn about the need for aspm tech, how it works, key features, integration approach and benefits.Here is the link of the mindmap PDF from the episode.https://drive.google.com/file/d/128Y3HLe7_FwMoKaY1Nl3C2eOz69eTOkm/view?usp=sharingSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Learn about key security incidents, Vulnerabilities, acquisitions, cybersecurity recommendations and reports from all over the globe in Nov 2023.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.What is NIS2 Directive in Europe? How is it related to cybersecurity? Which sectors does it impact? What can organizations and individual do with this directive?Learn all that with data security, privacy and compliance Guru Vishwameet Chawla.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Over the weekend, I went through this report from Palo Alto with data from over 2500 respondents. Lets discuss key points from the report on application security, cloud security, challenges, recommendations etcSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today, lets learn about Endpoint Security Landscape, EPP and EDR including history, TAM, Usecases, How it works etc. Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today, let's do a recap of key events in cyber security including acquisitions, Security incident, breaches, ransomware, Exploit selling platforms, New Threat Report, security advisories etc.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today, we review the recent Attack surface management report from Palo Alto and key findings from it.I recommend everyone to go through the report for details.https://unit42.paloaltonetworks.com/unit-42-2023-attack-surface-threat-report/Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Lets learn about SOAR today, how its used, how it works, key trends etcSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Analyst predict that by 2028, over 80% apps in the enterprise will be SaaS apps. This will lead to increased attack surface making SSPM a key technology for cybersecurity teams to adapt. Let's learn about SaaS Security posture management(SSPM) today.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today we review the recent the first ever single vendor SASE report Released by Gartner. You will learn about the key criteria for evalution, who made it to the list, key points from the report and my personal take aways.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Lets learn about Data Security Posture Management(#DSPM) technology today. this is evolving tech in 2023 and I expect more adoption of this technology as we adopt to more cloud based apps that exchange data with other apps.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today we will learn about a new Fraud Campaign thats targeting Users in Mexico, a Phishing Service toolkit that's getting popular, a new attack on Kubernetes clusters, an AI based tool that is 93% accurate, Two Acquisitions in cybersecurity and a new regulation that impacts all the publicly listed companies in USASupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today, we will learn about Attack Surface management or #ASM. We will start with the definition of ASM, why is it needed, Types of #ASM. How it EASM Works, discuss adjacent domains like #digital risk protection or #DRP #threatintelligence, how platform is used etc. Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today i had the opportunity to speak with Jeevan Singh on Appsec. Jeevan is the Head of Product Security @twillio. We discussed, basics of appsec, threat modelling, implementing appsec for digital first businesses, scaling appsec, AppDoS, how beginners can learn AppSec and how AI will impact appsec. Listen to him on the latest episode of cybermanshow Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today I Will talk about technology from an entirely different perspective. The perspective of wealth creation from technology. Creating wealth from our understanding of this entire sector.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.lets learn about #ITDR or #Identity Threat Detection and Response today. You will learn about definition, key capabilities, need for ITDR, Vendor Landscape and How is ITDR different from EDR and XDR and more ?#cybersecurity #threats #SOC #IAMSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.In Today's episode we learn about MOVEit Vulnerability Updates, two breaches, Androd Spyware with 1.5Mn Downloads, Software Supply Chain attack, a new threat report focused on Healthcare Sector etc. #cybersecurity #ransomware #vulnerabilityENISA Healthcare Threat Report: https://www.enisa.europa.eu/publications/health-threat-landscapeSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.In todays episode, I discuss key findings from Verizon DBIR:83% of breaches involved external actors—with the majority being financially motivated.74% of breaches involved the human element, which includes social engineering attacks, errors or misuse.50% of all social engineering attacks are pretexting incidents—nearly double last year's total.Link to Original Report from Verizon: https://www.verizon.com/business/resources/reports/dbir/Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Today, lets learn about XDR. I talk about history of XDR and relevant tech, how companies are talking about it, how to compare it understand it better.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.This week, you can learn about nation state attacks, Cyber espionage, Mobile phone specific spyware, Cloud security vulnerability in GCP, Software supply chain attacks.Support the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.Cloud security is a big topic, and there's a lot of advice out there. In this episode of The Cyberman Show Ashish Rajan from the Cloud Security Podcast joins me to discuss getting started with cloud security. We spoke about #cloud, #cloudsecurity and #appsec basics, cloud sec learning path for kids getting out of school/college, trends in cloud sec, Impact of AI, books we reading, a new restaurant he tried and more.If you're interested in learning more about Cloud Security, then be sure to listen to this episode! It's a great way to start your journey into the world of cloud security.Here is the link to Cloud Security Podcast https://www.youtube.com/@CloudSecurityPodcasthttps://open.spotify.com/show/6LZgeh4GecRYPc0WrwMB4ISupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.
Send us a Text Message.This week we talk about interesting usecases using AI, How AI Supply Chain is shaping up, Approach to learn AI including tons of links as listed below.Live document containing all the links https://medium.com/@thecyberman/curated-list-of-ai-content-for-first-timers-419afce834ecI could not publish links here because of. character limitationsSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and dont reflect any views from my employer.