התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2
Manage episode 362942905 series 2872461
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
In the second part of the podcast, we'll delve further into the different types of email security protocols and explore how they can be implemented to enhance the security of your email communications. We'll discuss the benefits of end-to-end encryption, which ensures that only the intended recipient can access the content of your emails, as well as the importance of authentication mechanisms. We'll also explore the role of digital signatures in verifying the authenticity and integrity of email messages. By the end of this episode, you'll have a better understanding of how to protect your sensitive information from cyber threats and ensure the confidentiality of your email communications.
If you have not listen to episode 1, I suggest you listen to the first before you listen to this episode.
In addition, we will recap other trending security news including:
- Google rolls out passkey login for all accounts
- Mirai-iot-botnet is exploiting-tp-link-router you need to patch it now
- https://users.ece.cmu.edu: PGP intro
- https://www.cisco.com: S/MIME
- https://www.cisco.com: Registered envelope service
- https://security.googleblog.com: So long passwords thanks for all phish
- https://duo.com: Mirai botnet attackers exploit TP-Link bug
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
231 פרקים
Manage episode 362942905 series 2872461
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
In the second part of the podcast, we'll delve further into the different types of email security protocols and explore how they can be implemented to enhance the security of your email communications. We'll discuss the benefits of end-to-end encryption, which ensures that only the intended recipient can access the content of your emails, as well as the importance of authentication mechanisms. We'll also explore the role of digital signatures in verifying the authenticity and integrity of email messages. By the end of this episode, you'll have a better understanding of how to protect your sensitive information from cyber threats and ensure the confidentiality of your email communications.
If you have not listen to episode 1, I suggest you listen to the first before you listen to this episode.
In addition, we will recap other trending security news including:
- Google rolls out passkey login for all accounts
- Mirai-iot-botnet is exploiting-tp-link-router you need to patch it now
- https://users.ece.cmu.edu: PGP intro
- https://www.cisco.com: S/MIME
- https://www.cisco.com: Registered envelope service
- https://security.googleblog.com: So long passwords thanks for all phish
- https://duo.com: Mirai botnet attackers exploit TP-Link bug
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
231 פרקים
כל הפרקים
×
1 231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage 29:15



1 228 - How the Emergence of AI-Powered Malware works 26:19


1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28

1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29

1 224 - Cisco Talos Year 2024 In Review 34:38



1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41


1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58

1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53

1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05

1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22

1 210 - Adversarial Misuse of Generative AI 50:21


1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38

1 207 - Microsoft Windows Actively Exploited Vulnerabilities 37:47

1 206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations 32:56

1 205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity 28:48

1 204 - Recap of the best episodes of 2024 1:31:38

1 203 - Tips In Securing Your Organization - When the Security Team is Away 22:04


1 201 - Digital Breadcrumbs - Tracing the Hidden Trails for Evidence 30:20

1 200 - Incident Response Playbook- Turning Chaos into Control 34:09

1 199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023 35:37


1 197 - Advanced Malware evasion Techniques And Their Counter Measures 27:34

1 196 - What are Shared Fate Model and Trust Anchors? 28:46

1 195 - Top Common Password Attacks and How to Defend Against Them 38:15


1 193 - Microsoft Windows Architecture 39:38


1 191 - Is The Browser The New Operating System? 26:27


1 189 - The Risks of Rushing LLM Implementation and Sensitive Data Leakage on the Open Web 32:19


1 187 - File Integrity Monitoring or EDR? 29:34

1 186 - The New NIST Framework 2.0 35:54

1 185 - Cybersecurity Capability Maturity Model 33:03

1 184 - Why Hackers Target Stolen Credentials 37:23

1 183 - The Malware Information Sharing Platform 30:00

1 82 - Weighting The Risk Benefit Of Kernel Level Access By 3rd Party Apps 29:44


1 180 - Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 2 35:32

1 179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1 28:43

1 178 - Trusted Relationship Attacks 42:49

1 177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2 41:01

1 176 - The importance Of Automation And Orchestration In Cyber Security - Part 1 36:37

1 175 - The Dangers Of Remote Workers 47:38

1 174 - Digital Twin Technology And Its Application In Security 38:27

1 173 - SSL VPN versus IPsec VPN - Part 2 30:22

1 172 - SSL VPN versus IPsec VPN - Part 1 35:17




1 168 - Preparing for and responding to ransomeware attack - Part 2 33:31

1 167 - Preparing for and responding to ransomeware attack 34:53


1 165 - How AI is helping Incident Responders 35:02

1 164 - What Is Platform Approach To Security? - Part 2 32:41

1 163 - What Is Platform Approach To Security? - Part 1 34:41



1 160 - The Hidden Risks of Default Configurations - Part 2 45:21

1 159 - The Hidden Risks of Default Configurations - Part 1 37:19

1 158 - Is quantum computing a threat to cryptography, really? - Part 2 37:46

1 157 - Is quantum computing a threat to cryptography, really? - Part 1 39:54

1 156 - The risks of exposing Web UI 46:23

1 155 - iVanti's widespread exploitation 42:50



1 152 - Recap of most popular episodes of 2023 1:42:39

1 151 - Cyber Security Review Of 2023 47:38


1 149 - Be cyber vigilant this holiday 45:54


1 147 - Web shells - Understanding Their Role in Cyber Attacks 41:02

1 146 - Symbolic Language in cyber security 35:30

1 145 - Indication of compromise best practice 51:13

1 144 - The New Common Vulnerability Scoring System 44:37

1 143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco 29:45

1 142 - Discussion With Eric Vedel Directory CISO Advisory at Cisco 31:13



1 139 - Initial Access - When the Rubber Hits the Road During the Attack Phases - Part 2 42:00

1 138 - Initial Access - When the Rubber Hits the Road During the Attack Phases 46:11

1 137 - Introduction to Cybersecurity - Part 2 40:38

1 136 - Introduction to Cybersecurity - Part 1 37:38

1 135 - Cybersecurity's Key - Choosing the Right Tools 36:41

1 134 - How does Generative AI help in Cybersecurity 40:34

1 133- Interview with Cohaesus Group - Part 2 24:21

1 132 - Interview with Cohaesus Group - Part 1 23:30

1 131 - How do ransomeware rollback features actually work? 54:39

1 130 - What is the difference between Incidence Response and Threat Hunting? 39:13

1 129 - What is new in PCI DSS v4.0? 40:01

1 128 - How to Achieve Cyber Resilience - Best Practices for Effective Incident Response - Part 2 44:48

1 127 - How to Achieve Cyber Resilience: Best Practices for Effective Incident Response - Part 1 47:47

1 126 - Unmasking cyber threats - The power of cyber threat intel 50:15

1 125 - Verizon Data breach Investigation Report - Key Takeaways 32:29

1 124 - Comparing data lake and data warehouse 47:33

1 123-Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 2 47:40

1 122 - Inside the Cyber Underworld - How Cybercriminals Join Forces for Profit - Part 1 53:57

1 121 - The MITRE ATT&CK Navigator 34:20

1 120 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 2 36:47

1 119 - Demystifying Digital Certificates- Shedding Light on an Obscure yet Crucial Aspect of Online Security - Part 1 42:09

1 118 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 2 44:16

1 117 - Sealed and delivered - Understanding How Email Protocols Keep You Secure - Part 1 53:27

1 116 - Classified Chaos - The Persistent Threat of Data Leaks - Part 2 37:10

1 115 - Classified Chaos: The Persistent Threat of Data Leaks - Part 1 41:21

1 114 - Ensuring Business Continuity Through Strong Security Measures 45:26

1 113 - Navigating Cloud Security: A Look at Public, Hybrid, and Private Cloud 42:53



1 110 - Know Your Enemy: Why Threat Intelligence Matters 37:08

1 109 - Finding malware in encrypted traffic 1:00:00

1 108 - Securing your home network 46:50

1 107 - Understanding CVSS Scoring System 42:19

1 106 - Optimise your last line of defense 54:25

1 105 - Be prepared for the next password manager breach 38:09

1 104 - What is NetFlow Protocol used for? - Part 2 41:30

1 103 - What is NetFlow Protocol used for? - Part 1 32:28




1 99 - Revisiting the impactful major 2022 cybersecurity events 24:59


1 97 - Privilege Escalation 101 and how to mitigate it 51:08

1 96 - Are containers more secure? 52:05

1 95 - Benefits of RestAPI and why should you care? 42:10


1 93 - Why companies are breached even when they have MFA on? 44:10

1 92 - How to start your cyber security career? 33:33

1 91 - Continuous security validation 37:37

1 90 - Where do you start with Zero Trust? 53:32


1 88 - Insider treat, the danger within - Part 2 25:32

1 87 - Insider treat, the danger within - Part 1 29:02

1 86 - SIEM versus XDR - Who is the winner? 35:47

1 85 - Turning your network into a sensor 34:14

1 84 - Post-Exploitation used by cyber criminals - Part 2 33:08

1 83 - Post-Exploitation used by cyber criminals - Part 1 32:20

1 82 - Consultant and contractor control 33:39

1 81 - Critical! Know where you passwords are! 47:55

1 80 - How machine learning helps the cybersecurity industry - Part 2 37:23

1 79 - How machine learning helps the cybersecurity industry - Part 1 36:59


1 77 - Tools and methodologies to apply to your defense strategy 42:55

1 76 - NIST’s Quantum-Resistant Algorithms 25:44

1 75 - Solution Approach to Security 42:05



1 72 - Beating cyber threats with an efficient security team 41:36



1 69 - Key takeways in Verison 2022's Data Breach Investigations Report 38:06

1 68 - How to keep your email safe from prying eyes? 28:36

1 67 - Reducing your attack surface 37:41


1 65 - Top software errors leading to vulnerabilities 35:33

1 64 - What are the different types of vulnerabilities? 38:10

1 63 - How can everyday person protect themself from cyber attack? 41:21

1 62 - Digital Forensics 101 - Part 2 55:53

1 61 - Digital Forensics 101 - Part 1 32:20






1 55 -Lessons from the Irish Health Services Executive Hack - Part 2 33:56

1 54 - Lessons from the Irish Health Services Executive Hack - Part 1 28:38

1 53 - Common Vulnerability Scoring System (CVSS) 32:38

1 52 - Linux Malware Increased in 2021 36:05







1 45 - Critical Vulnerability in Apache Log4j 27:18




1 41 - Endpoint security and the shift to remote work 46:32

1 40 - NIST Cybersecurity Framework 27:18

1 39 - What 80M Ransomware Analysis Revealed 17:27

1 38 - Modern Vulnerability Management 26:14



1 35 - It Is Cyber Security Month! 25:51

1 34 - Office 365 Email Security - A Talk with ISGM 44:39

1 33 - Modern Security Operation Center - Part 2 28:19

1 32 - Modern Security Operation Center - Part 1 20:49


1 30 - MITRE Engenuity ATT&CK Evaluation 18:57

1 29 - Apple’s CSAM Detection System 30:23


1 27 - Interview With Information Security Media Group 44:13


1 25 - Intrusion Analysis - Part 2 26:19

1 24 - Intrusion Analysis - Part 1 26:40


1 22 - Is Internal Email Scan Necessary? 27:56

1 21 - Secure Access Service Edge (SASE) 25:42





1 16 - The Ransomware Task Force Recommendations 28:40




1 12 - The Changing Face Of Ransomware 26:59

1 10 - SMTP Authentication Protocols 23:11







1 02. Your Adversary Is In, Now What? 14:08

ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.