התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 Inside Deloitte Ventures: Strategic Corporate VC Insights on Scaling Startups and Vertical AI Trends 34:07
171 - Remote Browser Isolation
Manage episode 418004214 series 2872461
Enjoying the content? Let us know your feedback!
In this week's episode, we will be exploring the fascinating world of remote browser isolation technology or RBI as it appreciated. We will delve into what remote browser isolation is, how it works, and the limitations it faces. Join us as we uncover the complexities of this innovative cybersecurity approach, shedding light on its benefits and challenges. Whether you are new to the concept or a seasoned professional, there is something here for everyone.
Having said that and before we get into RBI, lets turn to a couple of top trending news this week and they are:
- Dell data breach, 49 million customer records stolen
- https://techcrunch.com: Threat Actor Scraped- 49M Dell customer Addresses Before The Company Found Out
- https://www.w3.org: Introduction to DOM
- https://en.wikipedia.org: Browser Isolation
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
231 פרקים
Manage episode 418004214 series 2872461
Enjoying the content? Let us know your feedback!
In this week's episode, we will be exploring the fascinating world of remote browser isolation technology or RBI as it appreciated. We will delve into what remote browser isolation is, how it works, and the limitations it faces. Join us as we uncover the complexities of this innovative cybersecurity approach, shedding light on its benefits and challenges. Whether you are new to the concept or a seasoned professional, there is something here for everyone.
Having said that and before we get into RBI, lets turn to a couple of top trending news this week and they are:
- Dell data breach, 49 million customer records stolen
- https://techcrunch.com: Threat Actor Scraped- 49M Dell customer Addresses Before The Company Found Out
- https://www.w3.org: Introduction to DOM
- https://en.wikipedia.org: Browser Isolation
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
231 פרקים
כל הפרקים
×
1 231 - A Crash Course in Vendor Risk, Lessons from the CrowdStrike Outage 29:15



1 228 - How the Emergence of AI-Powered Malware works 26:19


1 226 - Inside A Stealthy Malware Powering Modern Cyber Attacks 47:28

1 225 - What Is a Content Delivery Network—And Do They Really Protect Businesses? 24:29

1 224 - Cisco Talos Year 2024 In Review 34:38



1 221 - FBI’s 2024 Annual Internet Crime Report 32:16

1 220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces 32:41


1 218 - Fast Flux-The Cybercriminal's Hide and Seek 26:49

1 217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2 28:32

1 216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1 32:15

1 215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks 37:04

1 214 - What are polyglot files and how bad are they? 31:58

1 213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them 50:53

1 212 - Behind the login Screen - Understanding OS Authentication - Part 2 49:05

1 211 - Behind the login Screen: Understanding OS Authentication - Part 2 35:22

1 210 - Adversarial Misuse of Generative AI 50:21


1 208 - Lets Encrypt on shortening certification lifetime to just 6 days! 32:38

1 207 - Microsoft Windows Actively Exploited Vulnerabilities 37:47

1 206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations 32:56

1 205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity 28:48

1 204 - Recap of the best episodes of 2024 1:31:38

1 203 - Tips In Securing Your Organization - When the Security Team is Away 22:04


1 201 - Digital Breadcrumbs - Tracing the Hidden Trails for Evidence 30:20

1 200 - Incident Response Playbook- Turning Chaos into Control 34:09

1 199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023 35:37


1 197 - Advanced Malware evasion Techniques And Their Counter Measures 27:34

1 196 - What are Shared Fate Model and Trust Anchors? 28:46

1 195 - Top Common Password Attacks and How to Defend Against Them 38:15


1 193 - Microsoft Windows Architecture 39:38


1 191 - Is The Browser The New Operating System? 26:27


1 189 - The Risks of Rushing LLM Implementation and Sensitive Data Leakage on the Open Web 32:19


1 187 - File Integrity Monitoring or EDR? 29:34




1 168 - Preparing for and responding to ransomeware attack - Part 2 33:31

1 167 - Preparing for and responding to ransomeware attack 34:53


1 165 - How AI is helping Incident Responders 35:02

1 164 - What Is Platform Approach To Security? - Part 2 32:41

1 163 - What Is Platform Approach To Security? - Part 1 34:41



1 160 - The Hidden Risks of Default Configurations - Part 2 45:21

1 159 - The Hidden Risks of Default Configurations - Part 1 37:19

1 158 - Is quantum computing a threat to cryptography, really? - Part 2 37:46

1 157 - Is quantum computing a threat to cryptography, really? - Part 1 39:54

1 186 - The New NIST Framework 2.0 35:54

1 185 - Cybersecurity Capability Maturity Model 33:03

1 184 - Why Hackers Target Stolen Credentials 37:23

1 183 - The Malware Information Sharing Platform 30:00

1 82 - Weighting The Risk Benefit Of Kernel Level Access By 3rd Party Apps 29:44


1 180 - Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 2 35:32

1 179 -Unmasking Data Breaches - Understanding the Surge and Examining Recent Major Incidents - Part 1 28:43

1 178 - Trusted Relationship Attacks 42:49

1 177 - The Importance Of Automation And Orchestration In Cyber Security - Part 2 41:01

1 176 - The importance Of Automation And Orchestration In Cyber Security - Part 1 36:37

1 175 - The Dangers Of Remote Workers 47:38

1 174 - Digital Twin Technology And Its Application In Security 38:27

1 173 - SSL VPN versus IPsec VPN - Part 2 30:22

1 172 - SSL VPN versus IPsec VPN - Part 1 35:17

1 156 - The risks of exposing Web UI 46:23

1 155 - iVanti's widespread exploitation 42:50



1 152 - Recap of most popular episodes of 2023 1:42:39

1 151 - Cyber Security Review Of 2023 47:38


1 149 - Be cyber vigilant this holiday 45:54


1 147 - Web shells - Understanding Their Role in Cyber Attacks 41:02

1 146 - Symbolic Language in cyber security 35:30

1 145 - Indication of compromise best practice 51:13

1 144 - The New Common Vulnerability Scoring System 44:37

1 143 - Smart Homes - Discussion with Floris Grandvarlet EMEA Innovation and Sustainability CTO at Cisco 29:45

1 142 - Discussion With Eric Vedel Directory CISO Advisory at Cisco 31:13
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.