Cover art for podcast Future of Cyber Security

Future of Cyber Security

37 EpisodesProduced by Rasool IrfanWebsite

Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit and tweet @ →

37 Episodes | 2019 - 2021

Episode 37 - Manage effective Container/ K8 Security Assessments

June 23rd, 2021


Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Get ready to compose security assessment on their containers comprising 4C’s (Code, Container, Cluster and Cloud Infra). …

Episode 36 - Vulnerability Management Maturity Assessment Program

April 4th, 2021


Ensuring that existing vulnerability management program works well to enhance the operational maturity require assessment. Leverage external …

Episode 35 - Threat Hunting Capability Development Framework

January 30th, 2021


With increased adoption to digital by business and technology advancements consumed by bad actors makes threat hunting a ‘must to have’ program. …

Episode 34 - Cyber security table top exercise (TTX)

January 23rd, 2021


Organizational business continuity program should mandate CISO or CIO to have TTX periodically to rehearse the cyber security incident response …

Episode 33 - Microsoft Endpoint DLP use cases

November 15th, 2020


Microsoft Endpoint DLP helps organizations to adopt data protection strategies with most common use cases such as protecting sensitive data based on …

Episode 32 - Azure Information Protection - Getting Started and Best Practices

October 26th, 2020


Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions. Microsoft Azure …

Episode 31 - Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk

October 19th, 2020


Cloud business leaders prefers multi cloud deployment strategies either within the region or across regions to have cost effective solution. IT …

Episode 30 - Microsoft E5 can replace 16 Security vendors

September 28th, 2020


Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendors. However, if customer’s have unique requirements that are achievable only …

Episode 29 - Simplify network security with SASE

September 21st, 2020


SASE (Security access service edge) concept is to have all the functional components of network and security required for enterprise available on cloud based services that are globally accessible for the digital business

Episode 28 - People is the most critical vulnerability in any organization

July 24th, 2020


Every organization will have opportunity to learn from their security incidents. While performing root cause analysis, often organization fail to analyze deeper to figure-out the human element associated with it. 

--- …

Episode 27 - Five ideas to enhance the cyber immune system

July 22nd, 2020


IT security leaders are looking for cost effective security programs that enhance their cyber security immune systems. Listen to this podcast to learn those five key ideas. 

--- This episode is sponsored by · …

Episode 26 - CISO should redefine corporate security strategy

June 29th, 2020


Cyber risk is business risk – CISO representation at board level is important to provide business solutions. Hence in the year 2020 – CISO’s should …

Episode 25 - Social media addiction is injurious to mental health

May 17th, 2020


Increased adoption of digital make all generations to prey to social media platforms. With increase fake news or misinformation and lack of knowledge …

Episode 24 - Develop self defensing capabilities in applications

May 10th, 2020


In mobile first market, organizations need to develop mobile applications that has self defensing capabilities. As the in-app protection technologies …

Episode 23 - Protection from Maze Ransomware

May 4th, 2020


Maze is a file encrypting virus and also a successor to ChaCha. Organizations need to have protection strategies from being victim of similar cyber attacks. Listen to this podcast for more details

--- This episode is …

Episode 22 - Recommendations to adopt Zero Trust principles

April 28th, 2020


Organizations need to define zero trust strategy to enforce the security controls across the ‘defense in depth’ layers. Security in continuous …

Episode 21 - India - The personal data protection bill, 2019

April 20th, 2020


The Personal data protection bill, 2019 mandates to implement cyber security controls such as de-identification, encryption, protect integrity, …

Episode 20 - Cyber security leaders need fraud prevention to protect their digital business

April 13th, 2020


In this digital economy, online fraud detection systems are a necessary component in any security architecture and augment the basic application protection capabilities offered by a web application firewall and identity …

Episode 19 - Digital business require ‘tailored’ security services

April 7th, 2020


Every business is unique in its own way and adopting cyber security services that are ‘tailor-made’ with two-way communications will help address risks and challenges to safe-guard from data breaches.

--- This …

Episode 18 - Understand the MSSP (Managed Security Service Provider) services better

March 31st, 2020


Enterprise prefer to outsource their IT security and believes that its cyber security operations are managed well. But - how well you understood their service descriptions. Listen to this episode to learn certain basic …

Episode 17 - Enterprise can't protect threats, if they don't see it.

February 7th, 2020


Data residency, compliance issues, and the need for visibility and monitoring of data continue to drive organizations to adopt data loss prevention capabilities. Enterprise can't protect threats, if they don't see it. …

Episode 16 - How to bring 'WOW' factor in SOC visits

December 7th, 2019


Experience is all about sense of feel, taste, music to ears, seeing and believing. Listen to this podcast that helps 'How to make the SOC visit as experience to bring the ‘wow’ factor'. 

--- This episode is sponsored …

Episode 15 - Digital workplace security for social media generations

October 23rd, 2019


Organizations need to have futuristic security strategy programs to enable digital workplace safe from cyber breaches. Business can’t expect that GenZ will only use emails channels for exchanging messages. They shall …

Episode 14 - Machine first security operations delivery model

October 13th, 2019


Machine first security delivery model require clear understanding of automation use cases and well document incident response playbooks. Organizations today finding ways and means to utilize both humans and machines in …

Episode 13 - Zero Trust Network Access

July 10th, 2019


Zero Trust is taken from the principle of “never trust, always verify,” can achieve using micro segmentation by limiting the lateral movements between the network segments and only intended application access from …

Episode 12 - 72 hours for data breach notification

July 3rd, 2019


According to Article 33 – EU GDPR – “Notification of a personal data breach to the supervisory authority”;  the controller shall without undue delay …

Episode 11 - Deepfake – Seeing is no longer believing

June 27th, 2019


Deepfakes exploit this human tendency using generative adversarial networks (GANs), in which two machine learning (ML) models duke it out.  Deepfake …

Episode 10 - Enterprise should adopt active cyber defense strategy

May 24th, 2019


Active cyber defense strategies unless do not violate regulation and law of the land are considered now as appropriate direct action to counter …

Episode 9 - Unpatched vulnerabilities; Is it problem worth solving?

May 17th, 2019


Organization continue to have ageing vulnerabilities remained unpatched and its serious problem that need solution that are effective to reduce the …

Episode 8 - Cyber threat intelligence feeds for security operations

May 9th, 2019


Organization need to detect the threat quickly and do not want to waste time investigating false negative alerts, thereby remediate the …

Episode 7 - Application visibility is key for data center micro segmentation

April 11th, 2019


 Perimeter-based security approaches are no longer sufficient. The starting point for devising a micro-segmentation is discovering and identifying all the application flows within the data center. Listen to this podcast …

Episode 6 - Amazon focus on cyber security areas are AWS & Smart home security

April 9th, 2019


Studies have indicated that most security breaches in the cloud (such as AWS) are due to settings errors, which a data breach costing an average of $6.5M, according to Cloudnosys.  Amazon has two primary areas of focus …

Episode 5 - What Facebook doing to address cyber security gaps

April 8th, 2019


After several cyber security and privacy issues reported against Facebook, its time to re-look their process, people and technology. Facebook began …

Episode 4 - Internet of things and cyber security recommendations

April 5th, 2019


Internet connectivity is a two-way street. With these devices becoming a gateway to our homes, workplaces, and sensitive data, they also become targets for attacks. Lets learn what industry is doing with it and what …

Episode 3 - Importance of security operational metrics and reports

April 4th, 2019


Most organizations operate with limited financial and resource constraints, they need to prioritize security activities to maximize business benefits.  When communicating to board on security financial reporting, its …

Episode 2 - Chronicle cyber security

March 30th, 2019


Backstory will become the backbone of many managed security service providers. In this episode, lets learn about Chronicle (Google Alphabet's project X moon shot) contribution to cyber security. Read my blog for more …

Episode 1 - Cyber security with MITRE ATT&CK

March 29th, 2019


MITRE evaluates cybersecurity products using an open methodology based on our ATT&CK™ framework. In this podcast, lets get some basic knowledge …

Loading ...

Are you the creator of this podcast?

Verify your account

and pick the featured episodes for your show.

Listen to Future of Cyber Security


A free podcast app for iPhone and Android

  • User-created playlists and collections
  • Download episodes while on WiFi to listen without using mobile data
  • Stream podcast episodes without waiting for a download
  • Queue episodes to create a personal continuous playlist
RadioPublic on iOS and Android
Or by RSS
RSS feed

Connect with listeners

Podcasters use the RadioPublic listener relationship platform to build lasting connections with fans

Yes, let's begin connecting
Browser window

Find new listeners

  • A dedicated website for your podcast
  • Web embed players designed to convert visitors to listeners in the RadioPublic apps for iPhone and Android
Clicking mouse cursor

Understand your audience

  • Capture listener activity with affinity scores
  • Measure your promotional campaigns and integrate with Google and Facebook analytics
Graph of increasing value

Engage your fanbase

  • Deliver timely Calls To Action, including email acquistion for your mailing list
  • Share exactly the right moment in an episode via text, email, and social media
Icon of cellphone with money

Make money

  • Tip and transfer funds directly to podcastsers
  • Earn money for qualified plays in the RadioPublic apps with Paid Listens