
Sign up to save your podcasts
Or
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This week, lets have look at one of those protocols that often under-used by analyst. It is a way to look at the data that traverse your network to pinpoint what might be lurking beneath the surface. We will cover this in two parts. This is part 1. More on that later.
In addition, we will recap other trending security news includes:
- https://sec.cloudapps.cisco.com: Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Vulnerabilities
- https://support.microsoft.com: Update for Office 2013 Office 2010 and Office 2007
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
This week, lets have look at one of those protocols that often under-used by analyst. It is a way to look at the data that traverse your network to pinpoint what might be lurking beneath the surface. We will cover this in two parts. This is part 1. More on that later.
In addition, we will recap other trending security news includes:
- https://sec.cloudapps.cisco.com: Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Vulnerabilities
- https://support.microsoft.com: Update for Office 2013 Office 2010 and Office 2007
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
111,235 Listeners