
Sign up to save your podcasts
Or
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
We will continue last week's topic on "What is Netflow Protocol used for". This is part 2. If you have not listen to last week's show, I suggest you listen to Part 1 first.
In addition, we will recap other trending security news including:
-https://therecord.media: Pakistani authorities investigating if cyberattack caused nationwide-blackout
- https://www.goto.com/blog: Our response to a recent security incident
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
We will continue last week's topic on "What is Netflow Protocol used for". This is part 2. If you have not listen to last week's show, I suggest you listen to Part 1 first.
In addition, we will recap other trending security news including:
-https://therecord.media: Pakistani authorities investigating if cyberattack caused nationwide-blackout
- https://www.goto.com/blog: Our response to a recent security incident
- https://ipcisco.com: Netflow and Netflow Configuration
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
111,235 Listeners