
Sign up to save your podcasts
Or
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Remember when the Internet was unencrypted? Yes, there was a time when security was the exception rather than the default. That is to say the majority of the Internet traffic was served over HTTP rather than HTTPS.
Fastfoward to today and it is unconceivable to access any website without the lock sign on the browser url field. That is because privacy by way of using encryption became a thing to protect us from prying eyes ready to steal your private information. Unfortunately, the same tool -encryption that is, provide a cloak for the the crooks to hide their malware and other navarious artifacts inside the encrypted traffic. How do you find these malware in an encrypted traffic without decrypting it? That is the topic of the today's episode.
In addition, we will recap other trending security news includes
- https://support.lastpass.com/help: Incident 2 additional details of the attack
- https://workspace.google.com/blog: Gmail and calendar client side encryption
- https://www.cisco.com: Encrypted Traffic Analytics
- https://www.ciscolive.com: Operationalizing Encrypted Traffic Analytics
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Enjoying the content? Let us know your feedback!
Thanks for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
Remember when the Internet was unencrypted? Yes, there was a time when security was the exception rather than the default. That is to say the majority of the Internet traffic was served over HTTP rather than HTTPS.
Fastfoward to today and it is unconceivable to access any website without the lock sign on the browser url field. That is because privacy by way of using encryption became a thing to protect us from prying eyes ready to steal your private information. Unfortunately, the same tool -encryption that is, provide a cloak for the the crooks to hide their malware and other navarious artifacts inside the encrypted traffic. How do you find these malware in an encrypted traffic without decrypting it? That is the topic of the today's episode.
In addition, we will recap other trending security news includes
- https://support.lastpass.com/help: Incident 2 additional details of the attack
- https://workspace.google.com/blog: Gmail and calendar client side encryption
- https://www.cisco.com: Encrypted Traffic Analytics
- https://www.ciscolive.com: Operationalizing Encrypted Traffic Analytics
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
111,235 Listeners