با برنامه Player FM !
145 - Indication of compromise best practice
Manage episode 385516340 series 2872461
Enjoying the content? Let us know your feedback!
Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.
- NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
- The source of Okta breach....no price for guessing
- https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
فصل ها
1. Intro (00:00:00)
2. NCSC quantum crypto guide (00:01:34)
3. The source of Okta breach (00:17:06)
4. IOC best practice (00:25:05)
245 قسمت
Manage episode 385516340 series 2872461
Enjoying the content? Let us know your feedback!
Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english.
I'm your your host Ibrahim Yusuf
In today's episode, we're shedding light on a critical yet often overlooked aspect of cybersecurity - Indications of Compromise, also known as IOCs. These vital pieces of forensic data can be the canary in the coal mine, alerting us to potential network intrusions before they wreak havoc on our systems.
We'll discuss what IOCs are, why they are essential, and how you can use them proactively to enhance your cybersecurity strategy.
But first, a quick look on what is top of mind in the security news this week.
- NCSC releases more details designed to help organisations how to migrate to post-quantum crypto
- The source of Okta breach....no price for guessing
- https://www.ncsc.gov.uk: Next steps preparing for post quantum cryptography
- https://www.linkedin.com: Okta data breach lesson browser security
- https://www.scmagazine.com: Okta breach linked to workers personal google account
- https://www.attackiq.com: Pyramid of pain
- https://github.com/Cisco-Talos: IOCs
- https://sec.cloudapps.cisco.com: Indication Of Compromise Reference Guide
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
فصل ها
1. Intro (00:00:00)
2. NCSC quantum crypto guide (00:01:34)
3. The source of Okta breach (00:17:06)
4. IOC best practice (00:25:05)
245 قسمت
همه قسمت ها
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.