DiscoverThe Cyberman Show
The Cyberman Show
Claim Ownership

The Cyberman Show

Author: Prashant Mishra

Subscribed: 1Played: 35
Share

Description

The place to learn all about the cybersecurity  from basics to advance topics . Every week, you will get a view of whats happening in the cyber verse. We will cover Cybersecurity, Cloud, Artificial intelligence, threats, breaches emerging technologies and novel ideas. Learn more with us. Stay Tuned!

PS: The view are mine and not my employers.

https://twitter.com/prashant_cyber

104 Episodes
Reverse
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Send us a text This episode offers an extensive exploration of AI-driven code generation, known as vibe coding. This episode details how AI tools like Lovable simplify app development for both technical and non-technical users by generating code from natural language prompts. It contrasts this emerging practice with traditional software engineering and the future of AI-native development. The podcast also highlights significant cybersecurity risks associated with AI-generated code, citing rep...
Send us a text Today's episiode introduces Model Context Protocol (MCP), an open standard designed to enable Artificial Intelligence (AI) applications, particularly Large Language Models (LLMs), to seamlessly interact with third-party tools and data sources. It explains MCP's architecture, including hosts, clients, servers, and external tools, and highlights its benefits such as eliminating knowledge cut-offs, reducing hallucinations, and enhancing AI's capability to perform real-world acti...
Send us a text Today's episode provides a comprehensive overview of a Forest Wave security analytics platform report, acting as a guide for understanding the evolving landscape of security solutions. The discussion centers on evaluating various platforms, including Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) products, based on product features and strategic approaches. It highlights key evaluation parameters like analytics, user behavior analysis...
Send us a text Todays episode vocers a comprehensive overview of Network Detection and Response (NDR) technology, explaining its core function in detecting abnormal and malicious system behaviors by analyzing network traffic data. It outlines key features such as data ingestion, detection, and response, and discusses common use cases including lateral movement and insider threat detection, even extending to Operational Technology (OT) environments. The text also reviews the current market ven...
Send us a text Today's episode offers a comprehensive overview of Cyber Threat Exposure Management (CTEM), defining it as a proactive framework for continuously evaluating digital and physical asset accessibility, exposure, and exploitability. It clarifies foundational cybersecurity concepts such as vulnerabilities, attack surface, threats, and impact, explaining how their interplay creates exposure. The speaker categorizes various types of exposure, from internet-facing systems to data leaka...
Send us a text Ankur Shah, co-founder and CEO of Straiker, shares his career journey, highlighting his experience in various tech sectors before focusing on the current AI landscape. Together, we discussed the impact of AI on building applications and the resulting *cybersecurity challenges , including AI as a potential threat vector and the unique security needs of the evolving AI supply chain. The conversation also touches on emerging security solutions and offers advice for in...
Send us a text #aicybersecurity #aicybersecurity Today's episode introduces the landscape of securing AI, beginning with how AI is utilized in cybersecurity and the increasing accessibility of AI infrastructure through major cloud providers. It outlines common applications of generative AI and large language models across various industries. The core of the discussion then shifts to the potential threats within the AI infrastructure itself, breaking down vulnerabilities across component...
Send us a text Get up to speed with everything that mattered in cybersecurity this month. In this episode of The Cyberman Show, we break down March 2025’s top cyber incidents, threat actor tactics, security product launches, and vulnerabilities actively exploited in the wild. Here’s what we cover: 🔐 Oracle Cloud breach claim exposing 6M user records 🎯 Google's $32 billion acquisition of Wiz – What it means for CNAPP and multi-cloud security 🐛 GitHub Actions supply chain attack targeting Coinb...
Send us a text In this week's episode, we explore the exciting evolution of Security Information and Event Management (SIEM)—the Next-Generation SIEM (NGSIEM). Traditional SIEM solutions have long been crucial for cybersecurity, but they're facing significant challenges with modern infrastructures. Discover how NGSIEM tackles these limitations through advanced AI analytics, machine learning, cloud-native deployment, enhanced data parsing, and powerful automation capabilities. Don...
Send us a text The cybersecurity landscape is shifting fast, and platform consolidation is becoming the go-to strategy for enterprises looking to simplify security operations. In this episode, we dive deep into cybersecurity platforms, what do they mean, the areas where consolidation is happening, analyst view and much more. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.link...
Send us a text This episode focuses on Secure enterprise Browser. We cover What is SEB, Gartners View, Market Growth, Key Features and Benefits of Enterprise Browsers and Extensions, How it Works, Typical component in SEB Products, Usecases, What happens to existing default browsers, How is it related to SSE etc Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/p...
Send us a text Highlight of 2024 that should not be missed including Cybersecurity Incidents, Interesting Mergers and acquisitions and emerging technology. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and...
Send us a text In todays, episode, we will explore how the AI architecture looks like, understand these components, and threats that exist at each layer. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and d...
Send us a text Today's cybersecurity podcast report contains activity in cybersecurity industry including: Introduction Where is the money going Cybersecurity Incidents Interesting TTPs 2024 Gartner MQ for Single Vendor SASE Vulnerabilities Worth Noting Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtub...
Send us a text In todays, episode I have collated how AI based cybersecurity industry is growing. This includes use of AI to improve existing products or creating new products that solve existing issues. Watch the show for details. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twit...
Send us a text Dive into the latest insights from Gartner's Single Vendor SASE Report for 2024 in this episode of The Cyberman show . We break down the key findings and trends shaping the Secure Access Service Edge (SASE) landscape, focusing on single-vendor solutions and their impact on cybersecurity. Whether you're a security professional, IT leader, or tech enthusiast, this episode provides actionable intelligence on how single-vendor SASE solutions are evolving and what it means for your ...
Send us a text Join us in this insightful episode as we delve into the world of Network Detection and Response (NDR). Discover how NDR enhances your network security by detecting threats in real-time, providing deep visibility into network activities, and enabling rapid incident response. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube...
Send us a text The recap contains activity in cybersecurity industry including - Mergers and Acquisitions - Breaches from various industries like healthcare, media, IT, Retail etc - Interesting reports and articles that I recommend for reading. - Gartner MQ for SIEM for 2024 Link to the blog that has links https://thecyberman.substack.com/ Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: ...
Send us a text Todays episode contains basics of API Security. The podcast covers the following topics: 00:00 Introduction 00:51 What is API? 04:53 Common Terms Associated with API 09:23 API Landscape 10:58 What is API Security? 12:32 API Security Risks 15:02 OWASP Top 10 for API Security 15:39 API Attack Workflow 18:29 Story of Real API related Security Incident 19:17 API Security Best Practises 20:21 API Security Market Landscape 24:41 Appsec vs API Security Link to my blog on "API Securi...
loading
Comments