All Episodes
The Cyberman Show — 106 episodes
Will AI Replace Cybersecurity Jobs? I Went Through the Data
CyberSecurity Market Breakdown Aug 2025-March 2026 — Breaches...
The Cybersecurity Report that Everyone Ignored
A primer on Identity Security for Agentic AI
Vibe Coding: Risks and Security Best Practices
MCP Servers and Their Increasing Usage in Cybersecurity
Forrester Wave Security Analytics Report: Leaders, Trends & What...
Network Detection and Response: Basics, Usecases and Gartner 2025 MQ :
Beyond Vulnerabilities: Your Guide to Cyber Threat Exposure...
Securing the AI Age: Ankur Shah on the Explosive Growth of AI and...
Breakdown of AI App Infrastructure and threats on each layer
March 2025 Cybersecurity Recap
An introduction to Next-Gen SIEM: AI-Powered Security for Modern...
Cybersecurity Platforms: The Shift Towards Consolidation
The Rise of Secure Enterprise Browsers: The Next Step in SASE...
2024 Cybersecurity Recap: Incidents, M&A and Emerging...
Building Secure AI: Unpacking the AI Architecture and Its Threats
July 2024 Cybersecurity Highlights: A Recap You Can't Miss!
How AI based cybersecurity is evolving? AI Cyberwatch
Notes from Gartner's Single Vendor SASE report for 2024
What is Network Detection and Response?
Cybersecurity Recap for May 2024
What is API Security? API Security Risks, API Market Landscape
Tracking Artificial Intelligence and Cybersecurity Usage - — AI...
Lessons from Red Canary's Annual Threat Report 2023
Recap of CyberSecurity for April 2024
What is Secure enterprise browser
Notes from Annual Report on Threat Intelligence from Recorded Future
Recap of CyberSecurity for March 2024
Muddled Libra, Cloud Incidents, AI, Changes in Attack Speed...
Notes from State of AI in Cloud Report and what cybersecurity...
Cloud Security Basics for IaaS, PaaS and SaaS
Key Take Aways from GigaOm Autonomous SOC Radar Report
Key learnings from the State of Software Supply Chain Security...
What is Cloud Detection and Response(CDR)?
Learning Roadmap for becoming a Cloud Security Architect
2023 Recap of Cybersecurity Industry
Takeaways from The Forrester Wave SSPM Report for Q4 2023
What Is Application Security Posture Management(ASPM)?
CyberSecurity Recap for November 2023
What is NIS2 Directive? How does it impact Cybersecurity and what...
Lessons from Palo Alto's State of Cloud Security 2023 Report
Lets learn about Endpoint Security Landscape, EPP and EDR
Monthly Recap of Cyber Security Activity
Key findings from Palo Alto's Attack Surface Management Report of...
What is Security Orchestration Automation and Response(SOAR)?
SaaS Security Posture Management(SSPM) 101
Review of Gartner’s Inaugural Single Vendor SASE MQ for 2023
Data Security Posture Management(DSPM) Overview
Malvertising, Phishing Tookits, Attacks on Kubernetes Cluster...
What is Attack Surface Management, Types, EASM, EASM vs DRP etc?
Level Up Your #AppSec Skills with Jeevan Singh of Twillio
How to turn your tech knowledge into wealth
What is Identity Threat Detection And Response(ITDR), ITDR vs...
MOVEit Vulnerability Updates, Breaches, Android Spyware with 1.5Mn...
Findings from Verizon DBIR 2023
Lets simplify XDR
Software Supply Chain Attacks, ICS Attacks, Nation States, Mobile...
Getting started with Cloud Security Featuring Ashish Rajan from...
Interesting Usecases of AI, AI Market Landscape, Layered Approach...
Impact on Cybersecurity with Growth In Artificial Intelligence...
Unlock the Power of Generative AI, Future, Market and Tools to try
ChatGPT Accounts for sale, Powershell for Data exfiltration, Juice...
EP42: ChatGPT breach, Fake ChatGPT extension, 3CX Attack, Android...
EP41: Chatgpt,Google BARD, New AI Tools and Usage, Prompt...
Callback Phishing,Chatgpt & Deepfake, Royal Ransomware EV Infra...
Data Security & Privacy with Vishwameet Chawla
Lets talk about CNAPP, CWPP, CSPM, CIEM and steps to learn?
#37: 2023 Guide to SASE: History, Evolution, Current State and How...
Chatgpt Intro, usecase, cybersecurity, what to do now
in English- Cyberwarfare updates,APTs,Konni RAT, PLC Exploits...
In Hindi- Cyberwarfare updates,APTs,Konni RAT, PLC Exploits...
Guru Se Gyan: In Conversation with Mr Vishal Salvi (Hindi)
In English- Cyberwarfare updates,APT29, Breaches,Conti Ransomware...
In Hindi- Cyberwarfare updates,APT29, Breaches,Conti Ransomware...
This week learn about a new #APT actor from China, new trends in...
This week learn about a new #APT actor from China, new trends in...
This week, new malware attacks on data breaches. a new Red teaming...
This week, new malware attacks on data breaches. a new Red teaming...
New Frauds, Banking malware,Cyber Mercenaries, APT's, 100 Million...
New malware attacks on Russia, Spicejet Ransomware attack, Web...
How to learn Cloud Security from scratch (Hindi)
(English): Conti Group is Shut, A Bot that Controls Social Media...
Conti Group is Shut, A Bot that Controls Social Media, Few...
(English):National Emergency in Costa Rica because of ransomware...
This week( in Hindi): National Emergency in Costa Rica because of...
Cyberverse Updates in English for 1st Week Of May 2022
Cyberverse Updates in Hindi for 1st Week of May 2022
What is Business Email Compromise(BEC)?
What is Business Email Compromise(BEC)? (Hindi)
Cyberverse Updates in English for 4th Week of April 2022
Cyberverse Updates in Hindi for 4th Week of April 2022
Cyberverse Updates in English for 3rd Week of April 2022
Cyberverse Updates in Hindi for 3rd Week of April 2022
Cyberverse Updates in English for 2nd Week of April 2022
Cyberverse Updates in Hindi for 2nd Week of April 2022
What is Cybersecurity all about?
What is SOC? Intro to Security Operations Center
Cyber Security Updates for 1st Week of April 22
Cyber Security Updates for 1st Week of April 22 (Hindi)
Cyber Security Updates for 4th Week of March 2022 (Hindi)
What is Cybersecurity all about? (Hindi)
Cyber Security Updates for 3rd Week of March 2022 (Hindi)
What is SOC? Intro to Security Operations Center (Hindi)
Cyber Security Updates for 2nd Week of March 2022 (Hindi)
Podcast Introduction