PODCAST · technology
The Cyberman Show
by Prashant Mishra
The place to learn all about the cybersecurity from basics to advance topics . Every week, you will get a view of whats happening in the cyber verse. We will cover Cybersecurity, Cloud, Artificial intelligence, threats, breaches emerging technologies and novel ideas. Learn more with us. Stay Tuned!PS: The view are mine and not my employers.https://twitter.com/prashant_cyber
-
107
Will AI Replace Cybersecurity Jobs? I Went Through the Data
Send us Fan MailEveryone's asking the wrong question about AI and cybersecurity careers. The question isn't whether AI will replace you — it's which new jobs AI is creating that didn't exist two years ago.In this episode, I break down the actual hiring data, funding signals, and vendor earnings to map exactly where the cybersecurity job market is heading. Entry-level SOC and GRC roles are shrinking — but overall postings are up 12%, with 514,000 active openings. AI created 10 entirely new security domains. Workers with AI skills earn a 56% wage premium. And $6.34 billion flowed into AI security startups last year alone.If you're a SOC analyst or GRC professional, pay attention to the diagnostic at the 3-minute mark — it tells you exactly where your domain sits on the shrinking-stable-growing spectrum. If you're trying to break into cybersecurity, the segment at 7:30 shows you the five domains with the strongest entry-level demand right now.I also unpack the Koi Signal — how a one-year-old startup got acquired for $400 million in a category that didn't have a name in 2023 — and what the Big 3 vendors' $33 billion acquisition spree tells you about where your next job is.Models are to be used, not believed. Same goes for your career. Use AI. Don't fear it. Don't waitSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
106
CyberSecurity Market Breakdown Aug 2025-March 2026 — Breaches...
Send us Fan MailI was away from content creation for a while — and a lot happened. In this comeback episode of The Cyberman Show, I cover everything that moved the cybersecurity industry between August 2025 and March 2026: the worst breaches, the biggest acquisitions, the hottest startups, where VC money is flooding in, and what the major threat reports are telling us.I'm not here to give you a news digest. I'm here to help you see the patterns — because every breach, every acquisition, and every funding round is a signal about where the industry is heading and what skills will matter next.Highlights: UK retail ransomware chaos, $1.67B Bybit crypto theft, Google's $32B Wiz acquisition, Palo Alto's $29B acquisition spree, the emergence of Agentic AI Security as a new product category, a 47% surge in cybersecurity VC funding, and CrowdStrike's alarming 27-second attacker breakout stat.If you're in cybersecurity — as a professional, a founder, or someone building a career — this episode is your six-monthly briefing, delivered by someone who's been in this industry for 20+ years.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
105
The Cybersecurity Report that Everyone Ignored
Send us Fan MailIn November 2025, Anthropic — an AI company, not a cybersecurity vendor — published a threat intelligence report documenting the first confirmed AI-orchestrated cyber espionage campaign. A Chinese state-sponsored group (GTG-1002) jailbroke Claude AI into an autonomous hacking agent that attacked ~30 organizations, handling 80–90% of tactical operations independently. The report got a week of press coverage and everyone moved on. But this episode argues it's the most important cybersecurity report of the decade — and that every major frontier AI lab will publish something similar.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
104
A primer on Identity Security for Agentic AI
Send us Fan MailToday's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dynamic and ephemeral nature poses unique security challenges. I have critically examined the limitations of current human-centric identity solutions like OAuth and SAML in accommodating machine identities, advocating for a machine-first approach in identity security. Finally, the episode details how the industry is evolving to address these shortfalls through zero trust for agents, policy as code, and enhanced auditability, citing examples from major cloud providers and dedicated identity management companies.LinkedIn Profile: https://www.linkedin.com/in/thecyberman/Substack: https://thecyberman.substack.com/Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
103
Vibe Coding: Risks and Security Best Practices
Send us Fan MailThis episode offers an extensive exploration of AI-driven code generation, known as vibe coding. This episode details how AI tools like Lovable simplify app development for both technical and non-technical users by generating code from natural language prompts. It contrasts this emerging practice with traditional software engineering and the future of AI-native development. The podcast also highlights significant cybersecurity risks associated with AI-generated code, citing reports from Veracode and Backbench that reveal a high percentage of insecure code. Finally, it provides recommendations for secure vibe coding, emphasizing human review and secure prompting techniques, and identifies new skill sets essential for the evolving landscape of AI-powered software creation.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
102
MCP Servers and Their Increasing Usage in Cybersecurity
Send us Fan MailToday's episiode introduces Model Context Protocol (MCP), an open standard designed to enable Artificial Intelligence (AI) applications, particularly Large Language Models (LLMs), to seamlessly interact with third-party tools and data sources. It explains MCP's architecture, including hosts, clients, servers, and external tools, and highlights its benefits such as eliminating knowledge cut-offs, reducing hallucinations, and enhancing AI's capability to perform real-world actions. The discussion also touches upon the growing adoption of MCP servers by cybersecurity vendors to facilitate natural language interaction with security platforms, while acknowledging the potential security implications of this new architectural layer.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
101
Forrester Wave Security Analytics Report: Leaders, Trends & What...
Send us Fan MailToday's episode provides a comprehensive overview of a Forest Wave security analytics platform report, acting as a guide for understanding the evolving landscape of security solutions. The discussion centers on evaluating various platforms, including Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) products, based on product features and strategic approaches. It highlights key evaluation parameters like analytics, user behavior analysis, incident management, data handling, and the growing integration of AI. Furthermore, the episode tracks vendor changes and market consolidation, emphasizing the importance of innovation and aligning with leading technologies for security professionals.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
100
Network Detection and Response: Basics, Usecases and Gartner 2025 MQ :
Send us Fan MailTodays episode vocers a comprehensive overview of Network Detection and Response (NDR) technology, explaining its core function in detecting abnormal and malicious system behaviors by analyzing network traffic data. It outlines key features such as data ingestion, detection, and response, and discusses common use cases including lateral movement and insider threat detection, even extending to Operational Technology (OT) environments. The text also reviews the current market vendors based on a Gartner Magic Quadrant analysis, differentiates NDR from other security technologies like EDR, SIM, and XDR, and explores the integration of AI in enhancing NDR capabilities.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
99
Beyond Vulnerabilities: Your Guide to Cyber Threat Exposure...
Send us Fan MailToday's episode offers a comprehensive overview of Cyber Threat Exposure Management (CTEM), defining it as a proactive framework for continuously evaluating digital and physical asset accessibility, exposure, and exploitability. It clarifies foundational cybersecurity concepts such as vulnerabilities, attack surface, threats, and impact, explaining how their interplay creates exposure. The speaker categorizes various types of exposure, from internet-facing systems to data leakage and phishing susceptibility, emphasizing the expanding attack surface due to interconnected IT infrastructure. Furthermore, the discussion elaborates on exposure management processes and related technologies, including vulnerability scanning, patch management, penetration testing, breach and attack simulation, and external attack surface management, alongside an explanation of how these tools are evolving to support a more unified CTEM approach. Finally, the transcript explores how Artificial Intelligence (AI) is enhancing CTEM through automated discovery, smarter prioritization, intelligent remediation, and enhanced automation.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
98
Securing the AI Age: Ankur Shah on the Explosive Growth of AI and...
Send us Fan MailAnkur Shah, co-founder and CEO of Straiker, shares his career journey, highlighting his experience in various tech sectors before focusing on the current AI landscape. Together, we discussed the impact of AI on building applications and the resulting *cybersecurity challenges , including AI as a potential threat vector and the unique security needs of the evolving AI supply chain. The conversation also touches on emerging security solutions and offers advice for individuals interested in learning about this rapidly changing field, emphasising practical building and experimentation.#aisecurity #aicybersecurity Main Themes and Important Ideas:- AI as a Transformative Mega-Trend- AI's Dual Impact on Cyber Security- Securing AI Systems- The Unique Security Challenges of AI-Enabled Applications- New AI Supply Chain- Developing AI Security Solutions- Emerging AI Security Categories- Recommendations for Enterprises and IndividualsSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
97
Breakdown of AI App Infrastructure and threats on each layer
Send us Fan Mail#aicybersecurity #aicybersecurity Today's episode introduces the landscape of securing AI, beginning with how AI is utilized in cybersecurity and the increasing accessibility of AI infrastructure through major cloud providers. It outlines common applications of generative AI and large language models across various industries. The core of the discussion then shifts to the potential threats within the AI infrastructure itself, breaking down vulnerabilities across components like core infrastructure, AI models, data, plugins, and AI agents. The episode details specific attack vectors for each of these areas, emphasizing the expanded attack surface presented by interconnected AI systems. Drawing upon resources like OWASP and vendor documentation, the podcast provides an overview of emerging security concerns in the rapidly evolving field of AI. The episode concludes by outlining the intention to further explore these threats and potential solutions in future discussions with industry experts.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
96
March 2025 Cybersecurity Recap
Send us Fan MailGet up to speed with everything that mattered in cybersecurity this month. In this episode of The Cyberman Show, we break down March 2025’s top cyber incidents, threat actor tactics, security product launches, and vulnerabilities actively exploited in the wild.Here’s what we cover:🔐 Oracle Cloud breach claim exposing 6M user records🎯 Google's $32 billion acquisition of Wiz – What it means for CNAPP and multi-cloud security🐛 GitHub Actions supply chain attack targeting Coinbase and 23K+ repositories🛡️ Top CVEs exploited in the wild: Ivanti, VMware, Fortinet, CrushFTP📊 Ransomware in OT environments – Key takeaways from Dragos and CISA reports👨💻 Medusa and SuperBlack ransomware tactics🌐 Weaver Ant APT threat actor using Zyxel routers🚀 New launches from ESET, Outpost24, Sonatype, and Red Canary📢 Whether you're a cybersecurity leader, SOC analyst, or cloud architect, this roundup gives you the insights you need to stay ahead of threat trends, improve your cloud security posture, and defend against advanced persistent threats (APT).🎧 Listen on your favorite platform:Spotify | Apple Podcasts | Amazon Music | Google Podcasts📩 Subscribe to the newsletter:https://thecyberman.substack.com/My LinkedIn Profile: https://www.linkedin.com/in/thecyberman/Instagram: https://www.instagram.com/thecybermanshow📺 Watch more videos:Subscribe to the channel for weekly insights on cyber threats, cloud security, and AI in infosec.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
95
An introduction to Next-Gen SIEM: AI-Powered Security for Modern...
Send us Fan MailIn this week's episode, we explore the exciting evolution of Security Information and Event Management (SIEM)—the Next-Generation SIEM (NGSIEM). Traditional SIEM solutions have long been crucial for cybersecurity, but they're facing significant challenges with modern infrastructures. Discover how NGSIEM tackles these limitations through advanced AI analytics, machine learning, cloud-native deployment, enhanced data parsing, and powerful automation capabilities. Don't miss this deep dive into how AI and Generative AI are transforming incident response, threat hunting, and cybersecurity collaboration for good!🔑 **What you'll learn:** - Limitations of traditional SIEM - Key innovations in Next-Generation SIEM (NGSIEM) - Impact of AI, ML, and Generative AI in cybersecurity operations - Emerging market trends shaping the SIEM landscape Stay ahead of threats—tune in now!#NextGenSIEM #CyberSecurity #AIsecurity #SIEM #ThreatDetection #CyberSecurityAwareness #SecurityAnalytics #GenerativeAI #TechPodcast #TheCybermanShow #SOC #CyberOps #IncidentResponse #CloudSecurity #InfoSecSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
94
Cybersecurity Platforms: The Shift Towards Consolidation
Send us Fan MailThe cybersecurity landscape is shifting fast, and platform consolidation is becoming the go-to strategy for enterprises looking to simplify security operations. In this episode, we dive deep into cybersecurity platforms, what do they mean, the areas where consolidation is happening, analyst view and much more.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
93
The Rise of Secure Enterprise Browsers: The Next Step in SASE...
Send us Fan MailThis episode focuses on Secure enterprise Browser. We coverWhat is SEB, Gartners View, Market Growth, Key Features and Benefits of Enterprise Browsers and Extensions, How it Works, Typical component in SEB Products, Usecases, What happens to existing default browsers, How is it related to SSE etcSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
92
2024 Cybersecurity Recap: Incidents, M&A and Emerging...
Send us Fan MailHighlight of 2024 that should not be missed including Cybersecurity Incidents, Interesting Mergers and acquisitions and emerging technology.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
91
Building Secure AI: Unpacking the AI Architecture and Its Threats
Send us Fan MailIn todays, episode, we will explore how the AI architecture looks like, understand these components, and threats that exist at each layer.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
90
July 2024 Cybersecurity Highlights: A Recap You Can't Miss!
Send us Fan MailToday's cybersecurity podcast report contains activity in cybersecurity industry including: IntroductionWhere is the money goingCybersecurity IncidentsInteresting TTPs2024 Gartner MQ for Single Vendor SASEVulnerabilities Worth NotingSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
89
How AI based cybersecurity is evolving? AI Cyberwatch
Send us Fan MailIn todays, episode I have collated how AI based cybersecurity industry is growing. This includes use of AI to improve existing products or creating new products that solve existing issues. Watch the show for details.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
88
Notes from Gartner's Single Vendor SASE report for 2024
Send us Fan MailDive into the latest insights from Gartner's Single Vendor SASE Report for 2024 in this episode of The Cyberman show . We break down the key findings and trends shaping the Secure Access Service Edge (SASE) landscape, focusing on single-vendor solutions and their impact on cybersecurity. Whether you're a security professional, IT leader, or tech enthusiast, this episode provides actionable intelligence on how single-vendor SASE solutions are evolving and what it means for your organization's security posture. Tune in to stay ahead in the rapidly changing world of cybersecurity.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
87
What is Network Detection and Response?
Send us Fan MailJoin us in this insightful episode as we delve into the world of Network Detection and Response (NDR). Discover how NDR enhances your network security by detecting threats in real-time, providing deep visibility into network activities, and enabling rapid incident response.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
86
Cybersecurity Recap for May 2024
Send us Fan MailThe recap contains activity in cybersecurity industry including- Mergers and Acquisitions- Breaches from various industries like healthcare, media, IT, Retail etc- Interesting reports and articles that I recommend for reading.- Gartner MQ for SIEM for 2024Link to the blog that has linkshttps://thecyberman.substack.com/Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
85
What is API Security? API Security Risks, API Market Landscape
Send us Fan MailTodays episode contains basics of API Security. The podcast covers the following topics:00:00 Introduction00:51 What is API?04:53 Common Terms Associated with API09:23 API Landscape10:58 What is API Security?12:32 API Security Risks15:02 OWASP Top 10 for API Security15:39 API Attack Workflow18:29 Story of Real API related Security Incident19:17 API Security Best Practises20:21 API Security Market Landscape24:41 Appsec vs API SecurityLink to my blog on "API Security Checklist" https://thecyberman.substack.com/p/api-security-checklistSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
84
Tracking Artificial Intelligence and Cybersecurity Usage - — AI...
Send us Fan MailWelcome to AI-Cyberwatch, your monthly deep dive into the cutting-edge intersection of AI and cybersecurity! Discover how AI is reshaping the cyber landscape, from the innovative tools empowering industries to the cunning tactics employed by adversaries. Join us as we unveil a new framework designed to keep you informed and ahead of the curve. Whether you're a seasoned professional or just starting your cybersecurity journey, AI-Cyberwatch is your go-to source for staying updated and engaged. Tune in now and be part of the revolution!Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
83
Lessons from Red Canary's Annual Threat Report 2023
Send us Fan MailNotes from RedCanarys’ annual threat report includingKey trends, top 10 threats, and the most prevalent adversary techniques. Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
82
Recap of CyberSecurity for April 2024
Send us Fan MailFull recap of April 2024 including key cyber Incidents, cybersecurity events in AI related tech, regulations,Nation State involvement in cyber attacks, Funding and acquisitions, software vulnerabilities worth the mention, New TTPs etcSupport the Show.Google Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShowTwitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
81
What is Secure enterprise browser
Send us Fan MailDiscover the power of secure enterprise browsers to protect your business data. This latest podcast explains how these browsers enhance cybersecurity, ensuring safe internet usage Don't miss out on expert tips on Instagram also.https://www.instagram.com/thecybermanshow/! Subscribe for more cybersecurity insights. #CyberSecuritySupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
80
Notes from Annual Report on Threat Intelligence from Recorded Future
Send us Fan MailIts important to learn how threat actors are making moves and how they are evolving. Todays episode contains my notes from the Recorded Future's Annual Report 2023 on threat intelligence.#cybersecuritySupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
79
Recap of CyberSecurity for March 2024
Send us Fan MailFull recap of March including key cyber Incidents, cybersecurity events in AI related tech, regulations,Nation State involvement in cyber attacks,software vulnerabilities worth the mention, New TTPs etcSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
78
Muddled Libra, Cloud Incidents, AI, Changes in Attack Speed...
Send us Fan MailLessons from recent report from Palo Alto Unit52 Incident Response Report threat actors, intial access methods, impact, target industries, use of AI and recommendations etc. Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
77
Notes from State of AI in Cloud Report and what cybersecurity...
Send us Fan MailNotes from State of AI in Cloud Report and what cybersecurity professionals should do about it? EP75Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
76
Cloud Security Basics for IaaS, PaaS and SaaS
Send us Fan MailHow to get start with security basics for IaaS, PaaS or SaaS platforms. We start with cloud types , native controls, advance controls, compliance etc,Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
75
Key Take Aways from GigaOm Autonomous SOC Radar Report
Send us Fan MailToday we learn what autonomous SOC is, what are the key capabilities it has, how large vendors are building the autonomous SOC Capabilities and my personal views on this tech.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
74
Key learnings from the State of Software Supply Chain Security...
Send us Fan Mailtoday, I share what I learnt from the recent report that I read from Reversing labs on software supply chain security. Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
73
What is Cloud Detection and Response(CDR)?
Send us Fan Mail Let’s learn about Cloud Detection and response technology today and how it can be used by Digital native/ Cloud first organisations for security monitoring. We cover the need for it, how its different from SIEM, Its capabilities, whos talking about it and how to learn it.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
72
Learning Roadmap for becoming a Cloud Security Architect
Send us Fan MailBecome a cloud security architect by following this 3 level roadmap on the cyberman show.Link to shared drive with podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko?usp=drive_linkSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
71
2023 Recap of Cybersecurity Industry
Send us Fan MailLets recap the key events that happened in 2023 that are shaping the future of cybersecurity industry. I have covered Emerging product categories, acquisitions, Top 10 vulnerabilities, Incidents, Interesting publications and how much returns were given by publicly traded cybersecurity companies in stock marketsSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
70
Takeaways from The Forrester Wave SSPM Report for Q4 2023
Send us Fan MailI recently read the The Forrester Wave SSPM Report for Q4 2023. This episode summarizes the key points from the report and my personal views on the report.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
69
What Is Application Security Posture Management(ASPM)?
Send us Fan MailLearn about ASPM Application Security Posture Management(ASPM) in todays podcast. You will learn about the need for aspm tech, how it works, key features, integration approach and benefits.Here is the link of the mindmap PDF from the episode.https://drive.google.com/file/d/128Y3HLe7_FwMoKaY1Nl3C2eOz69eTOkm/view?usp=sharingSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
68
CyberSecurity Recap for November 2023
Send us Fan MailLearn about key security incidents, Vulnerabilities, acquisitions, cybersecurity recommendations and reports from all over the globe in Nov 2023.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
67
What is NIS2 Directive? How does it impact Cybersecurity and what...
Send us Fan MailWhat is NIS2 Directive in Europe? How is it related to cybersecurity? Which sectors does it impact? What can organizations and individual do with this directive?Learn all that with data security, privacy and compliance Guru Vishwameet Chawla.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
66
Lessons from Palo Alto's State of Cloud Security 2023 Report
Send us Fan MailOver the weekend, I went through this report from Palo Alto with data from over 2500 respondents. Lets discuss key points from the report on application security, cloud security, challenges, recommendations etcSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
65
Lets learn about Endpoint Security Landscape, EPP and EDR
Send us Fan MailToday, lets learn about Endpoint Security Landscape, EPP and EDR including history, TAM, Usecases, How it works etc. Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
64
Monthly Recap of Cyber Security Activity
Send us Fan MailToday, let’s do a recap of key events in cyber security including acquisitions, Security incident, breaches, ransomware, Exploit selling platforms, New Threat Report, security advisories etc.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
63
Key findings from Palo Alto's Attack Surface Management Report of...
Send us Fan MailToday, we review the recent Attack surface management report from Palo Alto and key findings from it.I recommend everyone to go through the report for details.https://unit42.paloaltonetworks.com/unit-42-2023-attack-surface-threat-report/Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
62
What is Security Orchestration Automation and Response(SOAR)?
Send us Fan MailLearn about Security Orchestration Automation and Response(SOAR)? in this beginner-friendly episode of The Cyberman Show. (13 min)Whether you're starting your cybersecurity career or building foundational knowledge, this episode breaks down the concepts you need to know.🎙️ The Cyberman Show — Making Cyber SimpleSubscribe for weekly cybersecurity insights on AI security, cloud security, career guidance, and industry analysis.🔗 Follow: YouTube @TheCybermanShow | LinkedIn: The Cyberman ShowSupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
61
SaaS Security Posture Management(SSPM) 101
Send us Fan MailAnalyst predict that by 2028, over 80% apps in the enterprise will be SaaS apps. This will lead to increased attack surface making SSPM a key technology for cybersecurity teams to adapt. Let’s learn about SaaS Security posture management(SSPM) today.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
60
Review of Gartner’s Inaugural Single Vendor SASE MQ for 2023
Send us Fan MailToday we review the recent the first ever single vendor SASE report Released by Gartner. You will learn about the key criteria for evalution, who made it to the list, key points from the report and my personal take aways.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
59
Data Security Posture Management(DSPM) Overview
Send us Fan MailLets learn about Data Security Posture Management(#DSPM) technology today. this is evolving tech in 2023 and I expect more adoption of this technology as we adopt to more cloud based apps that exchange data with other apps.Support the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
-
58
Malvertising, Phishing Tookits, Attacks on Kubernetes Cluster...
Send us Fan MailToday we will learn about a new Fraud Campaign thats targeting Users in Mexico, a Phishing Service toolkit that’s getting popular, a new attack on Kubernetes clusters, an AI based tool that is 93% accurate, Two Acquisitions in cybersecurity and a new regulation that impacts all the publicly listed companies in USASupport the showGoogle Drive link for Podcast content:https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnkoMy Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyberPS: The views are my own and dont reflect any views from my employer.
No matches for "" in this podcast's transcripts.
No topics indexed yet for this podcast.
Loading reviews...
ABOUT THIS SHOW
The place to learn all about the cybersecurity from basics to advance topics . Every week, you will get a view of whats happening in the cyber verse. We will cover Cybersecurity, Cloud, Artificial intelligence, threats, breaches emerging technologies and novel ideas. Learn more with us. Stay Tuned!PS: The view are mine and not my employers.https://twitter.com/prashant_cyber
HOSTED BY
Prashant Mishra
CATEGORIES
Loading similar podcasts...