239 Episodes

  1. Zero Trust Architecture - Episode 2 : Building the Foundation: Key Components of Zero Trust

    Published: 5/3/2024
  2. Zero Trust Architecture - Episode 1 : The Zero Trust Philosophy: A New Blueprint for Security

    Published: 5/3/2024
  3. Firewalls, IDS and Web Servers - Episode 7 : Standing Guard: Continuous Monitoring and Incident Response

    Published: 5/3/2024
  4. Firewalls, IDS and Web Servers - Episode 6 : Logically Speaking: Leveraging Log Management for Security

    Published: 5/3/2024
  5. Firewalls, IDS and Web Servers - Episode 5 : Behind Enemy Lines: Penetration Testing Your Web Server

    Published: 5/3/2024
  6. Firewalls, IDS and Web Servers - Episode 4 : Patchwork Security: The Art of Vulnerability Management

    Published: 5/3/2024
  7. Firewalls, IDS and Web Servers - Episode 3 : The Guardian at the Gates: Web Application Firewalls (WAF)

    Published: 5/3/2024
  8. Firewalls, IDS and Web Servers - Episode 2 : Intruder Alerts: Setting Up Web Server Intrusion Detection Systems

    Published: 5/3/2024
  9. Firewalls, IDS and Web Servers - Episode 1 : Castle Walls: Erecting Robust Web Server Defenses

    Published: 5/3/2024
  10. Web Application Attacks - Episode 9 : Infiltration Tactics: Uncovering Component Vulnerabilities

    Published: 5/3/2024
  11. Web Application Attacks - Episode 8 : Impersonation Games: The Dangers of Phishing Attacks in Web Security

    Published: 5/3/2024
  12. Web Application Attacks - Episode 7 : Crashing the Gates: Defending Against Distributed Denial of Service (DDoS)

    Published: 5/3/2024
  13. Web Application Attacks - Episode 6 : Broken Access: Elevating Privileges and Breaking Control

    Published: 5/3/2024
  14. Web Application Attacks - Episode 5 : Exposed Secrets: The Threat of Sensitive Data Exposure

    Published: 5/3/2024
  15. Web Application Attacks - Episode 4 : Identity Theft: Unraveling Cross-Site Request Forgery (CSRF)

    Published: 5/3/2024
  16. Web Application Attacks - Episode 3 : The World of Cross-Site Scripting (XSS)

    Published: 5/3/2024
  17. Web Application Attacks - Episode 2 : Beneath the Surface: Unpacking SQL Injection Attacks

    Published: 5/3/2024
  18. Web Application Attacks - Episode 1 : Diving into the Digital Abyss: Intro to Web App Attacks

    Published: 5/3/2024
  19. Vulnerability Management - Episode 8 : Learning from the Battlefield: Real-World Case Studies in Vulnerability Management

    Published: 5/3/2024
  20. Vulnerability Management - Episode 7 : Crafting a Cyber-Resilient Culture: Education and Awareness

    Published: 5/3/2024

2 / 12

Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusiast, a business owner, or simply someone who wants to enhance their digital safety, This podcast equips you with the knowledge and tools to navigate the ever-evolving cyber landscape confidently. Join us as we explore real-world examples, share practical tips, and interview industry experts from around the globe. From beginners to seasoned professionals, we cater to all levels of expertise, making cybersecurity accessible and engaging for everyone. Stay informed, stay secure, and stay cyber safe! Tune in to our podcast today!