239 Episodes

  1. Vulnerability Management - Episode 6 : Tools of the Trade: Essential Technology for Vulnerability Management

    Published: 5/3/2024
  2. Vulnerability Management - Episode 5 : Closing the Gates: Strategies for Mitigating Identified Vulnerabilities

    Published: 5/3/2024
  3. Vulnerability Management - Episode 4 : Cyberthreat Intelligence: Navigating the Digital Threat Landscape

    Published: 5/3/2024
  4. Vulnerability Management - Episode 3 : The Penetration Test Playbook: Simulating Cyber Attacks

    Published: 5/3/2024
  5. Vulnerability Management - Episode 2 : The Risk Radar: Mastering Risk Assessment in Cybersecurity

    Published: 5/3/2024
  6. Vulnerability Management - Episode 1 : Unveiling the Shadows: Introduction to Vulnerability Assessment

    Published: 5/3/2024
  7. Social Engineering - Episode 8 : Future Threats: Evolving Tactics in Social Engineering

    Published: 5/3/2024
  8. Social Engineering - Episode 7 : Vishing and Smishing: The Call You Shouldn’t Answer

    Published: 5/3/2024
  9. Social Engineering - Episode 6 : Tailgating and Pretexting: Beyond the Digital Realm

    Published: 5/3/2024
  10. Social Engineering - Episode 5 : Psychology of a Social Engineer: Minds Behind the Mask

    Published: 5/3/2024
  11. Social Engineering - Episode 4 : Spear Phishing: When the Attack Gets Personal

    Published: 5/3/2024
  12. Social Engineering - Episode 3 : The Human Firewall: Building Your First Line of Defense

    Published: 5/3/2024
  13. Social Engineering - Episode 2 : Phishing Expeditions: Recognizing the Bait

    Published: 5/3/2024
  14. Social Engineering - Episode 1 : The Art of Deception: An Introduction to Social Engineering

    Published: 5/3/2024
  15. Secure Software Development - Episode 8 : The Future of Secure Software Development

    Published: 5/3/2024
  16. Secure Software Development - Episode 7 : Secure by Design: Embedding Security in Architecture

    Published: 5/3/2024
  17. Secure Software Development - Episode 6 : Incident Response in Software Development

    Published: 5/3/2024
  18. Secure Software Development - Episode 5 : Continuous Integration and Continuous Deployment (CI/CD) Security

    Published: 5/3/2024
  19. Secure Software Development - Episode 4 : Leveraging Security Frameworks and Libraries

    Published: 5/3/2024
  20. Secure Software Development - Episode 3 : Writing Secure Code: Best Practices and Avoidable Pitfalls

    Published: 5/3/2024

3 / 12

Welcome to The Rocheston Cybersecurity Podcast, your go-to podcast for demystifying cybersecurity concepts in a global context. Hosted by Haja Mo who has a passion for cybersecurity education, this podcast breaks down complex topics into easy-to-understand explanations, ensuring that listeners of all backgrounds can grasp essential cybersecurity principles. In each episode, we delve into various cybersecurity concepts, making it easy for everyone to understand. Whether you're a tech enthusiast, a business owner, or simply someone who wants to enhance their digital safety, This podcast equips you with the knowledge and tools to navigate the ever-evolving cyber landscape confidently. Join us as we explore real-world examples, share practical tips, and interview industry experts from around the globe. From beginners to seasoned professionals, we cater to all levels of expertise, making cybersecurity accessible and engaging for everyone. Stay informed, stay secure, and stay cyber safe! Tune in to our podcast today!