<?xml version="1.0" encoding="UTF-8"?><!-- generator="podbean/5.5" -->
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
     xmlns:spotify="http://www.spotify.com/ns/rss"
     xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:media="http://search.yahoo.com/mrss/">

<channel>
    <title>Cyber Security Nest</title>
    <atom:link href="https://feed.podbean.com/cybersecurity/feed.xml" rel="self" type="application/rss+xml"/>
    <link>https://cybersecurity.podbean.com</link>
    <description>Cybersecurity podcast is a news digest of security news, breakthrough innovations, Best practices on security operations, phishing incidents, Best practices on audit methodologies  in the IT security industry anchored by Dr.Muthu</description>
    <pubDate>Tue, 31 May 2022 11:19:57 +0500</pubDate>
    <generator>https://podbean.com/?v=5.5</generator>
    <language>en</language>
        <copyright>Copyright 2018 All rights reserved.</copyright>
    <category>Technology</category>
    <ttl>1440</ttl>
    <itunes:type>episodic</itunes:type>
          <itunes:summary></itunes:summary>
        <itunes:author>cybersecurity</itunes:author>
<itunes:category text="Technology" />
    <itunes:owner>
        <itunes:name>cybersecurity</itunes:name>
            </itunes:owner>
    	<itunes:block>No</itunes:block>
	<itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://pbcdn1.podbean.com/imglogo/image-logo/3896718/Podcast_rt8cze.png" />
    <image>
        <url>https://pbcdn1.podbean.com/imglogo/image-logo/3896718/Podcast_rt8cze.png</url>
        <title>Cyber Security Nest</title>
        <link>https://cybersecurity.podbean.com</link>
        <width>144</width>
        <height>144</height>
    </image>
    <item>
        <title>Dr.Muthu talks about SIEM &amp; its need for managing the Security posture of firms</title>
        <itunes:title>Dr.Muthu talks about SIEM &amp; its need for managing the Security posture of firms</itunes:title>
        <link>https://cybersecurity.podbean.com/e/need-for-siem/</link>
                    <comments>https://cybersecurity.podbean.com/e/need-for-siem/#comments</comments>        <pubDate>Tue, 31 May 2022 11:19:57 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/af04cebe-b57f-3055-9fd3-823cb64bb819</guid>
                                    <description><![CDATA[<p>Security Information and Event Management (SIEM) has a range of capabilities that, when combined and integrated, offer comprehensive protection for organizations. They gather data from various events like antivirus events, firewall logs, windows events, and other such events, which are sorted, normalized and correlated for violations. Connect back for discussions. </p>
<p>Key Takeaway:</p>
<ul><li>Major elements of  SIEM</li>
<li>Sumo Logic  as SIEM</li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>Security Information and Event Management (SIEM) has a range of capabilities that, when combined and integrated, offer comprehensive protection for organizations. They gather data from various events like antivirus events, firewall logs, windows events, and other such events, which are sorted, normalized and correlated for violations. Connect back for discussions. </p>
<p>Key Takeaway:</p>
<ul><li>Major elements of  SIEM</li>
<li>Sumo Logic  as SIEM</li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/msdn9g/SIEM-Update.mp3" length="8274048" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Security Information and Event Management (SIEM) has a range of capabilities that, when combined and integrated, offer comprehensive protection for organizations. They gather data from various events like antivirus events, firewall logs, windows events, and other such events, which are sorted, normalized and correlated for violations. Connect back for discussions. 
Key Takeaway:
Major elements of  SIEM
Sumo Logic  as SIEM
]]></itunes:summary>
        <itunes:author>Dr.Muthu</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>520</itunes:duration>
                <itunes:episode>9</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Dr.Muthu talks about Threat Intel Platform and its relevance in current security context</title>
        <itunes:title>Dr.Muthu talks about Threat Intel Platform and its relevance in current security context</itunes:title>
        <link>https://cybersecurity.podbean.com/e/threat-intel-platform/</link>
                    <comments>https://cybersecurity.podbean.com/e/threat-intel-platform/#comments</comments>        <pubDate>Mon, 30 May 2022 14:41:09 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/dc954a39-d093-337b-8c0b-47f35e890c58</guid>
                                    <description><![CDATA[<p>Threat Intelligence Platform is a technology solution that collects, aggregates, and organizes threat Intel data from multiple sources and formats. Threat Intelligence Platforms are designed to take advantage of the strengths of machine and human capabilities. Automation reduces human error, spares analysts from “alert fatigue,” and gives security teams the time and information necessary to make advanced judgement calls on cyber threats. Connect back for more discussions</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Threat Intelligence Platform is a technology solution that collects, aggregates, and organizes threat Intel data from multiple sources and formats. Threat Intelligence Platforms are designed to take advantage of the strengths of machine and human capabilities. Automation reduces human error, spares analysts from “alert fatigue,” and gives security teams the time and information necessary to make advanced judgement calls on cyber threats. Connect back for more discussions</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qgr2ux/Threat-Intel-Platform.mp3" length="12408817" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Threat Intelligence Platform is a technology solution that collects, aggregates, and organizes threat Intel data from multiple sources and formats. Threat Intelligence Platforms are designed to take advantage of the strengths of machine and human capabilities. Automation reduces human error, spares analysts from “alert fatigue,” and gives security teams the time and information necessary to make advanced judgement calls on cyber threats. Connect back for more discussions]]></itunes:summary>
        <itunes:author>Dr.Muthu</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>500</itunes:duration>
                <itunes:episode>8</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Dr.Muthu talks about threat feeds,  threat intelligence, and benefits</title>
        <itunes:title>Dr.Muthu talks about threat feeds,  threat intelligence, and benefits</itunes:title>
        <link>https://cybersecurity.podbean.com/e/threat-intel/</link>
                    <comments>https://cybersecurity.podbean.com/e/threat-intel/#comments</comments>        <pubDate>Mon, 30 May 2022 10:42:44 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/9ff77f78-f3fd-30bb-bccb-e371f726c617</guid>
                                    <description><![CDATA[<p>Threat Intel refers to the practice of collecting threat data, information and knowledge that keeps an organization informed about potential cyber security threats. It is actionable threat Intel related to artifacts or indicators collected from any third-party vendors. Connect back for a better understanding today. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Threat Intel refers to the practice of collecting threat data, information and knowledge that keeps an organization informed about potential cyber security threats. It is actionable threat Intel related to artifacts or indicators collected from any third-party vendors. Connect back for a better understanding today. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qkguu5/Threat-Intel-podcast.mp3" length="12486241" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Threat Intel refers to the practice of collecting threat data, information and knowledge that keeps an organization informed about potential cyber security threats. It is actionable threat Intel related to artifacts or indicators collected from any third-party vendors. Connect back for a better understanding today. ]]></itunes:summary>
        <itunes:author>Dr.Muthu</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>510</itunes:duration>
                <itunes:episode>7</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Dr.Muthu talks about managing your MTTD and MTTR metric as a best practice</title>
        <itunes:title>Dr.Muthu talks about managing your MTTD and MTTR metric as a best practice</itunes:title>
        <link>https://cybersecurity.podbean.com/e/mttd-mttr/</link>
                    <comments>https://cybersecurity.podbean.com/e/mttd-mttr/#comments</comments>        <pubDate>Mon, 30 May 2022 08:09:18 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/e0bae7be-532c-3847-b13f-45861e4e94b7</guid>
                                    <description><![CDATA[<p>MTTD and MTTR are critical metrics and every SOC depends on it. Remember such measurements depends on a number of factors, like the size and complexity of network, the size and expertise of IT staff, industry vertical, and more. Reach out for better understanding</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>MTTD and MTTR are critical metrics and every SOC depends on it. Remember such measurements depends on a number of factors, like the size and complexity of network, the size and expertise of IT staff, industry vertical, and more. Reach out for better understanding</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2vbnt9/MTTD-MTTR.mp3" length="12559291" type="audio/mpeg"/>
        <itunes:summary><![CDATA[MTTD and MTTR are critical metrics and every SOC depends on it. Remember such measurements depends on a number of factors, like the size and complexity of network, the size and expertise of IT staff, industry vertical, and more. Reach out for better understanding]]></itunes:summary>
        <itunes:author>Dr.Muthu</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>492</itunes:duration>
                <itunes:episode>6</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Dr.Muthu talks about reducing DWELL time with SIEM</title>
        <itunes:title>Dr.Muthu talks about reducing DWELL time with SIEM</itunes:title>
        <link>https://cybersecurity.podbean.com/e/drmuthu-speaks-about-cyber-security-metric-dwell-time/</link>
                    <comments>https://cybersecurity.podbean.com/e/drmuthu-speaks-about-cyber-security-metric-dwell-time/#comments</comments>        <pubDate>Sat, 28 May 2022 22:31:56 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/5d362ef6-4ee5-3708-95cd-e10ad517d878</guid>
                                    <description><![CDATA[<p>As legendary management guru Peter Drucker said, “You can’t manage what you can’t measure.” Unfortunately, it’s not as clear-cut for security programs. Dwell time is one of the metric used across the industry. It is a metric that measures the period during which an adversary has uninterrupted access to a breached system. Manage your Dwell time with the help of SIEM solutions. Reach out to Dr.Muthu for Cyber Security discussions. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>As legendary management guru Peter Drucker said, “You can’t manage what you can’t measure.” Unfortunately, it’s not as clear-cut for security programs. Dwell time is one of the metric used across the industry. It is a metric that measures the period during which an adversary has uninterrupted access to a breached system. Manage your Dwell time with the help of SIEM solutions. Reach out to Dr.Muthu for Cyber Security discussions. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/x563zn/DwellTime-Podcast.mp3" length="14179113" type="audio/mpeg"/>
        <itunes:summary><![CDATA[As legendary management guru Peter Drucker said, “You can’t manage what you can’t measure.” Unfortunately, it’s not as clear-cut for security programs. Dwell time is one of the metric used across the industry. It is a metric that measures the period during which an adversary has uninterrupted access to a breached system. Manage your Dwell time with the help of SIEM solutions. Reach out to Dr.Muthu for Cyber Security discussions. ]]></itunes:summary>
        <itunes:author>cybersecurity</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>570</itunes:duration>
                <itunes:episode>5</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Dr.Muthu talks about Electronic evidences and evidence management topics</title>
        <itunes:title>Dr.Muthu talks about Electronic evidences and evidence management topics</itunes:title>
        <link>https://cybersecurity.podbean.com/e/drmuthu-talks-about-electronic-evidences-and-evidence-management-topics/</link>
                    <comments>https://cybersecurity.podbean.com/e/drmuthu-talks-about-electronic-evidences-and-evidence-management-topics/#comments</comments>        <pubDate>Mon, 26 Nov 2018 14:52:13 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/drmuthu-talks-about-electronic-evidences-and-evidence-management-topics-01fcdee62c8809c93db1a526142d13c4</guid>
                                    <description><![CDATA[<p>Hi, This episode identifies the concept of evidence, digital evidence and the concepts of volatile evidence, challenges of evidence, evidence act and the burden of proof. Enough emphasis is on the foundations for easy understanding. Hope you enjoy this episode.</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hi, This episode identifies the concept of evidence, digital evidence and the concepts of volatile evidence, challenges of evidence, evidence act and the burden of proof. Enough emphasis is on the foundations for easy understanding. Hope you enjoy this episode.</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/b35xc4/Evidence.mp3" length="10911945" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hi, This episode identifies the concept of evidence, digital evidence and the concepts of volatile evidence, challenges of evidence, evidence act and the burden of proof. Enough emphasis is on the foundations for easy understanding. Hope you enjoy this episode.
 ]]></itunes:summary>
        <itunes:author>cybersecurity</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1010</itunes:duration>
                <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <itunes:image href="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog3896718/eviden.png" />    </item>
    <item>
        <title>Dr.Muthu talks about Forensic and Cyber Forensic concepts in lucid and simple terms</title>
        <itunes:title>Dr.Muthu talks about Forensic and Cyber Forensic concepts in lucid and simple terms</itunes:title>
        <link>https://cybersecurity.podbean.com/e/drmuthu-talks-about-forensic-and-cyber-forensic-concepts-in-lucid-and-simple-terms/</link>
                    <comments>https://cybersecurity.podbean.com/e/drmuthu-talks-about-forensic-and-cyber-forensic-concepts-in-lucid-and-simple-terms/#comments</comments>        <pubDate>Mon, 26 Nov 2018 11:29:28 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/drmuthu-talks-about-forensic-and-cyber-forensic-concepts-in-lucid-and-simple-terms-601b1595c6529e1ea58b5446fb6f5f4e</guid>
                                    <description><![CDATA[<p>Hi, this is the second episode in this series and is centered around the concepts of what is forensic in general leading to cyber forensic principles. The episode explains in lucid terms the basis of forensic, events and objects. Hope you enjoy it.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hi, this is the second episode in this series and is centered around the concepts of what is forensic in general leading to cyber forensic principles. The episode explains in lucid terms the basis of forensic, events and objects. Hope you enjoy it.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ebsbnj/WhatisForensics1.mp3" length="9286978" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hi, this is the second episode in this series and is centered around the concepts of what is forensic in general leading to cyber forensic principles. The episode explains in lucid terms the basis of forensic, events and objects. Hope you enjoy it.]]></itunes:summary>
        <itunes:author>cybersecurity</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>871</itunes:duration>
                <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Dr.Muthu talks about cyber crime, the nature of cyber crime and its types</title>
        <itunes:title>Dr.Muthu talks about cyber crime, the nature of cyber crime and its types</itunes:title>
        <link>https://cybersecurity.podbean.com/e/intro-to-cyber-crime/</link>
                    <comments>https://cybersecurity.podbean.com/e/intro-to-cyber-crime/#comments</comments>        <pubDate>Sun, 25 Nov 2018 14:12:44 +0500</pubDate>
        <guid isPermaLink="false">cybersecurity.podbean.com/intro-to-cyber-crime-73fd11fb4f3fa8014f2adb031e2766dd</guid>
                                    <description><![CDATA[<p>Hi, This episode is all about understanding cyber crime and its manifestations. Hope you get the outline of cyber crime. Historically, “crime” was addressed at the local, community level of government. Crime follows opportunity; virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hi, This episode is all about understanding cyber crime and its manifestations. Hope you get the outline of cyber crime. Historically, “crime” was addressed at the local, community level of government. Crime follows opportunity; virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vm6usa/CyberForensicEpisode1_1.mp3" length="3883789" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hi, This episode is all about understanding cyber crime and its manifestations. Hope you get the outline of cyber crime. Historically, “crime” was addressed at the local, community level of government. Crime follows opportunity; virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes.]]></itunes:summary>
        <itunes:author>cybersecurity</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>349</itunes:duration>
                <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
</channel>
</rss>
