Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/bb/aa/64/bbaa6438-7030-3486-af19-a9822c6962f3/mza_1129146089366820326.jpg/600x600bb.jpg
The Cyberman Show
Prashant Mishra
104 episodes
2 months ago
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Show more...
Technology
Education,
News,
Tech News
RSS
All content for The Cyberman Show is the property of Prashant Mishra and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Show more...
Technology
Education,
News,
Tech News
Episodes (20/104)
The Cyberman Show
A primer on Identity Security for Agentic AI
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Show more...
2 months ago
18 minutes

The Cyberman Show
Vibe Coding: Risks and Security Best Practices #101
Send us a text This episode offers an extensive exploration of AI-driven code generation, known as vibe coding. This episode details how AI tools like Lovable simplify app development for both technical and non-technical users by generating code from natural language prompts. It contrasts this emerging practice with traditional software engineering and the future of AI-native development. The podcast also highlights significant cybersecurity risks associated with AI-generated code, citing rep...
Show more...
3 months ago
21 minutes

The Cyberman Show
MCP Servers and Their Increasing Usage in Cybersecurity #100
Send us a text Today's episiode introduces Model Context Protocol (MCP), an open standard designed to enable Artificial Intelligence (AI) applications, particularly Large Language Models (LLMs), to seamlessly interact with third-party tools and data sources. It explains MCP's architecture, including hosts, clients, servers, and external tools, and highlights its benefits such as eliminating knowledge cut-offs, reducing hallucinations, and enhancing AI's capability to perform real-world acti...
Show more...
3 months ago
16 minutes

The Cyberman Show
Forrester Wave Security Analytics Report: Leaders, Trends & What It Means For YOU! #99
Send us a text Today's episode provides a comprehensive overview of a Forest Wave security analytics platform report, acting as a guide for understanding the evolving landscape of security solutions. The discussion centers on evaluating various platforms, including Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) products, based on product features and strategic approaches. It highlights key evaluation parameters like analytics, user behavior analysis...
Show more...
3 months ago
18 minutes

The Cyberman Show
Network Detection and Response: Basics, Usecases and Gartner 2025 MQ : EP 98
Send us a text Todays episode vocers a comprehensive overview of Network Detection and Response (NDR) technology, explaining its core function in detecting abnormal and malicious system behaviors by analyzing network traffic data. It outlines key features such as data ingestion, detection, and response, and discusses common use cases including lateral movement and insider threat detection, even extending to Operational Technology (OT) environments. The text also reviews the current market ven...
Show more...
4 months ago
21 minutes

The Cyberman Show
Beyond Vulnerabilities: Your Guide to Cyber Threat Exposure Management (CEM) & The Power of AI| EP 97
Send us a text Today's episode offers a comprehensive overview of Cyber Threat Exposure Management (CTEM), defining it as a proactive framework for continuously evaluating digital and physical asset accessibility, exposure, and exploitability. It clarifies foundational cybersecurity concepts such as vulnerabilities, attack surface, threats, and impact, explaining how their interplay creates exposure. The speaker categorizes various types of exposure, from internet-facing systems to data leaka...
Show more...
4 months ago
21 minutes

The Cyberman Show
Securing the AI Age: Ankur Shah on the Explosive Growth of AI and Cybersec Challenges #aisecurity
Send us a text Ankur Shah, co-founder and CEO of Straiker, shares his career journey, highlighting his experience in various tech sectors before focusing on the current AI landscape. Together, we discussed the impact of AI on building applications and the resulting *cybersecurity challenges , including AI as a potential threat vector and the unique security needs of the evolving AI supply chain. The conversation also touches on emerging security solutions and offers advice for in...
Show more...
6 months ago
36 minutes

The Cyberman Show
Breakdown of AI App Infrastructure and threats on each layer EP95
Send us a text #aicybersecurity #aicybersecurity Today's episode introduces the landscape of securing AI, beginning with how AI is utilized in cybersecurity and the increasing accessibility of AI infrastructure through major cloud providers. It outlines common applications of generative AI and large language models across various industries. The core of the discussion then shifts to the potential threats within the AI infrastructure itself, breaking down vulnerabilities across component...
Show more...
6 months ago
27 minutes

The Cyberman Show
March 2025 Cybersecurity Recap EP 94
Send us a text Get up to speed with everything that mattered in cybersecurity this month. In this episode of The Cyberman Show, we break down March 2025’s top cyber incidents, threat actor tactics, security product launches, and vulnerabilities actively exploited in the wild. Here’s what we cover: 🔐 Oracle Cloud breach claim exposing 6M user records 🎯 Google's $32 billion acquisition of Wiz – What it means for CNAPP and multi-cloud security 🐛 GitHub Actions supply chain attack targeting Coinb...
Show more...
7 months ago
17 minutes

The Cyberman Show
An introduction to Next-Gen SIEM: AI-Powered Security for Modern Threat Detection and Response EP 93
Send us a text In this week's episode, we explore the exciting evolution of Security Information and Event Management (SIEM)—the Next-Generation SIEM (NGSIEM). Traditional SIEM solutions have long been crucial for cybersecurity, but they're facing significant challenges with modern infrastructures. Discover how NGSIEM tackles these limitations through advanced AI analytics, machine learning, cloud-native deployment, enhanced data parsing, and powerful automation capabilities. Don...
Show more...
8 months ago
15 minutes

The Cyberman Show
Cybersecurity Platforms: The Shift Towards Consolidation EP #92
Send us a text The cybersecurity landscape is shifting fast, and platform consolidation is becoming the go-to strategy for enterprises looking to simplify security operations. In this episode, we dive deep into cybersecurity platforms, what do they mean, the areas where consolidation is happening, analyst view and much more. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.link...
Show more...
8 months ago
16 minutes

The Cyberman Show
The Rise of Secure Enterprise Browsers: The Next Step in SASE Evolution: EP 91
Send us a text This episode focuses on Secure enterprise Browser. We cover What is SEB, Gartners View, Market Growth, Key Features and Benefits of Enterprise Browsers and Extensions, How it Works, Typical component in SEB Products, Usecases, What happens to existing default browsers, How is it related to SSE etc Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/p...
Show more...
8 months ago
20 minutes

The Cyberman Show
2024 Cybersecurity Recap: Incidents, M&A and Emerging Cybersecurity Technology #90
Send us a text Highlight of 2024 that should not be missed including Cybersecurity Incidents, Interesting Mergers and acquisitions and emerging technology. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and...
Show more...
9 months ago
13 minutes

The Cyberman Show
Building Secure AI: Unpacking the AI Architecture and Its Threats
Send us a text In todays, episode, we will explore how the AI architecture looks like, understand these components, and threats that exist at each layer. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twitter handle https://twitter.com/prashant_cyber PS: The views are my own and d...
Show more...
1 year ago
12 minutes

The Cyberman Show
July 2024 Cybersecurity Highlights: A Recap You Can't Miss!
Send us a text Today's cybersecurity podcast report contains activity in cybersecurity industry including: Introduction Where is the money going Cybersecurity Incidents Interesting TTPs 2024 Gartner MQ for Single Vendor SASE Vulnerabilities Worth Noting Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtub...
Show more...
1 year ago
17 minutes

The Cyberman Show
How AI based cybersecurity is evolving? AI Cyberwatch
Send us a text In todays, episode I have collated how AI based cybersecurity industry is growing. This includes use of AI to improve existing products or creating new products that solve existing issues. Watch the show for details. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube Channnel : https://www.youtube.com/@TheCybermanShow Twit...
Show more...
1 year ago
11 minutes

The Cyberman Show
Notes from Gartner's Single Vendor SASE report for 2024 #86
Send us a text Dive into the latest insights from Gartner's Single Vendor SASE Report for 2024 in this episode of The Cyberman show . We break down the key findings and trends shaping the Secure Access Service Edge (SASE) landscape, focusing on single-vendor solutions and their impact on cybersecurity. Whether you're a security professional, IT leader, or tech enthusiast, this episode provides actionable intelligence on how single-vendor SASE solutions are evolving and what it means for your ...
Show more...
1 year ago
10 minutes

The Cyberman Show
What is Network Detection and Response? #85
Send us a text Join us in this insightful episode as we delve into the world of Network Detection and Response (NDR). Discover how NDR enhances your network security by detecting threats in real-time, providing deep visibility into network activities, and enabling rapid incident response. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube...
Show more...
1 year ago
16 minutes

The Cyberman Show
Cybersecurity Recap for May 2024 #84
Send us a text The recap contains activity in cybersecurity industry including - Mergers and Acquisitions - Breaches from various industries like healthcare, media, IT, Retail etc - Interesting reports and articles that I recommend for reading. - Gartner MQ for SIEM for 2024 Link to the blog that has links https://thecyberman.substack.com/ Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: ...
Show more...
1 year ago
17 minutes

The Cyberman Show
What is API Security? API Security Risks, API Market Landscape #83
Send us a text Todays episode contains basics of API Security. The podcast covers the following topics: 00:00 Introduction 00:51 What is API? 04:53 Common Terms Associated with API 09:23 API Landscape 10:58 What is API Security? 12:32 API Security Risks 15:02 OWASP Top 10 for API Security 15:39 API Attack Workflow 18:29 Story of Real API related Security Incident 19:17 API Security Best Practises 20:21 API Security Market Landscape 24:41 Appsec vs API Security Link to my blog on "API Securi...
Show more...
1 year ago
28 minutes

The Cyberman Show
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...