Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Power of Automated Discovery for Testing Security Posture Brice Daniels, Director - Mandiant Consulting ; Chuck Gabriele, Senior Consultant - Mandiant Consulting Establishing and maintaining a comprehensive internal and external view of enterprise infrastructure is largely manual. For red teams or penetration t... 1 week ago | 43 mins So Much to Do, Never Enough Bandwidth: A Tale of Two Tech Directors Nick Terkay, Jay Paz Watch as security and development leaders interact in an open discussion on the State of Pentesting 2022 Report. This discussion is led by Cobalt’s Sr... 3 weeks ago | 46 mins [Replay] Radware Threat Researchers Live - ep.16 - Game Hacking Special w/ Cyrex Pascal Geenens & Daniel Smith, Radware This Episode is an Online Game Hacking Special with Mathieu Huysman, co-founder & COO of Cyrex, an expert penetration tester and ethical hacker. Mathi... 6 months ago | 80 mins MS Teams und Office 365 als neue Zielscheibe für Cyberkriminelle [German] Yves Kraft, Penetration Tester & Security Consultant, BSc FH CS, ISO 27001 Lead Auditor, OSCP, OPST, OSSTMM Trainer Gerade in Zeiten von COVID-19 wird die Digitalisierung in unterschiedlichen Bereichen zwangsläufig vorangetrieben. Damit rückten in den letzten Monate... 1 year ago | 71 mins Tips and Tricks to Penetration Testing - A Layered Security Approach Kaushik Srinivas and Michael Skelton (Codingo) Pen testing is widely known as a key security best practice. In fact, in June of 2021, The White House released a memo encouraging business leaders to... 11 months ago | 45 mins Cyber Security: Lifting the veil of Hacking Fábio Morais Fábio’s career extends over 20 years where he has specialised in Information Technology as part of international Senior Management teams of large corp... 5 months ago | 41 mins Thursday ThreatCast: How Cyber Criminals Use XSS and Session Hijacking Mark Shaneck, Senior Cybersecurity Content Architect Cross-site scripting (XSS) injections empower attackers to manipulate a victim’s web browser to run malicious scripts disguised as actual web server p... 5 months ago | 47 mins Automate Cyber Rapid Response With Autonomous Threat Sweeper Oliver Rochford, Sr Director, Security Evangelist & Sina Chehreghani, Manager Threat Hunting & Incident Response, Securonix With an average of 33 new threats every month that merit closer scrutiny, the time that security teams are spending on incident response is increasing... 4 months ago | 46 mins Von einem Hacker erklärt: «Lateral Movement» Leise auf Umwegen zum Ziel [German] Yves Kraft, Penetration Tester & Security Consultant, BSc FH CS, ISO 27001 Lead Auditor, OSCP, OPST, OSSTMM Trainer Im heutigen Webinar betrachten wir, wie sich Angreifer in Unternehmensnetzwerken unbemerkt ausbreiten. In der IT-Security-Branche bezeichnet man mit «... 1 year ago | 94 mins Hacker erklärt: im Schatten des Domain Controllers - DCSync & DCShadow [German] Yves Kraft, Penetration Tester & Security Consultant, BSc FH CS, ISO 27001 Lead Auditor, OSCP, OPST, OSSTMM Trainer In diesem Webinar werden zwei populäre Attacken auf Domain Controller in Windows-Umgebungen vorgezeigt und detailiert erklärt. Dabei handelt es sich u... 1 year ago | 97 mins Load more