Channel Avatar

The CISO Perspective @UCQEhlRARO5HLmHSNdgi_QIw@youtube.com

0 subscribers - no pronouns :c

The CISO Perspective was created as a free resource for the


12:20
Deepfakes Using Stable Diffusion: Creating and Identifying
11:25
Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security
06:36
What is Security Service Edge (SSE)? SASE vs SSE vs VPN
07:44
What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained
09:08
Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work
10:16
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
08:50
What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained
06:57
T-Mobile Data Breach: Timeline, Analysis and Lessons Learned
08:54
What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response
10:39
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
07:43
Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
08:07
What is Open Source Intelligence (OSINT)? The OSINT Tools, Techniques and Framework Explained
07:50
What is Secure Access Service Edge (SASE) ?
07:23
How to Use Canary Tokens for Threat Hunting
11:38
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
07:02
Securing Your VPN: Six Considerations
06:42
The Iran Cyber Threat: What You Need To Know
06:39
VNF: Five Considerations in Virtualizing Your Perimeter
11:53
Securing SD-WAN: 5 Considerations
14:04
ATT&CK Matrix: The Enemies Playbook
07:48
Securing Your AWS Virtual Private Cloud
06:25
Accomplishing Zero Trust Security Using SDP
13:18
Breaking The Kill Chain: A Defensive Approach
07:07
5 Terrifying Cyber-Security Trends for 2019
07:17
5 Considerations: Sizing Your Next-Gen Firewall (NGFW)