Channel Avatar

Illusive @UCzjVDdA6yzlphGoFn6ngXgQ@youtube.com

428 subscribers - no pronouns :c

Illusive takes away the one thing attackers need to be succe


29:01
Faster Incident Investigation with Forensics-on-Demand
01:36
Attack Surface Manager - Revealing and removing high-risk paths to critical systems
57:41
How Illusive Helps with Threat Hunting and Incident Investigation
01:00:10
Securing Active Directory: How to Reduce Blind Spots and Paralyze Attackers
01:30
Slash Incident Investigation Time with Forensics on Demand
41:28
NIST and Deception - Aligning with US Federal Cybersecurity Guidelines
01:00:19
Angreiferfrüherkennung durch Deception Technologie (webinar)
46:04
Defending Hybrid, Cloud-Enabled Ecosystems - Stopping Attacker Movement
58:46
6 Real Security Incidents Detected and Stopped by Deception
56:10
How Working Remotely has Changed our Approach to Endpoint Security
59:57
Deception technology more than just hoodwinking hackers
55:45
Cyber Deception for Banks and Financial Services
02:01
Defend Hybrid, Cloud-Enabled Ecosystems - Become Illusive
43:27
Eliminate Lateral Movement: Deception-based Early Detection
46:08
Save the SOC How to Increase Investigation Speed, Efficiency and Accuracy (webinar recording)
53:12
Agentless, Authentic Deception Technology At Scale – Illusive Webinar with Enterprise Strategy Group
01:00:37
Webcast: Outside Looking In - How to Stop the Rapid Rise of Insider Threats
28:17
Cyber Resilience through Attacker Deception: What Contractors Must Know to Achieve CMMC Compliance
01:37
Become Illusive - Make Your Environment Hostile to Attackers
27:01
Collecting the Right Forensics for Faster, More Accurate Threat Response
01:08:33
Webcast - Scenes from the New Normal: Cybersecurity in Uncertain Times
31:36
Webcast - Stop Chasing Alerts, Start Catching Attackers
11:44
Digital Anarchist RSAC 2020: Stop Chasing Alerts. Start Catching Attackers.
13:28
Digital Anarchist RSAC 2020: Illusive Forensics for Faster Threat Response
09:12
Digital Anarchist RSAC 2020: The Power of Cyber Hygiene to Thwart Lateral Movement Attacks
01:00:01
Discover and Eliminate Cyberattack Pathways to Critical Assets with Attack Surface Manager
15:58
Deception Based Security with Matan Kubovsky
11:14
Strategies for Managing the Risk of Targeted Attacks
52:44
Webcast - Improving SOC Efficiency with Deception
01:01:31
Webcast - How to Stop Attacker Movement in Your Network Before They Reach Your Crown Jewels
59:30
Webcast: Deception Technology The Facts, Fiction and Why Its No Longer Just A Nice To Have
57:06
Webcast - Managing the Risk of Post-Breach or "Resident" Attacks
01:05
Illusive's Attack Surface Management Episode 3: Blowing the Whistle
01:16
Illusive's Attack Surface Management Episode 2: Unearthing Domain Admins on 3000 Machines
01:01
Illusive's Attack Surface Management Episode 01: Wiping Out 2000 Dangerous Local Admins
01:48
Prevent Cyberattacks by Stopping Lateral Movement | Illusive Networks Cybersecurity
08:54
Using Threat Deception on Malicious Insiders
11:14
Illusive Networks - Strategies for managing the risk of targeted attacks by Ivan Foreman
01:39
Illusive Networks. Make the First Move.