Channel Avatar

Picus Security @UC5mXhfkplWvuVW2Jx9MvOIw@youtube.com

605 subscribers - no pronouns :c

Picus Security, the leading security validation company, giv


08:24
Detect and Stop Credential Exploits Before They Escalate
59:47
Rethinking Automated Penetration Testing: Be Stealthy and Risk-Free
05:48
Breach and Attack Simulation (BAS) in India: Adoption & Trends
02:31
Palo Alto PAN-OS Vulnerabilities Explained: CVE-2024-0012 & CVE-2024-9474
03:28
Transforming Cyber Maturity in Indonesia: Zane Lim at IndoSec
51:05
Be Digital Operational Resilience (DORA) Ready: Expert Insights for Compliance
01:00
Validate your Zero Trust program with Breach and Attack Simulation
01:13
Why "Assume Breach" is the future of cybersecurity
01:16
Zero Trust Security model explained
00:49
Picus CISO Briefing: Defining the Future of Exposure Validation
08:28
Securing Active Directory: How Attackers Exploit Weaknesses to Compromise Domain
01:00:04
Assessing Your Zero Trust Program with "Assume Breach" Mindset
15:22
Reduce Cyber Risk with Threat Exposure Management | CEO of Picus Security Explains
58:28
Is Your AWS Cloud Secure? Learn Proven Tactics to Strengthen Your Defenses
40:33
You’ve Heard of CTEM, But What About Exposure Validation? Find Out Now!
01:10
Accent Challenge: Different Words, Same Picus!
01:03
Take control of your cyber exposures with CTEM | Join us for virtual briefing
10:30
Vulnerability Management Isn’t Enough: What’s Next?
01:08
Exposure Validation Briefing - Mark Your Calendars 🚨
07:05
Crack the password safely before hackers do
37:21
Validación Automática de Seguridad con Picus | Demo
58:23
Continuous Threat Exposure Management: Navigating Cybersecurity Tradeoffs | Picus Security Webinar
01:01:32
Cybersecurity in Financial Services: Strategies for Enhancing Operational Resilience
57:12
Top Ten ATT&CK Techniques: The Rise of ‘Hunter-Killer’ Malware - Picus Security Webinar
01:06:30
Understanding Lateral Movement Attacks and Proactive Defense Strategies
05:21
Picus | Revolutionize automated pentest with a few clicks
03:06
Discover Actionable Threat Intelligence: CTI-Led Security Validation Tutorial
02:03
Black Basta Ransomware Explained - CISA Alert AA24-131A
01:06:36
How Modern Malware Evades Your SIEM and EDR Controls | Picus & SANS Webinar
16:24
Security Validation at RSA 2024 | Interview with Volkan Ertürk - Co-founder of Picus Security
58:46
[On-Demand] Maximizing Cybersecurity with GenAI
01:59
PAN-OS Command Injection Vulnerability Explained - CVE-2024-3400
02:02
XZ Utils Backdoor Explained - CVE-2024-3094
20:46
Validating Your Security Against Hunter-Killer Malware | A Picus Platform Demo
01:35
Picus Security and CrowdStrike Integration Demo - Creating Indicators of Attack
01:34
Picus Attack Surface Validation Demo: Navigating Cyber Risk with Enhanced Attack Surface Validation
07:24
Reduce Your Cyber Risk: The Power of Automated Security Validation with Picus
11:03
Optimizing SIEM & SOC Productivity: A Proactive Approach with Picus Security
08:10
How MSSPs Leverage Picus for Optimal Defense
01:52
Looney Tunables Linux Privesc CVE-2023-4911 Attack Simulation & Mitigation with Picus
01:54
Rhysida Ransomware Attack Simulation & Mitigation with Picus
12:05
Black Hat USA 2023: Sektör Liderleriyle İçgörüler ve Deneyimler
00:54
Picus Security at Black Hat USA 2023: Top Gun Mission Recap!
04:55
Proactive Threat Simulations | Interview with Picus Security APAC Regional Sales Director
01:24
Level Up Your Cybersecurity Defense with Picus Security | Black Hat 2023
01:25
Join Picus Security at Black Hat USA 2023 - Engage, Learn, Win!
03:14
Favorite Features of Picus: Customer Insights at the Cyber Risk Summit Istanbul
02:37
Transforming Operations with Picus: Insights from Our Customers at the Cyber Risk Summit Istanbul
01:39
Choosing Picus - Insights from Aygaz, Dogus Technology, and Isbank at the Cyber Risk Summit Istanbul
18:26
Unleashing Security Control Validation: Identifying the "Unknown Unknowns"
04:36
Simulating Top 10 Attacks: A Demonstration using The Picus Complete Security Validation Platform
00:45
Cyber Risk Summit Istanbul 2023 Highlights: Uniting Leaders in Cybersecurity
01:01
Picus Security - Cyprus 2022 Get Away
05:14
Picus Security CTID Adoption Spotlight - Top MITRE ATT&CK Techniques
03:55
How Picus Works?
01:30
Validate your Security Controls with The Picus Complete Security Control Validation Platform
05:23
What is Log4Shell Vulnerability? Check 4-Step Immediate Mitigation for Log4j Attacks
05:16
Operationalizing the MITRE ATT&CK Framework for Security Operations Centers (SOCs) Course
04:51
Rethinking Validation Strategies Achieving Security Optimization & Effectiveness in the New Normal