Channel Avatar

Phoenix Security @UC6TyzLt6UnL9mmC5ynrrNLw@youtube.com

4.4K subscribers - no pronouns :c

This channel is focused on promoting application security kn


03:48
Log4j Vulnerability: Root Cause Analysis with AI
03:54
Log4j Vulnerability: Root Cause Analysis
03:54
Log4j Vulnerability: Root Cause Analysis
03:54
Log4j Vulnerability: Root Cause Analysis
02:34
Log4j Vulnerability: Root Cause Analysis
34:59
Patch Fatigue: The Unseen Cyber Crisis in Application Security and Vulnerability Managment !
06:12
Elevate #vulnerabilitymanagement: Phoenix Securityโ€™s Blast Radius & Business Unit Impact #copilot ๐Ÿ”
04:04
How Cybersecurity Exploits ACTUALLY Work - appsec to cloudsec why vulnerabilities keep on winning
01:53
Unlocking Network Security: The Evolution of Scanning Techniques
04:07
Solve Cloud Security Challenges: Lineage, Attribution & Reachability
01:34
Stop Vulnerability Burnout: A 4D Risk Formula
02:58
NVD's HUGE Backlog: Vulnerability Crisis Explained
01:15
Unused Libraries? Delete them NOW!
01:38
Solve App Security: Lineage & Attribution
04:42
Solve Code Ownership & Security Challenges
03:44
Ultimate Guide to Modern Cloud Security
02:47
EU vs. US: AI Regulation Showdown
03:16
Compliance vs Security: Finding the Middle Ground
03:41
Container Security: From Reactive to Proactive
09:43
Master #applicationsecurity in #Cloud native #vulnerabilitymanagement - Reachability Analysis ASPM
01:18
Unlocking Modern Scanning Secrets for Code Safety!
01:53
Unlocking Network Security: The Evolution of Scanning Techniques
01:30
Mastering Vulnerability Scans: Insights from Snyk and Trivy
01:27
Uncovering Vulnerabilities: The Power of Container Scanning!
01:00
Prioritizing CVEs: Runtime vs Code Vulnerabilities Explained! The power of Reachability Analysis
01:36
Reachability Analysis: Less Intrusive, More Flexible
01:21
Prioritize Vulnerabilities: Stop the Security Mess!
03:17
Stop Reacting, Start Preventing: Proactive Security
01:38
DevOps FAILED? Bridging Security Communication Gaps
02:16
AI Simplifies #Cybersecurity: focus on #Vulnerabilities leveraging a Threat Centric approach
02:19
Why Are #Software #Vulnerabilities Exploding?
02:23
AI Solves Age-Old Security Root Cause Problems
01:15
Software Supply Chain Security: Solved?
03:56
#CyberWalk EP5 Understanding Traceability and recheability analysis #ASPM #applicationsecurity
03:53
#CyberWalk EP4 #DemystifyingReachability #CyberSecurityTalks #aspm #application security
00:30
Unleash Your Passion: Designing with Excitement
00:35
Unlocking Success: The Power of Asset Inventory Systems
01:01
Harnessing the Power of Storytelling in Leadership
01:28
Boost Security with the 2-Way Communication Model
02:28
Boosting Product Quality: The Key to Leadership Support
00:30
Unleash Your Passion: Designing with Excitement
00:51
Transforming Application Security: The Role of Champions
02:49
Unlocking the Power of Rewards: Status, Access, and More
03:09
TOP #Exploited #Vulnerabilities in 2023/24 #CISA Vulnerabilities Analysis! ๐Ÿšจ Must Know Insights! ๐Ÿ“Š
02:33
Unlocking #Reachability: Navigating Software and Network Complexity with #prioritization
04:31
Mastering #Container #Security: Effective #Patching Strategies focusing on version #cybersecurity
02:50
Understanding #Runtime #Reachability and Its Impact on #Security #cybersecurity #aspm
04:31
Mastering #Container #Security: Effective Patching Strategies #containersecurity #cybersecurity
01:50
Mastering #vulnerabilitymanagement: The Dynamic Approach You Need in #cloudsecurity
02:03
Navigating Security: Balancing Risk and #vulnerabilitymanagement #prioritization #cybersecurity
02:52
Unlocking the Power of #VEX Statements for Tech Innovation #cybersecurity
06:52
Mastering Vulnerability Management: The Human-Automation Balance
02:12
Transforming Linux Updates: Simplifying Your DevOps Strategy
06:52
Mastering Vulnerability Management: The Human-Automation Balance
04:07
#ASPM and #CNAPP with #Reachability #Analysis: A Deep Dive into #Contextual Vulnerability Management
02:28
#EPSS #Reachability Analysis & Vulnerability Prioritization and #vulnerabilitymanagement
01:15
Phoenix ISC2 Appsec & Fintech cybersecurity 2024: Vulnerability in code to cloud discover new trends
01:54
Unlocking AppSec Mastery at Global #AppSec SF 2024 | Exclusive Workshops, Giveaways & More!
50:50
#cybersecurity #Vulnerabilities: Moving away from #CVSS into #riskbasedprioritization for ASPM 2024
05:47
CVE-2024-6387 #OpenSSH wild #Vulnerability regreSSHion Explained do you need to worry?