Channel Avatar

Security Innovation @UC9YoIYdh4GGOsAr4Nt5HM6Q@youtube.com

1.12K subscribers - no pronouns set

Security Innovation is an authority on software security and


00:29
Introducing Shadow Health, the Game-Changing Cyber Range
02:28
Surprise Findings from Recent Cybersecurity Training Benchmarks Report
03:40
Managing Product Risk: Assessing How Bad is 'Bad' When Threats Surface
03:07
Strategies Companies Should Use to Address the Cybersecurity Skills Gap
02:07
How to Find Success with Compliance to Avoid Risk in Security & Engineering
00:06
Introducing Security Innovation Cyber Skills Competency (SI-CSC) Certification Program
03:24
Admirable Leadership Qualities in Advancing Diversity & Inclusion in Cybersecurity
00:32
Security Innovation Turns 20: Shoutout from Joshua Berkoh
03:17
Pitfalls Companies Make When Creating a Security Champions Program
01:54
Security Innovation Turns 20: Shoutout from Charles Kolodgy
00:59
Meet CMD+CTRL Cyber Range InfiniCrate - a Cloud Storage Application Built on AWS
00:54
Meet CMD+CTRL Cyber Range Forescient - an AWS, Cloud-Based, Intentionally Vulnerable Application
00:42
Meet CMD+CTRL Cyber Range MailJay - a Marketing Automation Software-as-a-Service (SaaS) Application
00:46
Security Innovation Turns 20: Shoutout from Mark Nesline
00:59
Security Innovation Turns 20: Shoutout from William White
00:52
Security Innovation Turns 20: Shoutout from Trupti Shiralkar
00:39
Security Innovation Turns 20: Shoutout from Sandy Dunn
00:34
Security Innovation Turns 20: Shoutout from Satish Janardhanan
00:13
MailJay: The Latest CMD+CTRL Cyber Range from Security Innovation
01:11
Security Innovation Turns 20 This September #cybersecurity #appsec #software
01:44
CMD+CTRL Labs - Build Skills Through Hands-On Exposure to Modern Cybersecurity Threats
01:16
Ed TALKS: Diversity & Inclusion in Cybersecurity – Reaping the Rewards
00:51
Ed TALKS: Security’s Three-Ring Circus Cloud, Supply Chain, and Staff
01:24
CMD+CTRL Base Camp - Cybersecurity Training that Goes Beyond the Code
02:14
CMD+CTRL Cyber Range Training - The Fun Way to Build and Assess Cybersecurity Skills
00:27
CMD+CTRL Cyber Range - Prepare Teams Differently for the Cybersecurity Battle
10:49
Cyber Range and CBT Blended Learning
23:44
CMD+CTRL Peek & Play
02:23
Everything You Need to Know About Insider Threats... In 2 Minutes
02:08
Everything You Need to Know About GDPR... In 2 Minutes
02:17
OWASP Top 10: SQL Injection
02:27
OWASP Top 10: XSS Stored and Reflective
03:07
Security Awareness Training in 30 Days!
04:38
Security Awareness Training in 30 Days! (German)
47:27
Reducing Application Risk: What Technology Can & Can't Protect Against
02:15
Everything You Need to Know About the Internet Of Things (IoT)... in 2 Minutes
49:00
HTML5 Security: The Promise and the Peril
02:16
CMD+CTRL Hackathon from Security Innovation
01:16
Security Tips from an Engineer: Keep Those Passwords Secure!
02:45
What is Post Quantum Cryptography?
03:40
Application Security Conundrum
01:00:17
Best Practices for a Mature Application Security Program
01:01:47
Car Cybersecurity: What do Automakers Really Think?
01:48
V2V 101 - Introduction to Vehicle to Vehicle Communications
51:30
Webcast: Integrating PCI Compliance Security Awareness Into Your Culture of Security
16:13
A Software Engineer’s Career Path into Application Security
01:04:26
Using Security Metrics in the SDLC to Improve Application Security
59:17
Webcast: Uninformed Staff Leaving Organizations Vulnerable
02:43
Course Preview: OWASP Top 10 Threats and Mitigations
49:44
NTRU - A Secure, High Performance Alternative to RSA or ECC
06:43
Android Mono Decompile Demo
07:16
iOS Disassemble Demo
03:02
Attacking Silverlight
01:05:04
Webcast: Reducing the Cost of Secure Software Development
02:30
TEAM Academy Use Case 1
48:37
Webcast: Enterprise Application Risk Assessment -- Techniques for an Effective Program
01:05:11
Webcast: HTML5 & Javascript Security
28:14
Webcast: Faster & Better Remediation with Security Innovation's TeamMentor and Checkmarx's CxSuite
01:00:30
Webcast: Using Security Metrics in the SDLC to Improve Application Security
43:35
Webcast: Conducting an SDLC Gap Analysis Using Industry Best Practices