Channel Avatar

CISO Series @UC9ksdhUaDEEyltTxBc2AzfQ@youtube.com

6.1K subscribers - no pronouns :c

This is the home for CISO Series which examines the mutual d


24:53
Week in Review: MFA bypass bust, Airport security SQL, GitHub help malware
07:44
Planned Parenthood cyberattack, DoJ propaganda takedown, Microchip Technology theft
29:47
Hiring Cyber Teenagers with Criminal Records
07:05
Spyware research, Cicada rebrand, MacroPack malware
08:30
Halliburton data stolen, Columbus sues researcher, White House protects internet
03:11
Automating Network Alert Investigations with Dropzone AI
02:43
Secure, Manage, and Validate Your Cloud-Based Email with Material Security
37:50
Red Flag? My Vendor Just Asked for My Mother’s Maiden Name
07:36
London transport cyberattack, German ATC attack, Sweden’s heightened risk
08:07
Seattle airport woes, aircraft cockpit SQL, North Korea’s FudModule
03:05
How ThreatLocker uses "deny by default" Zero Trust to enable businesses
08:13
DICK’S Sporting Goods cyberattack, Brain Cipher hacked Paris
31:02
What's Working With Third-Party Risk Management?
07:40
Iran hacking, Labour Party backlog, more Telegram warrants
08:06
Another MOVEit incident, U.S. Marshals disputes breach, Park’N Fly data swiped
02:47
Beating MFA Fatigue and AI-Driven Attacks with DirectDefense
03:51
Focus on DevSec issues that touch your environment with Backslash (08-27-24)
37:21
Well, I Think My Relationship With the CIO Improved When I Took Their Job
07:05
SonicWall access flaw, Microsoft security summit, Telegram details
07:19
Halliburton suffers cyberattack, Telegram CEO arrested, Georgia Tech lawsuit
31:12
Week in Review: NPD breach update, Hawaii hacker sentenced, Poisoned LLM coders
07:50
Russia’s questionable DDoS, FAA’s cybersecurity proposal, Windows Recall reappears
33:27
What Triggers a CISO?
07:20
Japanese auto security, Feds tap encrypted messages, Microsoft breaks Linux dual-booting
07:42
Toyota third-party breach, Hawaii registry hack, Iran disrupting campaigns
02:45
Mastering Data Visibility for Secure AI Adoption with Cyera
42:14
I Said I Was Technically a CISO, Not a Technical CISO
08:25
National Public Data breach update, Flaws in macOS apps, FlightTracker configuration issue
03:04
How ThreatLocker uses Ringfencing to prevent attackers from taking advantage of trusted software
07:31
Entra forces MFA, another AnyDesk heist, Google Pixel vulnerability
02:08
Combining Continuous Pentesting with Attack Surface Management
26:21
Week in Review: NIST encryption standards, NPD breach analyzed, Texas sues GM
08:38
GitHub artifact warning, RansomHub’s EDR killer, SolarWinds latest hotfix
26:41
Information Security vs. Cybersecurity
08:22
Gemini AI privacy, AI Risk Repository, Russian phishing
08:35
FBI shutters Radar, NIST post-quantum standards, 2.7B record leaked
03:15
Understanding AI Bias and Security with NetSPI
39:12
Why Are Fortune 500 Companies Swiping Right on 3-Person Startups?
08:23
U.S. “laptop farm” shut down, Ukranian computers compromised, Trump campaign hacked
07:42
Iran election interference, AMD SinkClose flaw, ADT break-in
28:37
Week in Review: CrowdStrike releases Falcon, ransomware as terrorist threat
08:19
Chameleon malware reappears, Rhysida hospital attack, Blacksuit’s $500m tally
30:08
Should Deny By Default Be the Cornerstone of Zero Trust?
08:14
McLaren hospitals disrupted, CrowdStrike improves processes, Ronin Network hacked
08:15
Android kernel zero-day, voter portal flaw, ransomware as terrorism
03:05
How NetSPI Built a Proactive Security Platform
03:04
How ThreatLocker Manages and Secures Unknown Devices on Your Network - (08-08-24)
37:39
We Make Threat Actors Read Our Resiliency Policy Before Attacking Us
08:42
CrowdStrike strikes back against Delta, Keytronic loses millions to ransomware, Flaw in Apache OFBiz
07:51
Software update malware, investors sue CrowdStrike, cybercriminals in prisoner swap
25:13
Week in Review: CrowdStrike problems grow, record breaking ransom, Argentina’s Minority Report
07:08
Cencora patient breach, OneDrive phishing campaign, Argentina’s crime predictions
29:32
What Is a Field CISO?
07:34
Elections and DDoS, dating apps leak locations, Germany blames China
07:54
Delta's legal maneuver, Record-breaking ransom, Meta $1.4B settlement
02:44
The Challenges and Responsibilities of CISOs with Halcyon
35:26
Incident Response Is So Important We Might Try Getting Good At It
08:07
HealthEquity data breach, CrowdStrike impact grows, Proofpoint exploit
03:04
Continuously Monitoring and Securing API Traffic With Vorlon
03:37
Addressing the Criticality of Data Security With Cyera (08-01-24)