Channel Avatar

Noname Security @UCwYdZhlLQngd0lWgEUDACIA@youtube.com

None subscribers - no pronouns set

Noname Security creates the most powerful, complete, and eas


04:24
What is a Computer Security Incident Response Team (CSIRT)? | Noname Security
04:46
What is a Security Operations Center? | Noname Security
03:56
What is Data Exfiltration? | Noname Security
04:10
What is Business Logic? | Noname Security
04:37
What is CSPM? | Noname Security
04:01
What is API Posture Management?
04:21
Noname Advanced API Security for IBM
04:42
What is Defense in Depth? - Definition, Examples, and Strategic Implementation
03:12
What is Business Continuity Planning (BCP) - Definition, Impact and Elements of a Good BCP
04:48
What is a Product Security Incident Response Team (PSIRT) - Importance and Best Practices
02:54
What is a SOAP API - Definition, Examples, and Security Considerations
04:19
What is Identity and Access Management (IAM) - Definition and Importance
04:58
What is Data Security? - Definition and Implementation
04:55
What is an Attack Surface? - Defining, Identifying, and Mitigating Cyber Risks
02:44
What is API Abuse? | Noname Academy
03:56
What is Rate Limiting? - Definition, Methods, and Why It Is Important
02:19
Why Noname for API Security
02:48
What is API Authentication? - Definition, Implementation, and Security Strategies
04:07
Unsafe Consumption of APIs (API10:2023) - OWASP API Security Top 10
03:53
Improper Inventory Management (API9:2023) - OWASP API Security Top 10
04:02
Security Misconfiguration (API8:2023) - OWASP API Security Top 10
04:55
Server-Side Request Forgery (API7:2023) - OWASP API Security Top 10
05:39
Unrestricted Access to Sensitive Business Flows (API6:2023) - OWASP API Security Top 10
05:52
Broken Function Level Authorization (API5:2023) - OWASP API Security Top 10
05:32
Unrestricted Resource Consumption (API4:2023) - OWASP API Security Top 10
05:38
Broken Object Property Level Authorization (API3:2023) - OWASP API Security Top 10
05:45
Broken Authentication (API2:2023) - OWASP API Security Top 10
08:44
Broken Object Level Authorization (BOLA) (API1:2023) - OWASP API Security Top 10
02:41
How to Secure Your Financial Services APIs
07:32
Accelerating API Security with Intel & Noname Security
03:10
Horizontal vs Vertical Scaling: Which One is Better for APIs?
02:48
What is GraphQL? - Benefits, Drawbacks, and Security Insights
02:51
What is Penetration Testing - Definition, Examples, and Importance in Cybersecurity
02:27
What is a Web Application Firewall (WAF) - Definitions, Examples, and Limitations
02:02
What is API Discovery? - Definition, Importance, and Solutions
02:10
What is API Runtime Protection? - Definition, Examples, and Solutions
01:49
Uncover API Vulnerabilities with Posture Management
01:48
Find All Your APIs with API Discovery
02:40
What is Open API? - Definition, Applications, and Best Practices
03:04
What is an Attack Vector? - Definition, Examples, and Security Best Practices
03:01
What is API Management? - Definition, Benefits, and Integration Security
01:50
Noname Security Blocking Demo using AWS WAF
03:56
Active Testing Demo
01:17
Introducing the New Active Testing
02:09
Find API Vulnerabilities Before Production
02:53
What is Dynamic Application Security Testing (DAST) - Definitions and Examples
02:41
What is Static Application Security Testing (SAST)? - Functionality and Best Practices
02:27
What is Java API? - Definition, Examples, and Applications
02:50
What is Load Balancing - Explanation, Role and Impact
03:06
What is Software Composition Analysis (SCA) - Definition, Best Practices, and Importance
02:59
Netskope Protects APIs from Hackers with Noname Security
31:50
Embracing Zero Trust for API Security
01:12
API Security Testing Demo - Deliver secure APIs faster
01:16
Runtime Protection Demo - Stop attacks in real-time
01:24
Posture Management Demo - Strengthen your security posture
01:32
API Discovery Demo - Discover all of your APIs
01:46
Inventory All Your APIs and Classify Sensitive Data
02:55
What is API Security Testing & How Does it Uncover Vulnerabilities?
02:17
What is an API Gateway? - Definition, Benefits, and Security Gaps
02:27
What are Microservices? - Definition, Examples, and Navigating Security Challenges