This is the home for CISO Series which examines the mutual dependency and conflict that exists between buyers and sellers of cybersecurity products and services. The series is focused on the relationships within and between both groups, and how they manage individually and as partners to protect and combat increased cyber attacks on an ever-widening and complicated surface area. While the website CISOseries.com has all the articles, videos, webinars, meme images, and podcasts that envelop the entire series, this YouTube page has just the videos which makes them more searchable. The majority of our video viewing and engagement happens on LinkedIn. If you'd like to follow those conversations, simply click on the original post for each video (link in description) and then click through on that blog post to the discussion on LinkedIn.
Shared 8 hours ago
99 views
Shared 1 day ago
25 views
Ukraine tightens controls on Starlink terminals, VMware ESXi flaw now exploited, SolarWinds Web H...
Shared 1 day ago
199 views
OpenClaw targets ClawHub users, Notepad++ update delivers malware, APT28 attackers abuse Microsof...
Shared 3 days ago
302 views
Department of Know: CISA's cryptography categories, Gottumukkala's ChatGPT gotcha, NTLM says goodbye
Shared 3 days ago
130 views
Shared 4 days ago
244 views
Shared 1 week ago
298 views
Sandbox flaw exposes n8n instances, Fake Moltbot assistant drops malware, PeckBirdy takes flight ...
Shared 1 week ago
250 views
US cyber chief uploaded sensitive files into public ChatGPT, Vibe-coded 'Sicarii' ransomware can'...
Shared 1 week ago
470 views
Shared 1 week ago
154 views
Microsoft patches Office zero-day vulnerability, Indian users targeted by Blackmoon, Konni target...
Shared 1 week ago
284 views
Shared 1 week ago
114 views
Shared 1 week ago
251 views
Shared 2 weeks ago
283 views
Tesla hacked at Pwn2Own Automotive, Everest sitting on Under Armour data? PurpleBravo fake jobs c...
Shared 2 weeks ago
286 views
Shared 2 weeks ago
159 views
Gemini prompt injection flaw exposes calendar info, hacker admits to Supreme Court data leak, res...
Shared 2 weeks ago
259 views
Shared 2 weeks ago
146 views
Shared 2 weeks ago
242 views
Shared 3 weeks ago
308 views
Shared 3 weeks ago
160 views
U.S. weighs cyberwarfare options, DeadLock uses smart contracts to hide work, China says stop usi...
Shared 3 weeks ago
268 views
GoBruteforcer targets blockchain projects, Android bug causes volume key issues, Verizon to stop ...
Shared 3 weeks ago
244 views
Shared 3 weeks ago
175 views
Shared 3 weeks ago
284 views
Shared 3 weeks ago
156 views
Shared 3 weeks ago
311 views
Shared 4 weeks ago
291 views
Shared 4 weeks ago
38 views
ESA confirms new data heist, Ni8mare lets hackers hijack n8n servers, Taiwan blames 'cyber army' ...
Shared 4 weeks ago
289 views
Shared 4 weeks ago
311 views
Shared 1 month ago
221 views
European hospitality blue screen of death, Brightspeed investigates breach, Convicted Bitfinex la...
Shared 1 month ago
243 views
Shared 1 month ago
146 views
Shared 1 month ago
352 views
Shared 1 month ago
389 views
Unleash Protocol hackers drain millions, DarkSpectre campaigns exposed, Shai-Hulud attack led Tru...
Shared 1 month ago
245 views
Silver Fox targets Indian users, Mustang Panda deploys ToneShell, will prompt injection ever be '...
Shared 1 month ago
201 views
Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 da...
Shared 1 month ago
217 views