18:55
Ethical Hacking & Penetration Testing | E-SPIN
espincgroup
9:46
Identity Access Management Mastering | E-SPIN
7:04
E-SPIN Red Hat AI Product Overview
11:12
Multifactor Authentication: Benefits, Challenges, and Best Practices | E-SPIN
11:05
Fast Tech Gadgets: Progress vs Sustainability
9:03
Data Center Automation: Enhancing IT Operations E SPIN
6:28
Network Operations Center For Seamless IT Management | E-SPIN
7:08
Modern Banks, Modern Risks: The Decline of Bank Security
6:19
IDA Disassembly Stage | E-SPIN
11:13
CIAM | E-SPIN
9:04
Computer Forensics | E-SPIN
10:22
Digital Trust Starts Here - The Strategic Value of TPRM Platforms
2:29
E SPIN GRC Integration : Why GRC Integration
9:35
Cybersecurity Mesh | E-SPIN
7:19
Leveraging SIEM for Proactive Monitoring
9:13
Continuous Intelligence | E-SPIN
2:50
IDA Pro in Enabling Static Analysis
4:57
CyberSecurity: A Critical Necessity
6:53
Enhancing Cybersecurity Strategy: Common Threat Modeling Mistakes to Avoid
7:56
Energy Management: Optimizing Efficiency for a Sustainable Future
2:56
Strategic Sourcing: Sourcing Approach Comparisons
7:49
File Integrity Monitoring: Essential for Data Security and Compliance
7:02
Synthetic Media in Education: Opportunities and Risks
7:44
BlockChain and IoT: Revolutionizing Connectivity, Security, and Scalability
8:19
SOAR in Strengthening Cyber Security Defenses
5:03
Procurement Risk Mitigation Strategies
6:23
Safeguarding Operational Technology : The Importance of OT Security
8:03
Security Governance: Components, Importance and Implementation
7:53
Edge AI Computing: Revolutionize Real-Time Decision Making | E-SPIN
11:44
Cognitive Computing: An Overview | E-SPIN
2:18
Key Principles in Supply Chain Management (SCM)
6:47
The Importance of Disinformation Security in the Era of Misinformation Warfare
16:10
GitLab Server & Run Runner At Portainer.io Container in Same Machine (Ubuntu) | E-SPIN
9:00
E -waste Impacts on Environment: The Escalating Global Concern
8:52
Blockchain Technology in Insurance| E-SPIN
8:56
Machine Learning: Key Mechanisms, Types, and Future Trends | E-SPIN
8:53
Mobile First: A Comprehensive Guide to Mastering Digital Design for a Mobile-Centric World | E-SPIN
7:41
Small Business Cyber Security: Why it Matters?
7:23
Identity and Access Management - Key Functions, Systems, and Benefits | E-SPIN
9:55
Generative AI Transformation: A Revolutionary Force Reshaping Enterprises and Business Models
6:42
Advantages and Disadvantages of Smart Space
8:36
What is Digital Immune System and its Importance?
The Spatial Computing | E-SPIN
7:46
Serverless Computing Mastering | E-SPIN
11:11
Burp Suite Pro Basics Installation, Setup, and Usage | E-SPIN
8:38
Data Center Virtualization: Levelling Up the Cloud Computing Game
7:07
Digital Transformation Imperative Survival
13:12
The Multiexperience: Expanding User Interaction Horizons | E-SPIN
20:01
Cloud security: Safeguarding the Cloud Environment
15:19
Core Concepts Of DevSecOps: Security principles, Shift Left Security, and Security as Code | E-SPIN
34:25
AI Code Assistants Supercharge Your Development with Automation and Intelligence | E-SPIN
4:37
DevSecOps: Security Integration in DevOps
2:41
DevSecOps Competencies Framework (CF)
19:39
WhatsUp Gold 23 Product Overview | E-SPIN
8:57
DevSecOps Overview, Definition, Benefits and Importance
17:20
Bring Your Own Device (BYOD): Benefits, Challenges & Best practices
24:06
Security Posture Assessments (SPA) : Building a Secure Foundation
19:01
Enhancing Network Security: Integrating SDN with SDS
2:45
Enhancing Application Performance with Integrated APM and Observability
4:10
AI Ops in Enhancing Application Performance Monitoring (APM) and Observability
6:26
Secure Coding Practices in Application Security Testing | E-SPIN
4:45
Application Security Testing : Web Application Architecture
3:16
Application Security Testing: Incident Response Basics
3:40
Server Security: Secure Deployment & Configuration
5:39
Transport Layer Security in HTTPS: Roles of TLS in Securing Web Browsing
3:43
Physical Security Understanding Threats & Establishing Countermeasures
3:44
Physical Security Framework Access Control, Surveillance, Testing
4:07
Data Security Data handling best practice
4:33
Harmonizing Human Expertise and Automation: A Holistic Approach to Web Application Security Testing
3:11
Cyber Security Awareness: Vulnerabilities and Exploitation
3:56
Cyber Threats Awareness: Malware, Phishing & Ransomware
Let celebrating E-SPIN 18th anniversary together
10:04
Unlocking the Potential of Digital Twins: Advancing Decision-Making and Efficiency
5:46
Unlocking the Power of Big Data : Understanding, Impact, Benefits, and Emerging Trends
9:51
Application Performance Management (APM) for Enhanced Performance Application
7:00
The Significance of Reverse Engineering in the Modern World : Software Security to National Security
Exploring the Capabilities and Potential of ChatGPT: A Versatile Language Model
4:31
Global Mega Trends for 2023 and Beyond Navigating the Future
12:19
Identity and Access Management (IAM) in Securing Digital Identities and Beyond
13:50
Enhancing Security Posture with Multi-factor Authentication (MFA)
12:16
Passwordless Authentication - A Pathway to Improved Cybersecurity
13:07
Single Sign-On (SSO)-Benefits, Drawbacks, and Best Practices
5:27
Understanding the Key Segments of IT Monitoring: DEM, NPM, APM, and ITIM
10:10
DevOps Application Release Orchestration (ARO): Future of Release Management & DevOps Orchestration
28:29
Revolutionizing Patch Management: Meeting Modern Infrastructure and Workspace Needs
5:21
Advantages and Disadvantages of E-Government
4:54
Digital Immune System: How does DIS bring value to business?
4:42
Disassemblers vs Decompilers: Understanding the Advantages and Differences
LIVE
[Private video]