0:47
Uncovering #Cyber Threats #Log4j #Oracle and #Microsoft #vulnerabilities #cybersecurity #reel
Phoenix Security
0:17
#Exploited #Vulnerability TOP 10 - The Dangers of #log4j The Most Exploited Software #reels #shorts
4:40
#Exploitability in the Wild, What does it mean? #cybersecurity #vulnerabilitymanagement #exploits
1:02
Application Security - How do we fix it with Tanya Janca
1:05
🚨 NEW ALERT: CVSS version 4 is out! 🚨 - Discover all the details here of CVSS v4 vs 3.1
2:32
The Important Aspects of Reporting
Open Security Summit - Highlights
1:42
What is The Objective of Security?
49:54
Application Security vulnerabilities - Measurements, Maturity Magic
Open Security Summit
1:01
CVE, CVSS how to prioritize? Unveiling the Critical Security Flaw that Could Jeopardize Your Data!
0:24
#CRITICAL Curl Security Flaw Is Your Version at Risk
0:35
Upgrade Your #Curl #Version Now Ensure #Security and Safe Queries #mac #libcurl CVE-2023-38545
0:57
The Shocking#Truth about #math and #cybersecurity in #ChatGPT Separating Fact from Fiction
0:32
Unleashing untapped potential in cybersecurity for a safer future
0:22
Unleashing the Power of #Security #AI and why Security should join
0:49
Unlocking #Cloud Potential Linking #Asset Lifecycle and #Security for Maximum Efficiency #devsecops
Revealing #Security Flaws in #cvss V4 Surprising Discoveries with #ChatGPT #ai #datascience
0:50
Unlocking the Power of #ChargeGPT for #Dynamic #Data #Analysis #devops #devsecops #datascience
0:39
Unveiling the World of #Vulnerability and #data #Visualization A Thrilling Discussion #chatgpt #ai
0:36
The #Urgent Challenge of #CVSS #Vulnerabilities Unveiling the Time Gap #chatgpt #devsecops
0:34
Supercharge your #code #deployment with #AWS #automated #reasoning #vulnerability #devsecops
0:58
Uncovering the Hidden #Vulnerability #Exploitation with #EPSS #Method #vulnerabilitymanagement
0:31
The Hidden Complexity of #CVSS V4 Scoring #vulnerability and Hidden Scores #vulnerabilitymanagement
0:51
#Unlocking #curl #vulnerability #critical #exposed #true #criticality #cve #cybersecurity
0:53
#Unveiling a #Critical #GNOME #security #Vulnerability Time to Update Now
0:23
#Unlock #cirtical #atlassian #rce #mitigation warning from #CISA
Unleashing Security #Curl 2 Exposed Protect Your Data Now #critical #vulnerability #rce
0:54
#Demystifying #Cybersecurity #Buzzwords Unveiling th #Vulnerability truth #data #cybersecurity
0:40
Unveiling the Evolving Cyber Threats OWASP Exposed #top10 #cybersecurity #vulnerabilities #data
Unveiling Top #Ransomware #Targets in #Tech Industry #cisa #kev Are You at Risk?
Unleashing the Power of Cybersecurity Transforming Cost into Opportunity
Unveiling Top #Ransomware #Targets in Tech Industry #CISA #KEV Alert: Are You at Risk?
0:48
#Hackers #Exploit #Critical Flaw in #Cisco Gear for Unrestricted Access
Cisco Critical #Hackers #Exploit #Critical #Flaw in #Cisco #Gear for #Unrestricted #Access
CISCO Vulnerability Critical on IOS XE review and patch
Unveiling the #HTTP2D DOS #Vulnerability Protect Your Web Today
#Power of #Vulnerability #Management for Ultimate #Cybersecurity #vulnerabilitymanagement
The Key to #Protecting Your Business from #Cyber #Breaches Revealed
From #Engineering to #CISO A Journey of Transformation and Success #cybersecurity
0:45
Building a #Collaborative #Engineering Culture for Efficient #ProblemSolving #devsecops
0:37
Unleashing Personal Growth through Business Challenges and Learning
#cybersecurity #exploits #prioritization the Vulnerability Exploit Game Cybersecurity Insights
0:55
Cybersecurity #Risk from #Vulnerability to #Business #Risk for for Effective Comms #cybersecurity
Gamechanging Strategy to #Eliminate #99.99 #Vulnerabilities #priority #vulnerabilitymanagement
Mastering #Cybersecurity #Automating Information for Maximum Protection #appsec
0:29
#Boosting #Network #Security Faster #Remediation and #Painless #Code #fixes
0:52
Unlocking #Business #Success #Fixing #Broken #Processes for LongTerm Benefits #cyber
0:44
Unleashing the #Power of #vulnerability #data to Tackle #Risk reduction #cybersecurity
Boost Your #Business #Security with Lessons from #breach #cybersecurity
Uncovering #equifax #strut #Vulnerability #Exploit #Exposes #Legacy #Systems #vulnerability
Mastering #vulnerabilitymanagement Your First Line of Defense
The Key to Effective #Vulnerability #Fixes Providing #Context and Understanding #vulnerability
Unveiling the Power of Social Media DataAnalysis #epss #kev #cybersecurity #vulnerabilitymanagement
The Secret to Improving in #VulnerabilityManagement Revealed #epss
Unveiling the Key to Defending Against #Exploitation #epss #priority in Your org #cybersecurity
The #Microsoft #Security #Revolution From Terrible to Top in Remediation Speed
#vulenrability #prioritization in #vulnerabilitymanagement and #applciationsecurity #shocking
0:46
#appsec #Protecting #Business #Operations #Reducing #Impact and Ensuring #businesscontinuity
Hidden Code Execution Threat Beware of Downloading Files #rce #gnu
The Hidden #VulnerabilityManagement #Pitfall in #Cloud and #Premises #sla #cybersecurity
Mastering #Cybersecurity #Automating #prioritization for Maximum Protection
Uncovering the #Hidden #Threats The Gradual Increase of #Exploits in #Cybersecurity #epss
Cracking the Code Unveiling the #Top #Vulnerabilities in #Cybersecurity #vulnerabilitymanagement
Unlocking Vulnerabilities The #Power of #SSVC #Decision #Trees for Faster Solutions
Revolutionizing #Tradition #GRC #Engineering Unites New and Old Approaches #vulnerabilitymanagement
The #Security #Dilemma What #Businesses Need for #Real #Protection #netflix #cyber
#Battling #Alert #Fatigue and the #Need to #Connect Worlds #grc #cyber #appsec
Conquering the #Fear of #Taking #Risks Trusting Your Gut vs Trusting the Math #quantitative #risk
Unlocking #Business #Success Embracing #Risk for #Reward #cyber #security #netflix
Unleashing the Power of Evidence Translating #Cloud #Controls into #Business #Risk #cyber #appsec
Unveiling the Power of #BoardLevel Discussions #Impact #Vulnerabilities #risk #cybersecurity
0:18
Busting #Cybersecurity #Myths #Engage #Smartly to Stay Safe #psychology #appsec
0:21
#Surviving #Emergency No Time for Niceties Just Quick Action #cyberresilience #businesscontinuity
0:43
The Power of #Emotion in #Decision #Making and #Selling #stories for Success #cybersecurity
The Power of #Trust and #Data Building Strong #Relationships for #Resilience #cybersecurity
The #Evolving Nature of #Leadership in a #Volatile #Cybersecurity World #psychology
The #Organizational #Divide Why #Different #Metrics #Fuel #Misalignment #appsec #cybersecurity
The Surprising Link Between #Risk and #Success in #Engineering and #Business #cybersecurity
Revolutionizing #Security #Bridging the Gap between #GRC and #Engineering #riskmanagement
Unleashing Innovation #Challenging #Norms and Embracing New Possibilities #grc #engineering #cyber
Business Failures Exposed The Importance of #Transparency and #Risk Management #cybersecurity
Unlocking Speed and #Security Navigating #GRCs Catchup Challenge #cyber #risk #engineering
#Unleashing the #Nightmare #ActiveMQ #Vulnerability #Exposed to #Hello #Kitty #Ransomware
#Ransomware Group #Exploits #SysAge Software in New #ZeroDay Alert #cybersecurity
Unleashing the #Nightmare #ActiveMQ #Vulnerability #Exploited by #HelloKitty #Ransomware
0:41
#CISO #Businesses #Brutal #Honesty in the #Cybersecurity #World #veteran #resilience #cybersecurity
#cyber #security #veteran talks about #service #mesh
Uncovering a #Dark #Secret #Cybersecurity The Lucrative World of #Code #Backdoors #productsec
Uncovering the #Dark #Side of #WebShells A Stealthy #Invasion #Unleashed #threat #cybersecurity
#Unleashing the #Nightmare #ActiveMQ #Critical #Vulnerability #ransomware used by #HelloKitty
#Uncovering the #DarkSide of #WebShells A Stealthy Invasion Unleashed
Predicting Software Exploits Stay One Step Ahead with AI
#Vulnerability #priority Warknin The Perils of a #Toolless and #Backlogged Process #priority #cvss
0:38
#Differences Between #AppSec and #SCA #opensource #vulnerability Scanners #cybersecurity
The Hidden #Danger of #Scanning #Vulnerabilities in the #Cloud #cybersecurity
Boost your #productivity with #EPSS for effortless collaboration #priority #vulnerability #cyber
#CVSS A #Complex #Scoring #System Misaligned with #Real Risk #cybersecurity
#vulnerability Success Overcoming #Analysis #Paralysis to #Embrace #riskmanagement #cybersecurity
0:42
Unleashing the Power of #CVSS #cvss4 #Contextualize Your #Vulnerability Data #cybersecurity
Unveiling the #Kubernetes #NGINX #Vulnerability Alert for Web Developers #cybersecurity #vuln
NGINX #security #kubernetes #vulnerability CVE-2023-5043 Phoenix Security to Secure environmnet
Unlocking the Power of #Effective #Communication in #Risk #Assessment #appsec #cybersecurity
#Psychology #Application #Security #Human #Behavior and Staying Safe #appsec #cybersecurity
#Unveiling the #Power of #AI #HelpDesk #Scams #Explained #cybersecurity #chatgpt
#Truth #Hiring #Senior #Engineers #HRs #Costly #Mistake #cybersecurity #appsec
Revolutionize Your #Web #Apps #Harness the Power of #Kubernetes and #NGINX #vulnerability #appsec
6:45
The Top 10 Vulnerabilities that are Being Exploited at Scale
1:32
Unleashing Our Social Energies The Impact of COVID 19 Isolation
1:31
Unleashing Potential Solutions to #Break the #Leadership #Shortage #Cycle
1:44
Embracing New Challenges Building Resilience in the Corporate World
1:52
The Power of Balance Finding Harmony Between Work and Personal Life
0:27
The #Real #Secret to #Job #Happiness #Revealed #cybersecurity Find Your #Passion!
0:28
#Unleashing the #Power of #Graduate #Buddies for Unstoppable Support #cybersecurity
The #liberating #power of #hobbies #Balancing #stress and #guilt #burnout #cybersecurity
0:11
Finding #Inspiration #Sharing our #Stories to #Ignite Others' Potential #storytelling #cybersecurity
0:25
#Unleashing #Untapped #Cyber #Talent Time to Shift our Mindset!
#Leaders #Embracing #Vulnerability and Inspiring Journeys #jitender Arora #deloitte
Exposed Shocking Truth Behind Misleading #Cybersecurity Stats #appsec #applicationsecurity
1:59
#cyberwalk e2 #NCSC #New #uk #cybersecurity Guidelines on #vulnerabilitymanagement #aspm #podcast
The #Secret to #Prioritizing #Application #Security #appsec in Large Organizations #aspm
Unleashing Developer Frictionless #Product #Security Maximizing Success #podcast #appsec #aspm
0:56
#vulnerabilitymanagement Prioritizing Fixes max success #podcast #cybersecurity #applicationsecurity
2:37
Cyber Security #ConnectWise #Vulnerability #Ivanti Vulnerability and SBOM
2:56
Risks & Rewards of #AI #Code: Insights from #Cybersecurity with Francesco Cipollone
Using #AI for #Security How to Safely Leverage Technology in 2024
#ivanti #connectwise Importance of Demonstrating Strong #Security Practices #cybersecurity
Secure Your Software Exploring the #ConnectWise #Vulnerability #cybersecurity
0:14
Is #AI Creating a Generation of Coders without Coding Knowledge #cybersecurity #podcast
Unlocking the Secrets of Penetration Testing Exploring DAS Tools and Raising Awareness
How to Build an #applicationsecurity Program Expert Tips and Insights
The Importance of #applicationsecurity A Guide to Protecting Yourself Online
0:59
Discovering Unforeseen Security Risks Insights from Engineering
Enhancing Coders AI's Role in Code Writing AI in Coding
🔒 #AI #code safe Secure Coding with AI Assistance 🤖💻 | #cybertalks #SecureCoding #aisafety
How to Write Secure Code in 2022 AI vs Human Generated Code
0:19
Urgent Fix for TeamCity CVE-2024-23917 #Vulnerability: Secure Your Dev Environment! #CyberSecurity
National Vulnerability Database: Latest Changes and Impact on Vulnerability Data Processing
Bug Bounties vs. Building Secure Code: Which is More Fun?
LIVE
[Private video]
Using #AI for #Secure Code Review and Peer Review Best Practices #cybersecurity #aisecurity
Uncovering the Truth: NVD's Failure to Process CWE and CPE Data
1:00
The Impact of CWE and CPE on Vulnerability Assessment | SEO Optimized
Revolutionizing Customer Experience: How Our New API Enhances Service
The Future of NVD: Analyzing Changes and Impacts
How to Foster Collaboration between CTO and CPO for Enhanced Security | Expert Insights
0:12
Maximizing Productivity How to Use Tools Without Becoming One
Uncovering the Truth NVD's Failure to Process CWE and CPE Data
Building an Effective Vulnerability Management Solution: Avoiding the Maintenance Nightmare
The Impact of Budget #Cuts on #NVD: Analyzing the #Vulnerability and Growth in #cybersecurity
The Impact of CWE and CPE on Vulnerability Assessment SEO Optimized
The Hidden Backdoor in XZ: A Shocker for Fedora Team
0:26
cve-2024-3094 Detect Vulnerabilities in Software Libraries: SBOM vs. ASPM & Phoenix Security
Maximizing Security in CI CD and Production Environments
Discover the Latest CVE-CV Vulnerabilities | Stay Up-to-Date
National Vulnerability Database Explained and Debunked
Mastering Application Security and Cloud Protection: The Essential Guide
Enhancing Application Security with AI: Insights from the AppSec Unbounded Conference
The Ultimate Guide to Application Security Management: Protecting Against Vulnerabilities
Streamline Your App Integration: Simplify with Clerk
Unveiling the Alarming Rise of Cyber Vulnerabilities in 2021
The Importance of Collaboration in Cybersecurity NVD: Open Source and Vendor Communities
The Importance of Secure Coding for Developers: Building Trust and Excellence
Protect Your Privacy: How Threat Modeling Can Safeguard Your Personal Data
How Long Does It Take to Exploit OpenSSH CVE-2024-6387?
0:16
The Future of Programming: Exploring Memory-Safe Languages in Tech
Unlocking the Power of Collaboration: Building a Strong Community in the Industry
Transforming Developers' Mindset: Embracing Security for Performance Boost
0:20
Unveiling the Truth: The Power of Prosecutors' Indictment Stories Sullivan and Solarwind
Prioritization: The Key to Effective Decision Making
Shifting Paradigms: Exploring the Meanings and Implications of the "Shift" Trend
Critical Vulnerabilities in Cisco ASA Software and FTD Software
The Stick: How to Protect Your Business from Security Breaches
The Future of Application Security: Evolving Roles and Strategies
unknown
Stay Protected: Cisco ASA Software Vulnerability Explained
Unleashing the Power of Cathartic Writing: Boost Your Technical Knowledge!
0:33
Understanding Your Software Developers: Insights for Better Collaboration
From Opera Singer to YouTube Star: My Journey and Expertise Revealed
Revolutionizing Application Security: Cloud vs SRE vs Observability
How to Navigate Liability and Sell to the Federal Government cybersecurity SBOM
Inside the World of Software Development: A Developer's Journey