Subscribers | 22,100 |
---|---|
Views | 695,278 |
Videos | 331 |
Country | US |
Created | Apr 2018 (7 years old) |
Topics | Knowledge Technology Lifestyle_(sociology) |
Actions |
Copy all info to clipboard
You can use it to paste it into ChatGPT and analyze the channel |
The Cyber Defense curriculum, epitomizes security professionals on the front-line of defending, day-in and day-out. Heavy emphasis on facilitating the detection and response to compromise monitoring for adversary activities. Detection made easier with a more secure posture and actively maintaining/improving security over time.
Published | Title | Description | Views |
---|---|---|---|
Nov 04, 2024 | Supply Chain Security Incident Response: Strategies for Responding to Emerging Threats | In an ideal world, we would have a well-defined supply chain... | 394 |
Oct 31, 2024 | MAVIS: Machine Assisted Vulnerability Identification System | Code review has become what log review was a few years ago; ... | 252 |
Oct 30, 2024 | Mastering the Journal | As Linux systems become increasingly complex, security profe... | 222 |
Oct 29, 2024 | Hybrid Fortresses: How A Defensible Security Architecture Raises the Bar Against Modern Attacks | As we navigate 2024, we have witnessed a surge in complex ra... | 244 |
Oct 28, 2024 | APT Takedown: The 2024 Blueprint for Cyber Victory | 2024 cyber news has been filled with stories of highly compl... | 1,274 |
Oct 25, 2024 | Encrypted DNS Developments | Over the last couple of years, there have been several new s... | 432 |
Oct 24, 2024 | Edge Out Your Next BEC Adversary: Investigation and Prevention Strategies Using OSINT | In this presentation, Jeff explores the latest trends in Bus... | 262 |
Oct 23, 2024 | CYA by Using CIA...Correctly for a Change | In this insightful cybersecurity presentation, Keith Palmgre... | 157 |
Oct 22, 2024 | Stand out from the crowd! Using PowerShell to automate your daily tasks | A common question I get asked is how can I differentiate mys... | 317 |
Oct 21, 2024 | The SBOM Makeover | Software Bill of Materials (SBOM) are increasingly being use... | 228 |
Oct 18, 2024 | Guardrails for Innovation: Navigating Security Standards in Generative AI and LLMs | As generative AI and large language models (LLM) gain moment... | 214 |
Oct 17, 2024 | The Python Security Pickle | In this presentation, Mark Baggett dives into the world of P... | 519 |
Oct 16, 2024 | Next Gen SOC | The increasing complexity and sophistication of cyber threat... | 1,313 |
Oct 15, 2024 | OSINT & Vicarious Trauma | In the world of OSINT, vicarious trauma is a silent threat, ... | 415 |
Oct 14, 2024 | Automating Log Analysis | In this presentation, Mark Baggett explores the amazing bene... | 833 |