Subscribers | 34,700 |
---|---|
Views | 1,198,935 |
Videos | 30 |
Country | US |
Created | Sep 2018 (6 years old) |
Topics | Lifestyle_(sociology) Technology Knowledge |
Actions |
Copy all info to clipboard
You can use it to paste it into ChatGPT and analyze the channel |
The CISO Perspective was created as a free resource for the benefit of the entire cybersecurity community. Have a cybersecurity question? Send us an email for free consultation response in 4 sentences or less.
Published | Title | Description | Views |
---|---|---|---|
Jan 01, 2025 | Cybersecurity News Recap for December 2024 #cybersecurity | Cybersecurity minute recaps all the major cybersecurity even... | 615 |
Nov 22, 2024 | How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained) | The Cybersecurity Kill Chain is a model for describing the s... | 920 |
Nov 14, 2024 | The 2024 Cybersecurity Trends You NEED to Know | With over 30,000 security incidents analyzed, the 2024 Veriz... | 1,356 |
Feb 06, 2024 | AI Generated Fakes: The Stable Diffusion Revolution | In this video, we dive into the world of how A.I generated f... | 6,420 |
Nov 26, 2023 | The 2023 Deepfake Guide (Roop, Wave2Lip, ElevenLabs, Tortoise) | FULL VIDEO GUIDE COMING SOON.. These are Deepfake samples ... | 5,275 |
Feb 15, 2023 | Hacking with ChatGPT: Five A.I. Based Attacks for Offensive Security | ChatGPT may represent one of the biggest disruptions in mode... | 56,989 |
May 26, 2022 | What is Security Service Edge (SSE)? SASE vs SSE vs VPN | In this video, we compare traditional VPN vs SASE and SSE (S... | 65,728 |
May 02, 2022 | What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained | Zero Trust Network Access (ZTNA) is a technology that is qui... | 130,880 |
Mar 15, 2022 | Becoming a Product Manager - 60 Second Overview #shorts | According to Glassdoor, Product Management (PM) is one of th... | 2,209 |
Feb 04, 2022 | Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work | Exploits represent any piece of code, data or sequence of co... | 16,080 |
Dec 27, 2021 | Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA | Bypassing multi-factor authentication was once considered mo... | 71,360 |
Sep 27, 2021 | What is AIOps and MLOps? Artificial Intelligence for IT Operations Explained | AIOps (also known as MLOps) is a combination of big data wit... | 18,553 |
Sep 05, 2021 | T-Mobile Data Breach: Timeline, Analysis and Lessons Learned | The most recent T-Mobile hack is one of the largest data bre... | 8,171 |
Aug 23, 2021 | What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response | Extended Detection and Response (XDR) is a cybersecurity too... | 207,413 |
Dec 10, 2020 | What is Machine Learning ? A.I., Models, Algorithm and Learning Explained | In this video, we go over what Machine Learning is and how i... | 24,351 |