12 тысяч подписчиков
867 видео
How to Achieve Better Results by Optimizing Cyber Budgets
DEPHAZE: Pre-launch for Partners
MENA 2024: APT-Groups and the Latest Cases
The Role of Artificial Intelligence in Cybersecurity
Building Industry-Specific Security Operations Centers (SOCs)
Exposing and Fixing Physical Access Vulnerabilities
The Practical Guide to Answering the CEO’s Question: 'Are We Secure?'
Starting a Career in Cybersecurity: The Path to Becoming a White-Hat Hacker
#GITEX2024
Positive Technologies expands partnerships in the Middle East and South Asia
Positive Technologies Goes Global at
#Cybersecurity
Will AI replace programmers?
Software supply chain security. Building processes with OSS
Some bruteforce intelligence
Хакнуть сайт на Adobe Experience Manager
The five tricky issues of your serverless solution
JavaScript in PDF
Testing and verifying Linux kernel
Avoiding burnout: secrets to building a cybersecurity community
Swordfish Security's secure development framework
SIEM correlation rules and expert knowledge
Career path of a CISO: from dawn to dusk
Discovering C&C in Malicious PDF with obfuscation, encoding, and other techniques
Knowledge management with Python: tools, approaches, examples
COM/DCOM forgotten knowledge
Code query language... is not needed?
A RCE vulnerability in Managed ClickHouse through the eyes of a SOC specialist at Yandex Cloud
Analysis of the client JavaScript code for detecting HTTP endpoints
The future of the high-tech industry
Workshop. Using ERM&CK project to write response scripts
Improving fault tolerance of HTTP integrations without changing Python code