Anthropic Caught Deepseek Cloning Their Models #ai #security #tech
The CISO Perspective
Anthropic Caught Deepseek Cloning Their Models #ai #security #tech
0:58
Post-Quantum Cryptography (PQC): The Race Against Q-Day
The CISO Perspective
Post-Quantum Cryptography (PQC): The Race Against Q-Day
10:00
Zero Trust Architecture Tenants Explained in 60 Seconds
The CISO Perspective
Zero Trust Architecture Tenants Explained in 60 Seconds
0:57
The Cybersecurity Breaches You Missed (August)
The CISO Perspective
The Cybersecurity Breaches You Missed (August)
1:00
Zero Trust in the Real World: The Technologies Behind the Theory
The CISO Perspective
Zero Trust in the Real World: The Technologies Behind the Theory
10:55
The Cybersecurity Breaches You Missed (July)
The CISO Perspective
The Cybersecurity Breaches You Missed (July)
1:16
What Is Zero Trust Architecture (ZTA) ? NIST 800-207 Explained
The CISO Perspective
What Is Zero Trust Architecture (ZTA) ? NIST 800-207 Explained
9:30
Sovereign SASE Architecture Overview #cybersecurity #sase
The CISO Perspective
Sovereign SASE Architecture Overview #cybersecurity #sase
0:54
What is Sovereign SASE? Public vs Private SASE Explained
The CISO Perspective
What is Sovereign SASE? Public vs Private SASE Explained
8:30
The Cybersecurity Breaches You Missed (December)
The CISO Perspective
The Cybersecurity Breaches You Missed (December)
1:00
How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained)
The CISO Perspective
How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained)
0:58
The Cybersecurity Trends You NEED to Know
The CISO Perspective
The Cybersecurity Trends You NEED to Know
9:28
The AI Art Revolution is Here (and it’s worse than you think)
The CISO Perspective
The AI Art Revolution is Here (and it’s worse than you think)
12:20
The Disturbing Reality of Deepfake Technology
The CISO Perspective
The Disturbing Reality of Deepfake Technology
0:32
AI-Powered Cyber Attacks: The Next Frontier in Offensive Security
The CISO Perspective
AI-Powered Cyber Attacks: The Next Frontier in Offensive Security
11:25
What is Security Service Edge (SSE)? SASE vs SSE vs VPN
The CISO Perspective
What is Security Service Edge (SSE)? SASE vs SSE vs VPN
6:36
What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained
The CISO Perspective
What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained
7:44
How to Become a Product Manager (PM)
The CISO Perspective
How to Become a Product Manager (PM)
0:59
How Hackers Exploit Software Vulnerabilities
The CISO Perspective
How Hackers Exploit Software Vulnerabilities
9:08
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
The CISO Perspective
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
10:16
AIOps and MLOps: The Future of IT Explained
The CISO Perspective
AIOps and MLOps: The Future of IT Explained
8:50
T-Mobile Data Breach: Timeline, Analysis and Lessons Learned
The CISO Perspective
T-Mobile Data Breach: Timeline, Analysis and Lessons Learned
6:57
What is XDR vs EDR vs MDR?  Breaking down Extended Detection and Response
The CISO Perspective
What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response
8:54
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
The CISO Perspective
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
10:39
Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
The CISO Perspective
Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
7:43
What is Open Source Intelligence (OSINT)? The OSINT Tools, Techniques and Framework Explained
The CISO Perspective
What is Open Source Intelligence (OSINT)? The OSINT Tools, Techniques and Framework Explained
8:07
What is Secure Access Service Edge (SASE) ?
The CISO Perspective
What is Secure Access Service Edge (SASE) ?
7:50
How to Use Canary Tokens for Threat Hunting
The CISO Perspective
How to Use Canary Tokens for Threat Hunting
7:23
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
The CISO Perspective
NextGen Firewall & IPS Evasion: 5 Defensive Techniques
11:38
Securing Your VPN: Six Considerations
The CISO Perspective
Securing Your VPN: Six Considerations
7:02
The Iran Cyber Threat: What You Need To Know
The CISO Perspective
The Iran Cyber Threat: What You Need To Know
6:42
VNF: Five Considerations in Virtualizing Your Perimeter
The CISO Perspective
VNF: Five Considerations in Virtualizing Your Perimeter
6:39
Securing SD-WAN: 5 Considerations
The CISO Perspective
Securing SD-WAN: 5 Considerations
11:53
ATT&CK Matrix: The Enemies Playbook
The CISO Perspective
ATT&CK Matrix: The Enemies Playbook
14:04
Securing Your AWS Virtual Private Cloud
The CISO Perspective
Securing Your AWS Virtual Private Cloud
7:48
Accomplishing Zero Trust Security Using SDP
The CISO Perspective
Accomplishing Zero Trust Security Using SDP
6:25
Breaking The Kill-Chain: A Defensive Approach
The CISO Perspective
Breaking The Kill-Chain: A Defensive Approach
13:18
5 Terrifying Cyber-Security Trends for 2019
The CISO Perspective
5 Terrifying Cyber-Security Trends for 2019
7:08
5 Considerations: Sizing Your Next-Gen Firewall (NGFW)
The CISO Perspective
5 Considerations: Sizing Your Next-Gen Firewall (NGFW)
7:17