#  @thecisoperspective The CISO Perspective The CISO Perspective posts on YouTube about network, zero trust, trust, chain the most. They currently have [------] followers and [--] posts still getting attention that total [-----] engagements in the last [--] hours. ### Engagements: [-----] [#](/creator/youtube::UCQEhlRARO5HLmHSNdgi_QIw/interactions)  - [--] Week [-----] +29% - [--] Month [------] +40% - [--] Months [------] +12% - [--] Year [-------] +256% ### Mentions: [--] [#](/creator/youtube::UCQEhlRARO5HLmHSNdgi_QIw/posts_active)  - [--] Month [--] -11% - [--] Months [--] no change - [--] Year [--] +90% ### Followers: [------] [#](/creator/youtube::UCQEhlRARO5HLmHSNdgi_QIw/followers)  - [--] Week [------] +0.25% - [--] Month [------] +1% - [--] Months [------] +5.10% - [--] Year [------] +12% ### CreatorRank: [---------] [#](/creator/youtube::UCQEhlRARO5HLmHSNdgi_QIw/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) [stocks](/list/stocks) [finance](/list/finance) [social networks](/list/social-networks) [countries](/list/countries) **Social topic influence** [network](/topic/network) #2444, [zero trust](/topic/zero-trust) #9, [trust](/topic/trust), [chain](/topic/chain) #2088, [virus](/topic/virus) #759, [what is](/topic/what-is), [checkpoint](/topic/checkpoint) #61, [kali](/topic/kali), [model](/topic/model), [cloud](/topic/cloud) **Top assets mentioned** [Zscaler Inc (ZS)](/topic/$zs) [Microsoft Corp. (MSFT)](/topic/microsoft) [Alphabet Inc Class A (GOOGL)](/topic/$googl) [Crowdstrike Holdings Inc (CRWD)](/topic/crowdstrike) ### Top Social Posts Top posts by engagements in the last [--] hours "What Is Zero Trust Architecture (ZTA) NIST 800-207 Explained In this video we break down Zero Trust Architecture (ZTA) using the official guidance from NIST 800-207 the gold standard for Zero Trust frameworks Youll learn how Zero Trust works why its essential in modern cybersecurity and how to design and deploy it effectively across your enterprise network. Whether youre an IT leader security engineer or CISO this video is packed with practical insights to help you confidently adopt a Zero Trust model. Timestamps: 00:40 Zero Trust Basics 01:15 Defining a Zero Trust Architecture 01:36 The Zero" [YouTube Link](https://youtube.com/watch?v=5Kq64vOgE10) 2025-07-19T12:50Z 39.4K followers, 14.2K engagements "What is Zero Trust Network Access (ZTNA) The Zero Trust Model Framework and Technologies Explained Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPNs as a more secure and scalable way to provide remote connectivity. Unlike VPNs Zero Trust provides a scalable way to provide secure connectivity without the need of centralized equipment. In this video we take a deep dive on Zero Trust Network Access (ZTNA) and walk through the models principles and architectures its based on. Well review what exactly Zero Trust is as well as the foundational concepts that are at the" [YouTube Link](https://youtube.com/watch?v=DLQAbJm4gFM) 2022-05-02T17:22Z 39.4K followers, 178.4K engagements "Breaking The Kill-Chain: A Defensive Approach The Cybersecurity Kill-Chain is a model for describing the steps an attacker must complete to carry a successful attack. In this video we'll look at defensive tools we can apply at every phase of the kill-chain as part of a multi layered security strategy. 0:00 Introduction 0:41 RECONNAISSANCE 2:23 WEAPONIZATION 3:48 DELIVERY 5:49 EXPLOITATION 7:24 INSTALLATION 8:55 COMMAND AND CONTROL 10:54 ACTIONS ON OBJECTIVE 12:21 THE CISO PERSPECTIVE 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove" [YouTube Link](https://youtube.com/watch?v=II91fiUax2g) 2019-02-05T19:49Z 39.4K followers, 198.8K engagements "What is XDR vs EDR vs MDR Breaking down Extended Detection and Response Extended Detection and Response (XDR) is a cybersecurity tool that integrates with multiple products to detect and respond to threats. While EDR (Endpoint Detection and Response) focuses on the endpoint XDR uses A.I. to ingests information from multiple sources and detect patterns across different device types. In this video we'll discuss what XDR is and how it compares to EDR and MDR (Managed Detection and Response). Overview 0:55 - What is Endpoint Detection and Response (EDR) 3:11 - Traditional Endpoint vs EDR 3:46 -" [YouTube Link](https://youtube.com/watch?v=SFFdbeogLFc) 2021-08-23T17:34Z 39.4K followers, 241.2K engagements "5 Considerations: Sizing Your Next-Gen Firewall (NGFW) An undersized firewall can be catastrophic to your network. The CISO Perspective brings you the [--] most important things to consider when sizing your Next-Gen Firewall. [--]. CPS [--]. Total Throughput [--]. SSL [--]. NGFW Features [--]. Max Session (Concurrent Sessions) Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa asa Cisco Pan juniper advanced threat protection fortigate incident response Zero day [--] day malware virus nss intrusion prevention ciso information" [YouTube Link](https://youtube.com/watch?v=12AqJdlqXzM) 2018-12-24T01:43Z 39.4K followers, 57.3K engagements "Sovereign SASE Architecture Overview #cybersecurity #sase In this clip we dive into the Sovereign SASE Architecture breaking down exactly how the control plane data plane and user layer combine to deliver secure and compliant connectivity entirely within your organizations boundaries. 🎬 Watch the full video here: https://www.youtube.com/watchv=NUcfRnIE2mc 🔔 Subscribe now for more cybersecurity insights and tutorials from The CISO Perspective. Sovereign SASE SASE Architecture Data Sovereignty Cybersecurity Secure Access Service Edge Network Security Compliance Cloud Security Security" [YouTube Link](https://youtube.com/watch?v=7-xA6Wsr7tI) 2025-07-06T16:19Z 39.4K followers, [----] engagements "What is Open Source Intelligence (OSINT) The OSINT Tools Techniques and Framework Explained Reconnaissance is the first step of the cybersecurity kill chain and the foundation to a successful attack. Open-source Intelligence (OSINT) is the practice of collecting publicly available information about a target. In this video we'll cover what OSINT is the framework and methodology for an OSINT investigation and some of the top tools in OSINT data investigation. What is OSINT (Open-source Intelligence) 1:09 The OSINT Methodology and Process 1:34 OSINT Tools 2:23 Maltego Overview 2:30 theHarvester" [YouTube Link](https://youtube.com/watch?v=J4_rRn0cFew) 2020-10-26T18:45Z 39.4K followers, 36.5K engagements "Accomplishing Zero Trust Security Using SDP Zero Trust security is the hottest topic of conversations among CISOs and security people. But for a long time the question has been "How do I get there" The Software Defined Perimeter(SDP) is one of the most popular implementations of the Zero Trust security model. In this video we review how to accomplish Zero Trust security using SDP zero trust security models cybersecurity infosec software defined software defined perimeter sdp beyondcorp kill chain information security Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall" [YouTube Link](https://youtube.com/watch?v=_yGGZj9wkaU) 2019-03-15T16:21Z 39.4K followers, 42K engagements "AI-Powered Cyber Attacks: The Next Frontier in Offensive Security ChatGPT may represent one of the biggest disruptions in modern history with it's powerful A.I based chatbot. But within weeks of ChatGPT's release security researchers discovered several cases of people using ChatGPT for everything from malware development to exploit coding. In this video take a look at the five ways attackers are utilizing ChatGPT for wrong doing. 0:14 Intro to ChatGPT / Natural Language Processing (NLP) & GPT 1:28 Using ChatGPT for Vulnerability Discovery 1:56 Vulnerability Prompts to Utilize 3:10 Writing" [YouTube Link](https://youtube.com/watch?v=AwQE3jof63U) 2023-02-15T20:42Z 39.4K followers, 60.6K engagements "Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA Bypassing multi-factor authentication was once considered more of a proof of concept then an actual threat. In this video we will review four common techniques an attacker will utilize to hack multi-factor and two-factor authentication. Well review Evilgenix2 which is a popular framework for stealing authentication cookies and other methods that an attacker can utilize to bypass the authentication process. 1:06 Evilgenix2 Framework 2:51 Evilgenix Defense and Protection 3:45 Pass the Cookie 5:10 Pass the Cookie Defense" [YouTube Link](https://youtube.com/watch?v=GexQHFt9fTE) 2021-12-27T18:39Z 39.4K followers, 81.2K engagements "What is Sovereign SASE Public vs Private SASE Explained Sovereign SASE is a new approach for deploying Secure Access Service Edge (SASE) entirely within an organizations private infrastructure. Unlike traditional SASE solutions that route data through vendor-managed clouds Sovereign SASE keeps security inspection user traffic and logging fully within your organizations boundaries. In this video we break down the core pillars of Sovereign SASE and explain why its becoming essential for regulated industries governments and enterprises with strict compliance needs. 👇 More Info 👇 Animations by" [YouTube Link](https://youtube.com/watch?v=NUcfRnIE2mc) 2025-06-25T12:09Z 39.4K followers, [----] engagements "The Cybersecurity Trends You NEED to Know With over [-----] security incidents analyzed the [----] Verizon Data Breach Investigations Report (DBIR) is the most comprehensive and cited report in the cybersecurity incident. In this video we dive deep into this 100-page report exploring the most significant trends and insights from over [-----] breaches over the last year. We'll wrap up by looking at actionable insights and defense measurements based on the DBIR's key metrics. 💡 In This Video: 0:48 - High-Level Trends: A closer look at how attackers are getting into networks. 2:00 - Method Breakdown:" [YouTube Link](https://youtube.com/watch?v=TX5yU7ohhzM) 2024-11-14T14:10Z 39.4K followers, [----] engagements "How to Use Canary Tokens for Threat Hunting Canary tokens are a free and simple way to detect breaches in your network. In this video we'll cover how Canary Tokens can turn your entire network into a giant honeypot and demo how to set these up on your network. What are Canary Tokens 0:28 How Canary Tokens Work 1:02 Honeypots vs Canary Tokens 1:48 Demo: Setting Up Canary Tokens 2:10 Canary Token Placement and Use Cases 4:43 Other Canary Token Use Cases 6:19 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove service. 🎯 Need content" [YouTube Link](https://youtube.com/watch?v=apixhc43JuE) 2020-06-30T14:39Z 39.4K followers, 29.6K engagements "The Cybersecurity Breaches You Missed (July) Get the latest cybersecurity news in under [--] seconds From [--] million McDonald's personal records exposed to Microsoft SharePoint zero-days exploited by state hackers and a [--] billion password database leaking onlineheres what happened in July. Learn how the attacks happened who was affected and how to protect your accounts now. 16B leak BlackByte CVE-2025-49704 CVE-2025-49706 CVE-2025-53770 IDOR Ingram Micro McHire AI Olivia chatbot RDP exploit SafePay Team SafePay ransomware ToolShell ToolShell exploit cloud security credential leak cyber attack" [YouTube Link](https://youtube.com/watch?v=gBR1hMFuUMI) 2025-07-28T15:45Z 39.4K followers, [---] engagements "T-Mobile Data Breach: Timeline Analysis and Lessons Learned The most recent T-Mobile hack is one of the largest data breaches in US history. [--] million current and former T-Mobile customer records containing social security numbers driver's licenses addresses and phone numbers have made their way to dark web forums. In this video we'll review the timeline of events as well as what T-Mobile could have done differently to stop this attack from ever occurring. 0:57 - T-Mobile data breach first reported 1:25 - How the attacker hacked T-Mobile 2:08 - T-Mobile confirms [--] million users impacted" [YouTube Link](https://youtube.com/watch?v=pF4Q88vuWI8) 2021-09-05T20:14Z 39.4K followers, [----] engagements "What is Machine Learning A.I. Models Algorithm and Learning Explained In this video we go over what Machine Learning is and how it works within the Artificial Intelligence framework. Well review the Machine Learning model learning methods and the algorithms used for different use cases. A.I. vs Machine Learning vs Deep Networks 0:42 Machine Learning Overview 1:18 Machine Learning Model 1:45 Supervised Learning 2:15 Unsupervised Learning 2:40 Semi-Supervised Learning 3:09 Reinforcement Learning 3:27 Machine Learning Formula 4:05 Classification Algorithm 4:40 Clustering Algorithm 5:40" [YouTube Link](https://youtube.com/watch?v=rADYARpj-V8) 2020-12-10T02:04Z 39.4K followers, 27.1K engagements "The Cybersecurity Breaches You Missed (August) A single phone call was all it took to kick off one of the biggest CRM data breaches of the year. Using vishing (voice phishing) attackers were able to gain access to sensitive customer information through widely used CRM platforms. In this video we break down how this campaign unfolded why voice-based phishing is becoming a powerful tool for cybercriminals and what every security leader needs to know about protecting their organization. 🔒 Subscribe to The CISO Perspective for insights on real-world cyberattacks AI-driven threats and practical" [YouTube Link](https://youtube.com/watch?v=1ErOE8Knn3A) 2025-09-01T15:55Z 39.4K followers, [----] engagements "Securing SD-WAN: [--] Considerations Perhaps nothing has been as disruptive to the traditional WAN then SD-WAN has been over the last couple of years. Gartner predicts 93% of organizations will be doing SD-WAN by [----]. In this video we'll review some SD-WAN use cases and review how to secure your SD-WAN deployments. SD-WAN Security Landscape 0:36 [--]. Opt for on-premise security 2:04 [--]. Application Routing Best Practices 3:55 [--]. Network Leakage 5:38 [--]. Transport Security 7:36 [--]. CASB (Cloud Access Security Broker) 9:31 sd-wan software defined wan software defined networking ztp secure branch" [YouTube Link](https://youtube.com/watch?v=5AN-sbxaN0w) 2019-11-20T18:11Z 39.4K followers, 13.4K engagements "Zero Trust in the Real World: The Technologies Behind the Theory 🔐 How do you turn Zero Trust theory into real-world implementation In this video we break down the real technologies and solutions that power modern Zero Trust Architecture (ZTA). Youll learn how different toolsranging from identity providers and firewalls to endpoint protection and segmentation gatewayscome together to meet the core tenets of NIST SP 800-207. Well explore how each technology contributes unique strengths to the framework and how they work in tandem to build a practical enforceable Zero Trust environment. 📺" [YouTube Link](https://youtube.com/watch?v=8S-Q70tPJPM) 2025-08-14T15:07Z 39.4K followers, [----] engagements "VNF: Five Considerations in Virtualizing Your Perimeter VNF (Virtual Networking Function) has been touted as the future of the network perimeter. In this video we'll discuss what VNF is along with [--] things to consider before moving to a virtual edge. Having worked with some of the largest Telco's and MSPs in the world to build out virtual networking services. Here are [--] lessons learned along the way: [--]. Performance 0:54 [--]. ASICs 2:14 [--]. Pre-deployment/Staging 3:30 [--]. Troubleshooting 4:29 [--]. Policy Changes 5:28 VNF Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing" [YouTube Link](https://youtube.com/watch?v=8ZM1ZTO9AvA) 2019-12-18T14:16Z 39.4K followers, [----] engagements "AIOps and MLOps: The Future of IT Explained AIOps (also known as MLOps) is a combination of big data with machine learning to enhance IT operations. Using artificial intelligence the system can find and predict network issues in real time. With Gartner predicting an increase of 700% over the next three years this technology is only just beginning. In this video we'll review what AIOps is uses cases and the five Gartner components that make up the system. 1:02 - Current I.T. Operations Triaging 1:53 - Intro to AIOps (Artificial Intelligence for IT Operations) 2:15 - Machine Learning for" [YouTube Link](https://youtube.com/watch?v=GRaSmqyIDaw) 2021-09-27T14:50Z 39.4K followers, 22.2K engagements "NextGen Firewall & IPS Evasion: [--] Defensive Techniques Firewall & IPS evasion is much easier then you think. In this video we take a look at a popular OpenSource tool called 'HTTP Evader' to see how we can bypass a nextgen firewall to deliver malware. We'll then take a look a [--] defensive measures to protect against over [---] of the most widely used evasion techniques in the wild. Evader Intro: 0:42 First Firewall Evasion Test: 1:48 Protocol Analyzer: 2:19 Protocol Enforcement: 3:18 Payload Signatures: 4:22 Second Firewall Evasion Test: 5:48 The Need For SSL Inspection: 6:13 How Deep Packet" [YouTube Link](https://youtube.com/watch?v=JXfm92Q_r-8) 2020-05-23T15:35Z 39.4K followers, [----] engagements "How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained) The Cybersecurity Kill Chain is a model for describing the steps an attacker must complete to carry a successful attack. Check out the full video here: https://youtu.be/II91fiUax2g In this video we'll look at defensive tools we can apply at every phase of the kill chain as part of a multi layered security strategy. Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa Cisco Pan juniper advanced threat protection fortigate incident response" [YouTube Link](https://youtube.com/watch?v=JrRQAwVLaZo) 2024-11-22T15:15Z 39.4K followers, [----] engagements "The Disturbing Reality of Deepfake Technology FULL VIDEO GUIDE COMING SOON. These are Deepfake samples for educational purposes only. The goal is to demonstrate the current capabilities and techniques used for deepfakes. Full video coming to The CISO Perspective YouTube channel -Sample #1 uses ElevenLabs to voice clone and Wave2Lips to lip sync the audio. -Sample #2 uses Roop Unleashes for the face swap -Sample #3 uses Tortoise to voice clone and Wave2Lips to lip sync the audio. deepfakes technology cybersecurity awareness education threatdetection securityawareness maliciousmanipulation" [YouTube Link](https://youtube.com/watch?v=MmCir79oAAE) 2023-11-26T13:00Z 39.4K followers, [----] engagements "What is Secure Access Service Edge (SASE) Secure Access Service Edge (SASE) is a term coined by Gartner that combines some of today's most popular technologies into a single solution. In this video we'll cover what SASE Core Recommended and Optional levels include and how the various technologies work together. SASE Core Recommended and Optional 0:47 Why SASE 1:32 Zero Trust Network Access 2:33 SASE Endpoint (Off-net vs on-net) 3:20 SD-WAN with SASE 4:25 SASE Policies 5:53 Cloud Access Security Broker (CASB) 6:22 Putting it all together 7:10 👇 More Info 👇 Animations by TCP Media:" [YouTube Link](https://youtube.com/watch?v=Opy9D-8eyVg) 2020-08-14T00:18Z 39.4K followers, 168.8K engagements "How Hackers Exploit Software Vulnerabilities Exploits represent any piece of code data or sequence of commands that targets a vulnerable application for the purpose of gaining unauthorized access. Log4j is one of the most popular recent exploits that is widely considered to be the most dangerous exploit of our time. In this video we will break down the anatomy of an exploit and how each part of the malicious code comes together to target a vulnerable application. Well discuss the three distinct parts most exploits have in common as well as a deep dive into Log4j. Exploit Anatomy 0:51 Lof4j" [YouTube Link](https://youtube.com/watch?v=PwQlEjZ2sSw) 2022-02-04T13:19Z 39.4K followers, 18.1K engagements "The AI Art Revolution is Here (and its worse than you think) In this video we dive into the world of how A.I generated fake images are created using the popular Stable Diffusion LLM. Unlike Midjourney and Open AI's DALL-E Stable Diffusion's opensource nature has an extensive community and tools for custom training. But this hub for innovation has also sparked a wave of hyper-realistic A.I. fakes. In This video we'll not just cover how these images are created but more importantly how to detect A.I. generated fake images. Stable Diffusion Overview 0:25 Forms of A.I. Generated Fake Images 1:14" [YouTube Link](https://youtube.com/watch?v=Vuq49V25WE4) 2024-02-06T15:00Z 39.4K followers, [----] engagements "The Cybersecurity Breaches You Missed (December) Cybersecurity minute recaps all the major cybersecurity events and news for the month of December. Spoiler alert: ALOT of China linked activity - Chinese U.S. Treasury Hack - Salt Typhoon: U.S. Telecom Breach - SMS Based 2FA Bypass - TP-Link Routers Ban #cybersecuritytrends #cybersecurity #cybersecurity #news #APTGroups #ChinaHack #CyberAttack2024 #CyberDefense #CyberSecurityRecap #CyberThreats #CybersecurityTrends #CybersecurityUpdate #HackingNews #InfoSec #NationStateAttacks #SaltTyphoon #TelecomBreach #ThreatIntelligence #USTreasuryHack" [YouTube Link](https://youtube.com/watch?v=Whqipo_zuDE) 2025-01-01T16:40Z 39.4K followers, [---] engagements "Cyber security Kill Chain: Active Reconnaissance Overview Methodology and Tools Reconnaissance is the first in the cyber security kill-chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the" [YouTube Link](https://youtube.com/watch?v=ZSDnF0tu8_A) 2020-11-08T17:00Z 39.4K followers, 10.2K engagements "Securing Your AWS Virtual Private Cloud AWS' "Shared Responsibility Model" states that customers are responsible for security in their cloud. In this video we'll cover how to design a secure VPC using a Next-Gen Firewall from the AWS Marketplace. VPC Basics: 0:52 Segmenting AWS Traffic : 2:07 VPC Network Flow: 2:26 NGFW Design in AWS: 3:23 East to West (Micro Segmentation): 4:53 High Availability: 5:50 Vendor HA: 6:33 aws vpc security group network access control next-gen ngext-gen firewall palo alto fortinet checkpoint cisco firewall f5 waf Next-gen firewall ngfw cybersecurity network" [YouTube Link](https://youtube.com/watch?v=az3MwzwWI30) 2019-06-24T20:25Z 39.4K followers, 12.1K engagements "Securing Your VPN: Six Considerations With the majority of the work force now working from home VPN's have never been more important. The increase demand to work from home can put pressure on IT organization to come up with quick solutions for business continuity. However a poorly design VPN rollout can be catastrophic for your network. In this video we'll cover how to secure your VPN network rollouts and best practices. [--]. Known Vulnerabilities in Major VPN Vendors 0:55 [--]. Selecting Secure VPN Protocols 2:00 [--]. Multi Factor Authentication 3:09 [--]. Using Certificates 3:56 [--]. Segmentation 4:39" [YouTube Link](https://youtube.com/watch?v=br3hsS0kzqI) 2020-04-06T20:01Z 39.4K followers, [----] engagements "ATT&CK Matrix: The Enemies Playbook ATT&CK Matrix by MITRE is the world's most comprehensive research on malware and threats to date. Based on millions of real-world events the Matrix provides the "playbook" used by the world's most notorious hacking groups and malware. In this video we'll cover everything you need to start using ATT&CK today. Expanding on the Cybersecurity Kill Chain: 1:02 ATT&CK Matrix Intro: 2:02 Understanding TTP: 3:42 Getting Started with ATT&CK: 4:26 The ATT&CK Navigator demo: 5:25 The Pyramid of Pain: 8:15 Defending against behaviors vs tools: 9:23 Implementing the" [YouTube Link](https://youtube.com/watch?v=h7j7zl6xrdc) 2019-09-24T11:20Z 39.4K followers, 57.6K engagements "What is Security Service Edge (SSE) SASE vs SSE vs VPN In this video we compare traditional VPN vs SASE and SSE (Security Service Edge). SSE and SASE are categories of technology that provide Cloud-delivered security services. Well review the components that make up SASE and SSE and look at how these two similar services compare. The Problem with VPNs 0:01 Secure Access Service Edge (SASE) Overview 1:28 SASE Components 2:10 SASE Integration 3:08 Security Service Edge (SSE) 4:40 SASE vs SSE 4:53 Choosing Between SASE and SSE 5:31 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com" [YouTube Link](https://youtube.com/watch?v=jHVe_SoQ7q0) 2022-05-26T17:11Z 39.4K followers, 92.8K engagements "How to Become a Product Manager (PM) According to Glassdoor Product Management (PM) is one of the fastest growing and highest paying jobs in technology. As a PM you're responsible for the vision strategy and implementation of a given product. For people coming from a technical background the PM role is a great career aspiration. In this #short [--] second video we discuss the role of a Product Manager and the four knowledge domains every PM should have. career cybersecurity cybersecurity careers digital product i.t. jobs pm product design product management product manager product manager" [YouTube Link](https://youtube.com/watch?v=lVbUmEhLozA) 2022-03-15T13:38Z 39.4K followers, [----] engagements "Zero Trust Architecture Tenants Explained in [--] Seconds This video explains the core tenets of a Zero Trust Architecture according to NIST 800-207. These seven principals outline the must have requirements in any Zero Trust Architecture. Check out the full video on Zero Trust Architecture for more details: Part1: https://youtu.be/5Kq64vOgE10si=KPNVnpzetkWA8IRM Part 2: https://youtu.be/8S-Q70tPJPMsi=fb65h7rjZ7Vo7_M7 cybersecurity identity management network security nist [---] [---] nist 800-207 nist compliance risk management what is zero trust zero trust zero trust architecture zero trust" [YouTube Link](https://youtube.com/watch?v=pUQcmuEe68I) 2025-09-12T16:16Z 39.4K followers, [----] engagements "The Iran Cyber Threat: What You Need To Know All US organizations should be on high alert after DHS released a warning (AA20-006A) that an Iran cyber threat is possible. According to CISA these attacks are likely to come from either Iranian intelligence contractors or pro-Iran Hacktivist groups. APT groups [--] [--] and [--] are powerful adversaries with Iran ties. In this video we'll take a deeper look at who these groups are and what attacks they're known for using the ATT&CK Matrix. Cyberattack Warning 0:23 APT Groups Involved 1:05 APT Targets and Industries 1:39 CISA Recommended Actions 2:10" [YouTube Link](https://youtube.com/watch?v=xmrNcInItZU) 2020-01-14T13:17Z 39.4K followers, [----] engagements "5 Terrifying Cyber-Security Trends for [----] Sextortion Murder For Hire Webcam hacking and more. [----] was a scary year in cyber security. Here are Five Terrifying Cyber Security Trends for [----] [--]. Sextortion Emails [--]. Webcam Hacking [--]. Hitman for Hire [--]. Attacks by Our Own Devices [--]. Supply Chain Poisoning cybersecurity security network security infosec malware supply chain webcam hacking hacker shodan hack information security sandboxing atp advanced threat advanced malware virus zero day [--] day fileless malware fileless av-comparatives av-test vb100 intrusion prevention incident response" [YouTube Link](https://youtube.com/watch?v=z-5RlpS8iSk) 2019-01-13T02:06Z 39.4K followers, 27.1K engagements "Zero Trust Architecture Tenants Explained in [--] Seconds This video explains the core tenets of a Zero Trust Architecture according to NIST 800-207. These seven principals outline the must have requirements in any Zero Trust Architecture. Check out the full video on Zero Trust Architecture for more details: Part1: https://youtu.be/5Kq64vOgE10si=KPNVnpzetkWA8IRM Part 2: https://youtu.be/8S-Q70tPJPMsi=fb65h7rjZ7Vo7_M7 cybersecurity identity management network security nist [---] [---] nist 800-207 nist compliance risk management what is zero trust zero trust zero trust architecture zero trust" [YouTube Link](https://youtube.com/watch?v=pUQcmuEe68I) 2025-09-12T16:16Z 39.4K followers, [----] engagements "The Cybersecurity Breaches You Missed (August) A single phone call was all it took to kick off one of the biggest CRM data breaches of the year. Using vishing (voice phishing) attackers were able to gain access to sensitive customer information through widely used CRM platforms. In this video we break down how this campaign unfolded why voice-based phishing is becoming a powerful tool for cybercriminals and what every security leader needs to know about protecting their organization. 🔒 Subscribe to The CISO Perspective for insights on real-world cyberattacks AI-driven threats and practical" [YouTube Link](https://youtube.com/watch?v=1ErOE8Knn3A) 2025-09-01T15:55Z 39.4K followers, [----] engagements "Zero Trust in the Real World: The Technologies Behind the Theory 🔐 How do you turn Zero Trust theory into real-world implementation In this video we break down the real technologies and solutions that power modern Zero Trust Architecture (ZTA). Youll learn how different toolsranging from identity providers and firewalls to endpoint protection and segmentation gatewayscome together to meet the core tenets of NIST SP 800-207. Well explore how each technology contributes unique strengths to the framework and how they work in tandem to build a practical enforceable Zero Trust environment. 📺" [YouTube Link](https://youtube.com/watch?v=8S-Q70tPJPM) 2025-08-14T15:07Z 39.4K followers, [----] engagements "The Cybersecurity Breaches You Missed (July) Get the latest cybersecurity news in under [--] seconds From [--] million McDonald's personal records exposed to Microsoft SharePoint zero-days exploited by state hackers and a [--] billion password database leaking onlineheres what happened in July. Learn how the attacks happened who was affected and how to protect your accounts now. 16B leak BlackByte CVE-2025-49704 CVE-2025-49706 CVE-2025-53770 IDOR Ingram Micro McHire AI Olivia chatbot RDP exploit SafePay Team SafePay ransomware ToolShell ToolShell exploit cloud security credential leak cyber attack" [YouTube Link](https://youtube.com/watch?v=gBR1hMFuUMI) 2025-07-28T15:45Z 39.4K followers, [---] engagements "What Is Zero Trust Architecture (ZTA) NIST 800-207 Explained In this video we break down Zero Trust Architecture (ZTA) using the official guidance from NIST 800-207 the gold standard for Zero Trust frameworks Youll learn how Zero Trust works why its essential in modern cybersecurity and how to design and deploy it effectively across your enterprise network. Whether youre an IT leader security engineer or CISO this video is packed with practical insights to help you confidently adopt a Zero Trust model. Timestamps: 00:40 Zero Trust Basics 01:15 Defining a Zero Trust Architecture 01:36 The Zero" [YouTube Link](https://youtube.com/watch?v=5Kq64vOgE10) 2025-07-19T12:50Z 39.4K followers, 14.2K engagements "Sovereign SASE Architecture Overview #cybersecurity #sase In this clip we dive into the Sovereign SASE Architecture breaking down exactly how the control plane data plane and user layer combine to deliver secure and compliant connectivity entirely within your organizations boundaries. 🎬 Watch the full video here: https://www.youtube.com/watchv=NUcfRnIE2mc 🔔 Subscribe now for more cybersecurity insights and tutorials from The CISO Perspective. Sovereign SASE SASE Architecture Data Sovereignty Cybersecurity Secure Access Service Edge Network Security Compliance Cloud Security Security" [YouTube Link](https://youtube.com/watch?v=7-xA6Wsr7tI) 2025-07-06T16:19Z 39.4K followers, [----] engagements "What is Sovereign SASE Public vs Private SASE Explained Sovereign SASE is a new approach for deploying Secure Access Service Edge (SASE) entirely within an organizations private infrastructure. Unlike traditional SASE solutions that route data through vendor-managed clouds Sovereign SASE keeps security inspection user traffic and logging fully within your organizations boundaries. In this video we break down the core pillars of Sovereign SASE and explain why its becoming essential for regulated industries governments and enterprises with strict compliance needs. 👇 More Info 👇 Animations by" [YouTube Link](https://youtube.com/watch?v=NUcfRnIE2mc) 2025-06-25T12:09Z 39.4K followers, [----] engagements "The Cybersecurity Breaches You Missed (December) Cybersecurity minute recaps all the major cybersecurity events and news for the month of December. Spoiler alert: ALOT of China linked activity - Chinese U.S. Treasury Hack - Salt Typhoon: U.S. Telecom Breach - SMS Based 2FA Bypass - TP-Link Routers Ban #cybersecuritytrends #cybersecurity #cybersecurity #news #APTGroups #ChinaHack #CyberAttack2024 #CyberDefense #CyberSecurityRecap #CyberThreats #CybersecurityTrends #CybersecurityUpdate #HackingNews #InfoSec #NationStateAttacks #SaltTyphoon #TelecomBreach #ThreatIntelligence #USTreasuryHack" [YouTube Link](https://youtube.com/watch?v=Whqipo_zuDE) 2025-01-01T16:40Z 39.4K followers, [---] engagements "How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained) The Cybersecurity Kill Chain is a model for describing the steps an attacker must complete to carry a successful attack. Check out the full video here: https://youtu.be/II91fiUax2g In this video we'll look at defensive tools we can apply at every phase of the kill chain as part of a multi layered security strategy. Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa Cisco Pan juniper advanced threat protection fortigate incident response" [YouTube Link](https://youtube.com/watch?v=JrRQAwVLaZo) 2024-11-22T15:15Z 39.4K followers, [----] engagements "The Cybersecurity Trends You NEED to Know With over [-----] security incidents analyzed the [----] Verizon Data Breach Investigations Report (DBIR) is the most comprehensive and cited report in the cybersecurity incident. In this video we dive deep into this 100-page report exploring the most significant trends and insights from over [-----] breaches over the last year. We'll wrap up by looking at actionable insights and defense measurements based on the DBIR's key metrics. 💡 In This Video: 0:48 - High-Level Trends: A closer look at how attackers are getting into networks. 2:00 - Method Breakdown:" [YouTube Link](https://youtube.com/watch?v=TX5yU7ohhzM) 2024-11-14T14:10Z 39.4K followers, [----] engagements "The AI Art Revolution is Here (and its worse than you think) In this video we dive into the world of how A.I generated fake images are created using the popular Stable Diffusion LLM. Unlike Midjourney and Open AI's DALL-E Stable Diffusion's opensource nature has an extensive community and tools for custom training. But this hub for innovation has also sparked a wave of hyper-realistic A.I. fakes. In This video we'll not just cover how these images are created but more importantly how to detect A.I. generated fake images. Stable Diffusion Overview 0:25 Forms of A.I. Generated Fake Images 1:14" [YouTube Link](https://youtube.com/watch?v=Vuq49V25WE4) 2024-02-06T15:00Z 39.4K followers, [----] engagements "The Disturbing Reality of Deepfake Technology FULL VIDEO GUIDE COMING SOON. These are Deepfake samples for educational purposes only. The goal is to demonstrate the current capabilities and techniques used for deepfakes. Full video coming to The CISO Perspective YouTube channel -Sample #1 uses ElevenLabs to voice clone and Wave2Lips to lip sync the audio. -Sample #2 uses Roop Unleashes for the face swap -Sample #3 uses Tortoise to voice clone and Wave2Lips to lip sync the audio. deepfakes technology cybersecurity awareness education threatdetection securityawareness maliciousmanipulation" [YouTube Link](https://youtube.com/watch?v=MmCir79oAAE) 2023-11-26T13:00Z 39.4K followers, [----] engagements "AI-Powered Cyber Attacks: The Next Frontier in Offensive Security ChatGPT may represent one of the biggest disruptions in modern history with it's powerful A.I based chatbot. But within weeks of ChatGPT's release security researchers discovered several cases of people using ChatGPT for everything from malware development to exploit coding. In this video take a look at the five ways attackers are utilizing ChatGPT for wrong doing. 0:14 Intro to ChatGPT / Natural Language Processing (NLP) & GPT 1:28 Using ChatGPT for Vulnerability Discovery 1:56 Vulnerability Prompts to Utilize 3:10 Writing" [YouTube Link](https://youtube.com/watch?v=AwQE3jof63U) 2023-02-15T20:42Z 39.4K followers, 60.6K engagements "What is Security Service Edge (SSE) SASE vs SSE vs VPN In this video we compare traditional VPN vs SASE and SSE (Security Service Edge). SSE and SASE are categories of technology that provide Cloud-delivered security services. Well review the components that make up SASE and SSE and look at how these two similar services compare. The Problem with VPNs 0:01 Secure Access Service Edge (SASE) Overview 1:28 SASE Components 2:10 SASE Integration 3:08 Security Service Edge (SSE) 4:40 SASE vs SSE 4:53 Choosing Between SASE and SSE 5:31 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com" [YouTube Link](https://youtube.com/watch?v=jHVe_SoQ7q0) 2022-05-26T17:11Z 39.4K followers, 92.8K engagements "What is Zero Trust Network Access (ZTNA) The Zero Trust Model Framework and Technologies Explained Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPNs as a more secure and scalable way to provide remote connectivity. Unlike VPNs Zero Trust provides a scalable way to provide secure connectivity without the need of centralized equipment. In this video we take a deep dive on Zero Trust Network Access (ZTNA) and walk through the models principles and architectures its based on. Well review what exactly Zero Trust is as well as the foundational concepts that are at the" [YouTube Link](https://youtube.com/watch?v=DLQAbJm4gFM) 2022-05-02T17:22Z 39.4K followers, 178.4K engagements "How to Become a Product Manager (PM) According to Glassdoor Product Management (PM) is one of the fastest growing and highest paying jobs in technology. As a PM you're responsible for the vision strategy and implementation of a given product. For people coming from a technical background the PM role is a great career aspiration. In this #short [--] second video we discuss the role of a Product Manager and the four knowledge domains every PM should have. career cybersecurity cybersecurity careers digital product i.t. jobs pm product design product management product manager product manager" [YouTube Link](https://youtube.com/watch?v=lVbUmEhLozA) 2022-03-15T13:38Z 39.4K followers, [----] engagements "How Hackers Exploit Software Vulnerabilities Exploits represent any piece of code data or sequence of commands that targets a vulnerable application for the purpose of gaining unauthorized access. Log4j is one of the most popular recent exploits that is widely considered to be the most dangerous exploit of our time. In this video we will break down the anatomy of an exploit and how each part of the malicious code comes together to target a vulnerable application. Well discuss the three distinct parts most exploits have in common as well as a deep dive into Log4j. Exploit Anatomy 0:51 Lof4j" [YouTube Link](https://youtube.com/watch?v=PwQlEjZ2sSw) 2022-02-04T13:19Z 39.4K followers, 18.1K engagements "Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA Bypassing multi-factor authentication was once considered more of a proof of concept then an actual threat. In this video we will review four common techniques an attacker will utilize to hack multi-factor and two-factor authentication. Well review Evilgenix2 which is a popular framework for stealing authentication cookies and other methods that an attacker can utilize to bypass the authentication process. 1:06 Evilgenix2 Framework 2:51 Evilgenix Defense and Protection 3:45 Pass the Cookie 5:10 Pass the Cookie Defense" [YouTube Link](https://youtube.com/watch?v=GexQHFt9fTE) 2021-12-27T18:39Z 39.4K followers, 81.2K engagements "AIOps and MLOps: The Future of IT Explained AIOps (also known as MLOps) is a combination of big data with machine learning to enhance IT operations. Using artificial intelligence the system can find and predict network issues in real time. With Gartner predicting an increase of 700% over the next three years this technology is only just beginning. In this video we'll review what AIOps is uses cases and the five Gartner components that make up the system. 1:02 - Current I.T. Operations Triaging 1:53 - Intro to AIOps (Artificial Intelligence for IT Operations) 2:15 - Machine Learning for" [YouTube Link](https://youtube.com/watch?v=GRaSmqyIDaw) 2021-09-27T14:50Z 39.4K followers, 22.2K engagements "T-Mobile Data Breach: Timeline Analysis and Lessons Learned The most recent T-Mobile hack is one of the largest data breaches in US history. [--] million current and former T-Mobile customer records containing social security numbers driver's licenses addresses and phone numbers have made their way to dark web forums. In this video we'll review the timeline of events as well as what T-Mobile could have done differently to stop this attack from ever occurring. 0:57 - T-Mobile data breach first reported 1:25 - How the attacker hacked T-Mobile 2:08 - T-Mobile confirms [--] million users impacted" [YouTube Link](https://youtube.com/watch?v=pF4Q88vuWI8) 2021-09-05T20:14Z 39.4K followers, [----] engagements "What is XDR vs EDR vs MDR Breaking down Extended Detection and Response Extended Detection and Response (XDR) is a cybersecurity tool that integrates with multiple products to detect and respond to threats. While EDR (Endpoint Detection and Response) focuses on the endpoint XDR uses A.I. to ingests information from multiple sources and detect patterns across different device types. In this video we'll discuss what XDR is and how it compares to EDR and MDR (Managed Detection and Response). Overview 0:55 - What is Endpoint Detection and Response (EDR) 3:11 - Traditional Endpoint vs EDR 3:46 -" [YouTube Link](https://youtube.com/watch?v=SFFdbeogLFc) 2021-08-23T17:34Z 39.4K followers, 241.2K engagements "What is Machine Learning A.I. Models Algorithm and Learning Explained In this video we go over what Machine Learning is and how it works within the Artificial Intelligence framework. Well review the Machine Learning model learning methods and the algorithms used for different use cases. A.I. vs Machine Learning vs Deep Networks 0:42 Machine Learning Overview 1:18 Machine Learning Model 1:45 Supervised Learning 2:15 Unsupervised Learning 2:40 Semi-Supervised Learning 3:09 Reinforcement Learning 3:27 Machine Learning Formula 4:05 Classification Algorithm 4:40 Clustering Algorithm 5:40" [YouTube Link](https://youtube.com/watch?v=rADYARpj-V8) 2020-12-10T02:04Z 39.4K followers, 27.1K engagements "Cyber security Kill Chain: Active Reconnaissance Overview Methodology and Tools Reconnaissance is the first in the cyber security kill-chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the" [YouTube Link](https://youtube.com/watch?v=ZSDnF0tu8_A) 2020-11-08T17:00Z 39.4K followers, 10.2K engagements "What is Open Source Intelligence (OSINT) The OSINT Tools Techniques and Framework Explained Reconnaissance is the first step of the cybersecurity kill chain and the foundation to a successful attack. Open-source Intelligence (OSINT) is the practice of collecting publicly available information about a target. In this video we'll cover what OSINT is the framework and methodology for an OSINT investigation and some of the top tools in OSINT data investigation. What is OSINT (Open-source Intelligence) 1:09 The OSINT Methodology and Process 1:34 OSINT Tools 2:23 Maltego Overview 2:30 theHarvester" [YouTube Link](https://youtube.com/watch?v=J4_rRn0cFew) 2020-10-26T18:45Z 39.4K followers, 36.5K engagements "What is Secure Access Service Edge (SASE) Secure Access Service Edge (SASE) is a term coined by Gartner that combines some of today's most popular technologies into a single solution. In this video we'll cover what SASE Core Recommended and Optional levels include and how the various technologies work together. SASE Core Recommended and Optional 0:47 Why SASE 1:32 Zero Trust Network Access 2:33 SASE Endpoint (Off-net vs on-net) 3:20 SD-WAN with SASE 4:25 SASE Policies 5:53 Cloud Access Security Broker (CASB) 6:22 Putting it all together 7:10 👇 More Info 👇 Animations by TCP Media:" [YouTube Link](https://youtube.com/watch?v=Opy9D-8eyVg) 2020-08-14T00:18Z 39.4K followers, 168.8K engagements "How to Use Canary Tokens for Threat Hunting Canary tokens are a free and simple way to detect breaches in your network. In this video we'll cover how Canary Tokens can turn your entire network into a giant honeypot and demo how to set these up on your network. What are Canary Tokens 0:28 How Canary Tokens Work 1:02 Honeypots vs Canary Tokens 1:48 Demo: Setting Up Canary Tokens 2:10 Canary Token Placement and Use Cases 4:43 Other Canary Token Use Cases 6:19 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove service. 🎯 Need content" [YouTube Link](https://youtube.com/watch?v=apixhc43JuE) 2020-06-30T14:39Z 39.4K followers, 29.6K engagements "NextGen Firewall & IPS Evasion: [--] Defensive Techniques Firewall & IPS evasion is much easier then you think. In this video we take a look at a popular OpenSource tool called 'HTTP Evader' to see how we can bypass a nextgen firewall to deliver malware. We'll then take a look a [--] defensive measures to protect against over [---] of the most widely used evasion techniques in the wild. Evader Intro: 0:42 First Firewall Evasion Test: 1:48 Protocol Analyzer: 2:19 Protocol Enforcement: 3:18 Payload Signatures: 4:22 Second Firewall Evasion Test: 5:48 The Need For SSL Inspection: 6:13 How Deep Packet" [YouTube Link](https://youtube.com/watch?v=JXfm92Q_r-8) 2020-05-23T15:35Z 39.4K followers, [----] engagements "Securing Your VPN: Six Considerations With the majority of the work force now working from home VPN's have never been more important. The increase demand to work from home can put pressure on IT organization to come up with quick solutions for business continuity. However a poorly design VPN rollout can be catastrophic for your network. In this video we'll cover how to secure your VPN network rollouts and best practices. [--]. Known Vulnerabilities in Major VPN Vendors 0:55 [--]. Selecting Secure VPN Protocols 2:00 [--]. Multi Factor Authentication 3:09 [--]. Using Certificates 3:56 [--]. Segmentation 4:39" [YouTube Link](https://youtube.com/watch?v=br3hsS0kzqI) 2020-04-06T20:01Z 39.4K followers, [----] engagements "The Iran Cyber Threat: What You Need To Know All US organizations should be on high alert after DHS released a warning (AA20-006A) that an Iran cyber threat is possible. According to CISA these attacks are likely to come from either Iranian intelligence contractors or pro-Iran Hacktivist groups. APT groups [--] [--] and [--] are powerful adversaries with Iran ties. In this video we'll take a deeper look at who these groups are and what attacks they're known for using the ATT&CK Matrix. Cyberattack Warning 0:23 APT Groups Involved 1:05 APT Targets and Industries 1:39 CISA Recommended Actions 2:10" [YouTube Link](https://youtube.com/watch?v=xmrNcInItZU) 2020-01-14T13:17Z 39.4K followers, [----] engagements "VNF: Five Considerations in Virtualizing Your Perimeter VNF (Virtual Networking Function) has been touted as the future of the network perimeter. In this video we'll discuss what VNF is along with [--] things to consider before moving to a virtual edge. Having worked with some of the largest Telco's and MSPs in the world to build out virtual networking services. Here are [--] lessons learned along the way: [--]. Performance 0:54 [--]. ASICs 2:14 [--]. Pre-deployment/Staging 3:30 [--]. Troubleshooting 4:29 [--]. Policy Changes 5:28 VNF Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing" [YouTube Link](https://youtube.com/watch?v=8ZM1ZTO9AvA) 2019-12-18T14:16Z 39.4K followers, [----] engagements "Securing SD-WAN: [--] Considerations Perhaps nothing has been as disruptive to the traditional WAN then SD-WAN has been over the last couple of years. Gartner predicts 93% of organizations will be doing SD-WAN by [----]. In this video we'll review some SD-WAN use cases and review how to secure your SD-WAN deployments. SD-WAN Security Landscape 0:36 [--]. Opt for on-premise security 2:04 [--]. Application Routing Best Practices 3:55 [--]. Network Leakage 5:38 [--]. Transport Security 7:36 [--]. CASB (Cloud Access Security Broker) 9:31 sd-wan software defined wan software defined networking ztp secure branch" [YouTube Link](https://youtube.com/watch?v=5AN-sbxaN0w) 2019-11-20T18:11Z 39.4K followers, 13.4K engagements "ATT&CK Matrix: The Enemies Playbook ATT&CK Matrix by MITRE is the world's most comprehensive research on malware and threats to date. Based on millions of real-world events the Matrix provides the "playbook" used by the world's most notorious hacking groups and malware. In this video we'll cover everything you need to start using ATT&CK today. Expanding on the Cybersecurity Kill Chain: 1:02 ATT&CK Matrix Intro: 2:02 Understanding TTP: 3:42 Getting Started with ATT&CK: 4:26 The ATT&CK Navigator demo: 5:25 The Pyramid of Pain: 8:15 Defending against behaviors vs tools: 9:23 Implementing the" [YouTube Link](https://youtube.com/watch?v=h7j7zl6xrdc) 2019-09-24T11:20Z 39.4K followers, 57.6K engagements "Securing Your AWS Virtual Private Cloud AWS' "Shared Responsibility Model" states that customers are responsible for security in their cloud. In this video we'll cover how to design a secure VPC using a Next-Gen Firewall from the AWS Marketplace. VPC Basics: 0:52 Segmenting AWS Traffic : 2:07 VPC Network Flow: 2:26 NGFW Design in AWS: 3:23 East to West (Micro Segmentation): 4:53 High Availability: 5:50 Vendor HA: 6:33 aws vpc security group network access control next-gen ngext-gen firewall palo alto fortinet checkpoint cisco firewall f5 waf Next-gen firewall ngfw cybersecurity network" [YouTube Link](https://youtube.com/watch?v=az3MwzwWI30) 2019-06-24T20:25Z 39.4K followers, 12.1K engagements "Accomplishing Zero Trust Security Using SDP Zero Trust security is the hottest topic of conversations among CISOs and security people. But for a long time the question has been "How do I get there" The Software Defined Perimeter(SDP) is one of the most popular implementations of the Zero Trust security model. In this video we review how to accomplish Zero Trust security using SDP zero trust security models cybersecurity infosec software defined software defined perimeter sdp beyondcorp kill chain information security Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall" [YouTube Link](https://youtube.com/watch?v=_yGGZj9wkaU) 2019-03-15T16:21Z 39.4K followers, 42K engagements "Breaking The Kill-Chain: A Defensive Approach The Cybersecurity Kill-Chain is a model for describing the steps an attacker must complete to carry a successful attack. In this video we'll look at defensive tools we can apply at every phase of the kill-chain as part of a multi layered security strategy. 0:00 Introduction 0:41 RECONNAISSANCE 2:23 WEAPONIZATION 3:48 DELIVERY 5:49 EXPLOITATION 7:24 INSTALLATION 8:55 COMMAND AND CONTROL 10:54 ACTIONS ON OBJECTIVE 12:21 THE CISO PERSPECTIVE 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove" [YouTube Link](https://youtube.com/watch?v=II91fiUax2g) 2019-02-05T19:49Z 39.4K followers, 198.8K engagements "5 Terrifying Cyber-Security Trends for [----] Sextortion Murder For Hire Webcam hacking and more. [----] was a scary year in cyber security. Here are Five Terrifying Cyber Security Trends for [----] [--]. Sextortion Emails [--]. Webcam Hacking [--]. Hitman for Hire [--]. Attacks by Our Own Devices [--]. Supply Chain Poisoning cybersecurity security network security infosec malware supply chain webcam hacking hacker shodan hack information security sandboxing atp advanced threat advanced malware virus zero day [--] day fileless malware fileless av-comparatives av-test vb100 intrusion prevention incident response" [YouTube Link](https://youtube.com/watch?v=z-5RlpS8iSk) 2019-01-13T02:06Z 39.4K followers, 27.1K engagements "5 Considerations: Sizing Your Next-Gen Firewall (NGFW) An undersized firewall can be catastrophic to your network. The CISO Perspective brings you the [--] most important things to consider when sizing your Next-Gen Firewall. [--]. CPS [--]. Total Throughput [--]. SSL [--]. NGFW Features [--]. Max Session (Concurrent Sessions) Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa asa Cisco Pan juniper advanced threat protection fortigate incident response Zero day [--] day malware virus nss intrusion prevention ciso information" [YouTube Link](https://youtube.com/watch?v=12AqJdlqXzM) 2018-12-24T01:43Z 39.4K followers, 57.3K engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@thecisoperspective The CISO PerspectiveThe CISO Perspective posts on YouTube about network, zero trust, trust, chain the most. They currently have [------] followers and [--] posts still getting attention that total [-----] engagements in the last [--] hours.
Social category influence technology brands stocks finance social networks countries
Social topic influence network #2444, zero trust #9, trust, chain #2088, virus #759, what is, checkpoint #61, kali, model, cloud
Top assets mentioned Zscaler Inc (ZS) Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL) Crowdstrike Holdings Inc (CRWD)
Top posts by engagements in the last [--] hours
"What Is Zero Trust Architecture (ZTA) NIST 800-207 Explained In this video we break down Zero Trust Architecture (ZTA) using the official guidance from NIST 800-207 the gold standard for Zero Trust frameworks Youll learn how Zero Trust works why its essential in modern cybersecurity and how to design and deploy it effectively across your enterprise network. Whether youre an IT leader security engineer or CISO this video is packed with practical insights to help you confidently adopt a Zero Trust model. Timestamps: 00:40 Zero Trust Basics 01:15 Defining a Zero Trust Architecture 01:36 The Zero"
YouTube Link 2025-07-19T12:50Z 39.4K followers, 14.2K engagements
"What is Zero Trust Network Access (ZTNA) The Zero Trust Model Framework and Technologies Explained Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPNs as a more secure and scalable way to provide remote connectivity. Unlike VPNs Zero Trust provides a scalable way to provide secure connectivity without the need of centralized equipment. In this video we take a deep dive on Zero Trust Network Access (ZTNA) and walk through the models principles and architectures its based on. Well review what exactly Zero Trust is as well as the foundational concepts that are at the"
YouTube Link 2022-05-02T17:22Z 39.4K followers, 178.4K engagements
"Breaking The Kill-Chain: A Defensive Approach The Cybersecurity Kill-Chain is a model for describing the steps an attacker must complete to carry a successful attack. In this video we'll look at defensive tools we can apply at every phase of the kill-chain as part of a multi layered security strategy. 0:00 Introduction 0:41 RECONNAISSANCE 2:23 WEAPONIZATION 3:48 DELIVERY 5:49 EXPLOITATION 7:24 INSTALLATION 8:55 COMMAND AND CONTROL 10:54 ACTIONS ON OBJECTIVE 12:21 THE CISO PERSPECTIVE 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove"
YouTube Link 2019-02-05T19:49Z 39.4K followers, 198.8K engagements
"What is XDR vs EDR vs MDR Breaking down Extended Detection and Response Extended Detection and Response (XDR) is a cybersecurity tool that integrates with multiple products to detect and respond to threats. While EDR (Endpoint Detection and Response) focuses on the endpoint XDR uses A.I. to ingests information from multiple sources and detect patterns across different device types. In this video we'll discuss what XDR is and how it compares to EDR and MDR (Managed Detection and Response). Overview 0:55 - What is Endpoint Detection and Response (EDR) 3:11 - Traditional Endpoint vs EDR 3:46 -"
YouTube Link 2021-08-23T17:34Z 39.4K followers, 241.2K engagements
"5 Considerations: Sizing Your Next-Gen Firewall (NGFW) An undersized firewall can be catastrophic to your network. The CISO Perspective brings you the [--] most important things to consider when sizing your Next-Gen Firewall. [--]. CPS [--]. Total Throughput [--]. SSL [--]. NGFW Features [--]. Max Session (Concurrent Sessions) Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa asa Cisco Pan juniper advanced threat protection fortigate incident response Zero day [--] day malware virus nss intrusion prevention ciso information"
YouTube Link 2018-12-24T01:43Z 39.4K followers, 57.3K engagements
"Sovereign SASE Architecture Overview #cybersecurity #sase In this clip we dive into the Sovereign SASE Architecture breaking down exactly how the control plane data plane and user layer combine to deliver secure and compliant connectivity entirely within your organizations boundaries. 🎬 Watch the full video here: https://www.youtube.com/watchv=NUcfRnIE2mc 🔔 Subscribe now for more cybersecurity insights and tutorials from The CISO Perspective. Sovereign SASE SASE Architecture Data Sovereignty Cybersecurity Secure Access Service Edge Network Security Compliance Cloud Security Security"
YouTube Link 2025-07-06T16:19Z 39.4K followers, [----] engagements
"What is Open Source Intelligence (OSINT) The OSINT Tools Techniques and Framework Explained Reconnaissance is the first step of the cybersecurity kill chain and the foundation to a successful attack. Open-source Intelligence (OSINT) is the practice of collecting publicly available information about a target. In this video we'll cover what OSINT is the framework and methodology for an OSINT investigation and some of the top tools in OSINT data investigation. What is OSINT (Open-source Intelligence) 1:09 The OSINT Methodology and Process 1:34 OSINT Tools 2:23 Maltego Overview 2:30 theHarvester"
YouTube Link 2020-10-26T18:45Z 39.4K followers, 36.5K engagements
"Accomplishing Zero Trust Security Using SDP Zero Trust security is the hottest topic of conversations among CISOs and security people. But for a long time the question has been "How do I get there" The Software Defined Perimeter(SDP) is one of the most popular implementations of the Zero Trust security model. In this video we review how to accomplish Zero Trust security using SDP zero trust security models cybersecurity infosec software defined software defined perimeter sdp beyondcorp kill chain information security Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall"
YouTube Link 2019-03-15T16:21Z 39.4K followers, 42K engagements
"AI-Powered Cyber Attacks: The Next Frontier in Offensive Security ChatGPT may represent one of the biggest disruptions in modern history with it's powerful A.I based chatbot. But within weeks of ChatGPT's release security researchers discovered several cases of people using ChatGPT for everything from malware development to exploit coding. In this video take a look at the five ways attackers are utilizing ChatGPT for wrong doing. 0:14 Intro to ChatGPT / Natural Language Processing (NLP) & GPT 1:28 Using ChatGPT for Vulnerability Discovery 1:56 Vulnerability Prompts to Utilize 3:10 Writing"
YouTube Link 2023-02-15T20:42Z 39.4K followers, 60.6K engagements
"Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA Bypassing multi-factor authentication was once considered more of a proof of concept then an actual threat. In this video we will review four common techniques an attacker will utilize to hack multi-factor and two-factor authentication. Well review Evilgenix2 which is a popular framework for stealing authentication cookies and other methods that an attacker can utilize to bypass the authentication process. 1:06 Evilgenix2 Framework 2:51 Evilgenix Defense and Protection 3:45 Pass the Cookie 5:10 Pass the Cookie Defense"
YouTube Link 2021-12-27T18:39Z 39.4K followers, 81.2K engagements
"What is Sovereign SASE Public vs Private SASE Explained Sovereign SASE is a new approach for deploying Secure Access Service Edge (SASE) entirely within an organizations private infrastructure. Unlike traditional SASE solutions that route data through vendor-managed clouds Sovereign SASE keeps security inspection user traffic and logging fully within your organizations boundaries. In this video we break down the core pillars of Sovereign SASE and explain why its becoming essential for regulated industries governments and enterprises with strict compliance needs. 👇 More Info 👇 Animations by"
YouTube Link 2025-06-25T12:09Z 39.4K followers, [----] engagements
"The Cybersecurity Trends You NEED to Know With over [-----] security incidents analyzed the [----] Verizon Data Breach Investigations Report (DBIR) is the most comprehensive and cited report in the cybersecurity incident. In this video we dive deep into this 100-page report exploring the most significant trends and insights from over [-----] breaches over the last year. We'll wrap up by looking at actionable insights and defense measurements based on the DBIR's key metrics. 💡 In This Video: 0:48 - High-Level Trends: A closer look at how attackers are getting into networks. 2:00 - Method Breakdown:"
YouTube Link 2024-11-14T14:10Z 39.4K followers, [----] engagements
"How to Use Canary Tokens for Threat Hunting Canary tokens are a free and simple way to detect breaches in your network. In this video we'll cover how Canary Tokens can turn your entire network into a giant honeypot and demo how to set these up on your network. What are Canary Tokens 0:28 How Canary Tokens Work 1:02 Honeypots vs Canary Tokens 1:48 Demo: Setting Up Canary Tokens 2:10 Canary Token Placement and Use Cases 4:43 Other Canary Token Use Cases 6:19 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove service. 🎯 Need content"
YouTube Link 2020-06-30T14:39Z 39.4K followers, 29.6K engagements
"The Cybersecurity Breaches You Missed (July) Get the latest cybersecurity news in under [--] seconds From [--] million McDonald's personal records exposed to Microsoft SharePoint zero-days exploited by state hackers and a [--] billion password database leaking onlineheres what happened in July. Learn how the attacks happened who was affected and how to protect your accounts now. 16B leak BlackByte CVE-2025-49704 CVE-2025-49706 CVE-2025-53770 IDOR Ingram Micro McHire AI Olivia chatbot RDP exploit SafePay Team SafePay ransomware ToolShell ToolShell exploit cloud security credential leak cyber attack"
YouTube Link 2025-07-28T15:45Z 39.4K followers, [---] engagements
"T-Mobile Data Breach: Timeline Analysis and Lessons Learned The most recent T-Mobile hack is one of the largest data breaches in US history. [--] million current and former T-Mobile customer records containing social security numbers driver's licenses addresses and phone numbers have made their way to dark web forums. In this video we'll review the timeline of events as well as what T-Mobile could have done differently to stop this attack from ever occurring. 0:57 - T-Mobile data breach first reported 1:25 - How the attacker hacked T-Mobile 2:08 - T-Mobile confirms [--] million users impacted"
YouTube Link 2021-09-05T20:14Z 39.4K followers, [----] engagements
"What is Machine Learning A.I. Models Algorithm and Learning Explained In this video we go over what Machine Learning is and how it works within the Artificial Intelligence framework. Well review the Machine Learning model learning methods and the algorithms used for different use cases. A.I. vs Machine Learning vs Deep Networks 0:42 Machine Learning Overview 1:18 Machine Learning Model 1:45 Supervised Learning 2:15 Unsupervised Learning 2:40 Semi-Supervised Learning 3:09 Reinforcement Learning 3:27 Machine Learning Formula 4:05 Classification Algorithm 4:40 Clustering Algorithm 5:40"
YouTube Link 2020-12-10T02:04Z 39.4K followers, 27.1K engagements
"The Cybersecurity Breaches You Missed (August) A single phone call was all it took to kick off one of the biggest CRM data breaches of the year. Using vishing (voice phishing) attackers were able to gain access to sensitive customer information through widely used CRM platforms. In this video we break down how this campaign unfolded why voice-based phishing is becoming a powerful tool for cybercriminals and what every security leader needs to know about protecting their organization. 🔒 Subscribe to The CISO Perspective for insights on real-world cyberattacks AI-driven threats and practical"
YouTube Link 2025-09-01T15:55Z 39.4K followers, [----] engagements
"Securing SD-WAN: [--] Considerations Perhaps nothing has been as disruptive to the traditional WAN then SD-WAN has been over the last couple of years. Gartner predicts 93% of organizations will be doing SD-WAN by [----]. In this video we'll review some SD-WAN use cases and review how to secure your SD-WAN deployments. SD-WAN Security Landscape 0:36 [--]. Opt for on-premise security 2:04 [--]. Application Routing Best Practices 3:55 [--]. Network Leakage 5:38 [--]. Transport Security 7:36 [--]. CASB (Cloud Access Security Broker) 9:31 sd-wan software defined wan software defined networking ztp secure branch"
YouTube Link 2019-11-20T18:11Z 39.4K followers, 13.4K engagements
"Zero Trust in the Real World: The Technologies Behind the Theory 🔐 How do you turn Zero Trust theory into real-world implementation In this video we break down the real technologies and solutions that power modern Zero Trust Architecture (ZTA). Youll learn how different toolsranging from identity providers and firewalls to endpoint protection and segmentation gatewayscome together to meet the core tenets of NIST SP 800-207. Well explore how each technology contributes unique strengths to the framework and how they work in tandem to build a practical enforceable Zero Trust environment. 📺"
YouTube Link 2025-08-14T15:07Z 39.4K followers, [----] engagements
"VNF: Five Considerations in Virtualizing Your Perimeter VNF (Virtual Networking Function) has been touted as the future of the network perimeter. In this video we'll discuss what VNF is along with [--] things to consider before moving to a virtual edge. Having worked with some of the largest Telco's and MSPs in the world to build out virtual networking services. Here are [--] lessons learned along the way: [--]. Performance 0:54 [--]. ASICs 2:14 [--]. Pre-deployment/Staging 3:30 [--]. Troubleshooting 4:29 [--]. Policy Changes 5:28 VNF Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing"
YouTube Link 2019-12-18T14:16Z 39.4K followers, [----] engagements
"AIOps and MLOps: The Future of IT Explained AIOps (also known as MLOps) is a combination of big data with machine learning to enhance IT operations. Using artificial intelligence the system can find and predict network issues in real time. With Gartner predicting an increase of 700% over the next three years this technology is only just beginning. In this video we'll review what AIOps is uses cases and the five Gartner components that make up the system. 1:02 - Current I.T. Operations Triaging 1:53 - Intro to AIOps (Artificial Intelligence for IT Operations) 2:15 - Machine Learning for"
YouTube Link 2021-09-27T14:50Z 39.4K followers, 22.2K engagements
"NextGen Firewall & IPS Evasion: [--] Defensive Techniques Firewall & IPS evasion is much easier then you think. In this video we take a look at a popular OpenSource tool called 'HTTP Evader' to see how we can bypass a nextgen firewall to deliver malware. We'll then take a look a [--] defensive measures to protect against over [---] of the most widely used evasion techniques in the wild. Evader Intro: 0:42 First Firewall Evasion Test: 1:48 Protocol Analyzer: 2:19 Protocol Enforcement: 3:18 Payload Signatures: 4:22 Second Firewall Evasion Test: 5:48 The Need For SSL Inspection: 6:13 How Deep Packet"
YouTube Link 2020-05-23T15:35Z 39.4K followers, [----] engagements
"How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained) The Cybersecurity Kill Chain is a model for describing the steps an attacker must complete to carry a successful attack. Check out the full video here: https://youtu.be/II91fiUax2g In this video we'll look at defensive tools we can apply at every phase of the kill chain as part of a multi layered security strategy. Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa Cisco Pan juniper advanced threat protection fortigate incident response"
YouTube Link 2024-11-22T15:15Z 39.4K followers, [----] engagements
"The Disturbing Reality of Deepfake Technology FULL VIDEO GUIDE COMING SOON. These are Deepfake samples for educational purposes only. The goal is to demonstrate the current capabilities and techniques used for deepfakes. Full video coming to The CISO Perspective YouTube channel -Sample #1 uses ElevenLabs to voice clone and Wave2Lips to lip sync the audio. -Sample #2 uses Roop Unleashes for the face swap -Sample #3 uses Tortoise to voice clone and Wave2Lips to lip sync the audio. deepfakes technology cybersecurity awareness education threatdetection securityawareness maliciousmanipulation"
YouTube Link 2023-11-26T13:00Z 39.4K followers, [----] engagements
"What is Secure Access Service Edge (SASE) Secure Access Service Edge (SASE) is a term coined by Gartner that combines some of today's most popular technologies into a single solution. In this video we'll cover what SASE Core Recommended and Optional levels include and how the various technologies work together. SASE Core Recommended and Optional 0:47 Why SASE 1:32 Zero Trust Network Access 2:33 SASE Endpoint (Off-net vs on-net) 3:20 SD-WAN with SASE 4:25 SASE Policies 5:53 Cloud Access Security Broker (CASB) 6:22 Putting it all together 7:10 👇 More Info 👇 Animations by TCP Media:"
YouTube Link 2020-08-14T00:18Z 39.4K followers, 168.8K engagements
"How Hackers Exploit Software Vulnerabilities Exploits represent any piece of code data or sequence of commands that targets a vulnerable application for the purpose of gaining unauthorized access. Log4j is one of the most popular recent exploits that is widely considered to be the most dangerous exploit of our time. In this video we will break down the anatomy of an exploit and how each part of the malicious code comes together to target a vulnerable application. Well discuss the three distinct parts most exploits have in common as well as a deep dive into Log4j. Exploit Anatomy 0:51 Lof4j"
YouTube Link 2022-02-04T13:19Z 39.4K followers, 18.1K engagements
"The AI Art Revolution is Here (and its worse than you think) In this video we dive into the world of how A.I generated fake images are created using the popular Stable Diffusion LLM. Unlike Midjourney and Open AI's DALL-E Stable Diffusion's opensource nature has an extensive community and tools for custom training. But this hub for innovation has also sparked a wave of hyper-realistic A.I. fakes. In This video we'll not just cover how these images are created but more importantly how to detect A.I. generated fake images. Stable Diffusion Overview 0:25 Forms of A.I. Generated Fake Images 1:14"
YouTube Link 2024-02-06T15:00Z 39.4K followers, [----] engagements
"The Cybersecurity Breaches You Missed (December) Cybersecurity minute recaps all the major cybersecurity events and news for the month of December. Spoiler alert: ALOT of China linked activity - Chinese U.S. Treasury Hack - Salt Typhoon: U.S. Telecom Breach - SMS Based 2FA Bypass - TP-Link Routers Ban #cybersecuritytrends #cybersecurity #cybersecurity #news #APTGroups #ChinaHack #CyberAttack2024 #CyberDefense #CyberSecurityRecap #CyberThreats #CybersecurityTrends #CybersecurityUpdate #HackingNews #InfoSec #NationStateAttacks #SaltTyphoon #TelecomBreach #ThreatIntelligence #USTreasuryHack"
YouTube Link 2025-01-01T16:40Z 39.4K followers, [---] engagements
"Cyber security Kill Chain: Active Reconnaissance Overview Methodology and Tools Reconnaissance is the first in the cyber security kill-chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the"
YouTube Link 2020-11-08T17:00Z 39.4K followers, 10.2K engagements
"Securing Your AWS Virtual Private Cloud AWS' "Shared Responsibility Model" states that customers are responsible for security in their cloud. In this video we'll cover how to design a secure VPC using a Next-Gen Firewall from the AWS Marketplace. VPC Basics: 0:52 Segmenting AWS Traffic : 2:07 VPC Network Flow: 2:26 NGFW Design in AWS: 3:23 East to West (Micro Segmentation): 4:53 High Availability: 5:50 Vendor HA: 6:33 aws vpc security group network access control next-gen ngext-gen firewall palo alto fortinet checkpoint cisco firewall f5 waf Next-gen firewall ngfw cybersecurity network"
YouTube Link 2019-06-24T20:25Z 39.4K followers, 12.1K engagements
"Securing Your VPN: Six Considerations With the majority of the work force now working from home VPN's have never been more important. The increase demand to work from home can put pressure on IT organization to come up with quick solutions for business continuity. However a poorly design VPN rollout can be catastrophic for your network. In this video we'll cover how to secure your VPN network rollouts and best practices. [--]. Known Vulnerabilities in Major VPN Vendors 0:55 [--]. Selecting Secure VPN Protocols 2:00 [--]. Multi Factor Authentication 3:09 [--]. Using Certificates 3:56 [--]. Segmentation 4:39"
YouTube Link 2020-04-06T20:01Z 39.4K followers, [----] engagements
"ATT&CK Matrix: The Enemies Playbook ATT&CK Matrix by MITRE is the world's most comprehensive research on malware and threats to date. Based on millions of real-world events the Matrix provides the "playbook" used by the world's most notorious hacking groups and malware. In this video we'll cover everything you need to start using ATT&CK today. Expanding on the Cybersecurity Kill Chain: 1:02 ATT&CK Matrix Intro: 2:02 Understanding TTP: 3:42 Getting Started with ATT&CK: 4:26 The ATT&CK Navigator demo: 5:25 The Pyramid of Pain: 8:15 Defending against behaviors vs tools: 9:23 Implementing the"
YouTube Link 2019-09-24T11:20Z 39.4K followers, 57.6K engagements
"What is Security Service Edge (SSE) SASE vs SSE vs VPN In this video we compare traditional VPN vs SASE and SSE (Security Service Edge). SSE and SASE are categories of technology that provide Cloud-delivered security services. Well review the components that make up SASE and SSE and look at how these two similar services compare. The Problem with VPNs 0:01 Secure Access Service Edge (SASE) Overview 1:28 SASE Components 2:10 SASE Integration 3:08 Security Service Edge (SSE) 4:40 SASE vs SSE 4:53 Choosing Between SASE and SSE 5:31 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com"
YouTube Link 2022-05-26T17:11Z 39.4K followers, 92.8K engagements
"How to Become a Product Manager (PM) According to Glassdoor Product Management (PM) is one of the fastest growing and highest paying jobs in technology. As a PM you're responsible for the vision strategy and implementation of a given product. For people coming from a technical background the PM role is a great career aspiration. In this #short [--] second video we discuss the role of a Product Manager and the four knowledge domains every PM should have. career cybersecurity cybersecurity careers digital product i.t. jobs pm product design product management product manager product manager"
YouTube Link 2022-03-15T13:38Z 39.4K followers, [----] engagements
"Zero Trust Architecture Tenants Explained in [--] Seconds This video explains the core tenets of a Zero Trust Architecture according to NIST 800-207. These seven principals outline the must have requirements in any Zero Trust Architecture. Check out the full video on Zero Trust Architecture for more details: Part1: https://youtu.be/5Kq64vOgE10si=KPNVnpzetkWA8IRM Part 2: https://youtu.be/8S-Q70tPJPMsi=fb65h7rjZ7Vo7_M7 cybersecurity identity management network security nist [---] [---] nist 800-207 nist compliance risk management what is zero trust zero trust zero trust architecture zero trust"
YouTube Link 2025-09-12T16:16Z 39.4K followers, [----] engagements
"The Iran Cyber Threat: What You Need To Know All US organizations should be on high alert after DHS released a warning (AA20-006A) that an Iran cyber threat is possible. According to CISA these attacks are likely to come from either Iranian intelligence contractors or pro-Iran Hacktivist groups. APT groups [--] [--] and [--] are powerful adversaries with Iran ties. In this video we'll take a deeper look at who these groups are and what attacks they're known for using the ATT&CK Matrix. Cyberattack Warning 0:23 APT Groups Involved 1:05 APT Targets and Industries 1:39 CISA Recommended Actions 2:10"
YouTube Link 2020-01-14T13:17Z 39.4K followers, [----] engagements
"5 Terrifying Cyber-Security Trends for [----] Sextortion Murder For Hire Webcam hacking and more. [----] was a scary year in cyber security. Here are Five Terrifying Cyber Security Trends for [----] [--]. Sextortion Emails [--]. Webcam Hacking [--]. Hitman for Hire [--]. Attacks by Our Own Devices [--]. Supply Chain Poisoning cybersecurity security network security infosec malware supply chain webcam hacking hacker shodan hack information security sandboxing atp advanced threat advanced malware virus zero day [--] day fileless malware fileless av-comparatives av-test vb100 intrusion prevention incident response"
YouTube Link 2019-01-13T02:06Z 39.4K followers, 27.1K engagements
"Zero Trust Architecture Tenants Explained in [--] Seconds This video explains the core tenets of a Zero Trust Architecture according to NIST 800-207. These seven principals outline the must have requirements in any Zero Trust Architecture. Check out the full video on Zero Trust Architecture for more details: Part1: https://youtu.be/5Kq64vOgE10si=KPNVnpzetkWA8IRM Part 2: https://youtu.be/8S-Q70tPJPMsi=fb65h7rjZ7Vo7_M7 cybersecurity identity management network security nist [---] [---] nist 800-207 nist compliance risk management what is zero trust zero trust zero trust architecture zero trust"
YouTube Link 2025-09-12T16:16Z 39.4K followers, [----] engagements
"The Cybersecurity Breaches You Missed (August) A single phone call was all it took to kick off one of the biggest CRM data breaches of the year. Using vishing (voice phishing) attackers were able to gain access to sensitive customer information through widely used CRM platforms. In this video we break down how this campaign unfolded why voice-based phishing is becoming a powerful tool for cybercriminals and what every security leader needs to know about protecting their organization. 🔒 Subscribe to The CISO Perspective for insights on real-world cyberattacks AI-driven threats and practical"
YouTube Link 2025-09-01T15:55Z 39.4K followers, [----] engagements
"Zero Trust in the Real World: The Technologies Behind the Theory 🔐 How do you turn Zero Trust theory into real-world implementation In this video we break down the real technologies and solutions that power modern Zero Trust Architecture (ZTA). Youll learn how different toolsranging from identity providers and firewalls to endpoint protection and segmentation gatewayscome together to meet the core tenets of NIST SP 800-207. Well explore how each technology contributes unique strengths to the framework and how they work in tandem to build a practical enforceable Zero Trust environment. 📺"
YouTube Link 2025-08-14T15:07Z 39.4K followers, [----] engagements
"The Cybersecurity Breaches You Missed (July) Get the latest cybersecurity news in under [--] seconds From [--] million McDonald's personal records exposed to Microsoft SharePoint zero-days exploited by state hackers and a [--] billion password database leaking onlineheres what happened in July. Learn how the attacks happened who was affected and how to protect your accounts now. 16B leak BlackByte CVE-2025-49704 CVE-2025-49706 CVE-2025-53770 IDOR Ingram Micro McHire AI Olivia chatbot RDP exploit SafePay Team SafePay ransomware ToolShell ToolShell exploit cloud security credential leak cyber attack"
YouTube Link 2025-07-28T15:45Z 39.4K followers, [---] engagements
"What Is Zero Trust Architecture (ZTA) NIST 800-207 Explained In this video we break down Zero Trust Architecture (ZTA) using the official guidance from NIST 800-207 the gold standard for Zero Trust frameworks Youll learn how Zero Trust works why its essential in modern cybersecurity and how to design and deploy it effectively across your enterprise network. Whether youre an IT leader security engineer or CISO this video is packed with practical insights to help you confidently adopt a Zero Trust model. Timestamps: 00:40 Zero Trust Basics 01:15 Defining a Zero Trust Architecture 01:36 The Zero"
YouTube Link 2025-07-19T12:50Z 39.4K followers, 14.2K engagements
"Sovereign SASE Architecture Overview #cybersecurity #sase In this clip we dive into the Sovereign SASE Architecture breaking down exactly how the control plane data plane and user layer combine to deliver secure and compliant connectivity entirely within your organizations boundaries. 🎬 Watch the full video here: https://www.youtube.com/watchv=NUcfRnIE2mc 🔔 Subscribe now for more cybersecurity insights and tutorials from The CISO Perspective. Sovereign SASE SASE Architecture Data Sovereignty Cybersecurity Secure Access Service Edge Network Security Compliance Cloud Security Security"
YouTube Link 2025-07-06T16:19Z 39.4K followers, [----] engagements
"What is Sovereign SASE Public vs Private SASE Explained Sovereign SASE is a new approach for deploying Secure Access Service Edge (SASE) entirely within an organizations private infrastructure. Unlike traditional SASE solutions that route data through vendor-managed clouds Sovereign SASE keeps security inspection user traffic and logging fully within your organizations boundaries. In this video we break down the core pillars of Sovereign SASE and explain why its becoming essential for regulated industries governments and enterprises with strict compliance needs. 👇 More Info 👇 Animations by"
YouTube Link 2025-06-25T12:09Z 39.4K followers, [----] engagements
"The Cybersecurity Breaches You Missed (December) Cybersecurity minute recaps all the major cybersecurity events and news for the month of December. Spoiler alert: ALOT of China linked activity - Chinese U.S. Treasury Hack - Salt Typhoon: U.S. Telecom Breach - SMS Based 2FA Bypass - TP-Link Routers Ban #cybersecuritytrends #cybersecurity #cybersecurity #news #APTGroups #ChinaHack #CyberAttack2024 #CyberDefense #CyberSecurityRecap #CyberThreats #CybersecurityTrends #CybersecurityUpdate #HackingNews #InfoSec #NationStateAttacks #SaltTyphoon #TelecomBreach #ThreatIntelligence #USTreasuryHack"
YouTube Link 2025-01-01T16:40Z 39.4K followers, [---] engagements
"How Hackers ACTUALLY Break In (Cybersecurity Kill Chain Explained) The Cybersecurity Kill Chain is a model for describing the steps an attacker must complete to carry a successful attack. Check out the full video here: https://youtu.be/II91fiUax2g In this video we'll look at defensive tools we can apply at every phase of the kill chain as part of a multi layered security strategy. Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa Cisco Pan juniper advanced threat protection fortigate incident response"
YouTube Link 2024-11-22T15:15Z 39.4K followers, [----] engagements
"The Cybersecurity Trends You NEED to Know With over [-----] security incidents analyzed the [----] Verizon Data Breach Investigations Report (DBIR) is the most comprehensive and cited report in the cybersecurity incident. In this video we dive deep into this 100-page report exploring the most significant trends and insights from over [-----] breaches over the last year. We'll wrap up by looking at actionable insights and defense measurements based on the DBIR's key metrics. 💡 In This Video: 0:48 - High-Level Trends: A closer look at how attackers are getting into networks. 2:00 - Method Breakdown:"
YouTube Link 2024-11-14T14:10Z 39.4K followers, [----] engagements
"The AI Art Revolution is Here (and its worse than you think) In this video we dive into the world of how A.I generated fake images are created using the popular Stable Diffusion LLM. Unlike Midjourney and Open AI's DALL-E Stable Diffusion's opensource nature has an extensive community and tools for custom training. But this hub for innovation has also sparked a wave of hyper-realistic A.I. fakes. In This video we'll not just cover how these images are created but more importantly how to detect A.I. generated fake images. Stable Diffusion Overview 0:25 Forms of A.I. Generated Fake Images 1:14"
YouTube Link 2024-02-06T15:00Z 39.4K followers, [----] engagements
"The Disturbing Reality of Deepfake Technology FULL VIDEO GUIDE COMING SOON. These are Deepfake samples for educational purposes only. The goal is to demonstrate the current capabilities and techniques used for deepfakes. Full video coming to The CISO Perspective YouTube channel -Sample #1 uses ElevenLabs to voice clone and Wave2Lips to lip sync the audio. -Sample #2 uses Roop Unleashes for the face swap -Sample #3 uses Tortoise to voice clone and Wave2Lips to lip sync the audio. deepfakes technology cybersecurity awareness education threatdetection securityawareness maliciousmanipulation"
YouTube Link 2023-11-26T13:00Z 39.4K followers, [----] engagements
"AI-Powered Cyber Attacks: The Next Frontier in Offensive Security ChatGPT may represent one of the biggest disruptions in modern history with it's powerful A.I based chatbot. But within weeks of ChatGPT's release security researchers discovered several cases of people using ChatGPT for everything from malware development to exploit coding. In this video take a look at the five ways attackers are utilizing ChatGPT for wrong doing. 0:14 Intro to ChatGPT / Natural Language Processing (NLP) & GPT 1:28 Using ChatGPT for Vulnerability Discovery 1:56 Vulnerability Prompts to Utilize 3:10 Writing"
YouTube Link 2023-02-15T20:42Z 39.4K followers, 60.6K engagements
"What is Security Service Edge (SSE) SASE vs SSE vs VPN In this video we compare traditional VPN vs SASE and SSE (Security Service Edge). SSE and SASE are categories of technology that provide Cloud-delivered security services. Well review the components that make up SASE and SSE and look at how these two similar services compare. The Problem with VPNs 0:01 Secure Access Service Edge (SASE) Overview 1:28 SASE Components 2:10 SASE Integration 3:08 Security Service Edge (SSE) 4:40 SASE vs SSE 4:53 Choosing Between SASE and SSE 5:31 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com"
YouTube Link 2022-05-26T17:11Z 39.4K followers, 92.8K engagements
"What is Zero Trust Network Access (ZTNA) The Zero Trust Model Framework and Technologies Explained Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPNs as a more secure and scalable way to provide remote connectivity. Unlike VPNs Zero Trust provides a scalable way to provide secure connectivity without the need of centralized equipment. In this video we take a deep dive on Zero Trust Network Access (ZTNA) and walk through the models principles and architectures its based on. Well review what exactly Zero Trust is as well as the foundational concepts that are at the"
YouTube Link 2022-05-02T17:22Z 39.4K followers, 178.4K engagements
"How to Become a Product Manager (PM) According to Glassdoor Product Management (PM) is one of the fastest growing and highest paying jobs in technology. As a PM you're responsible for the vision strategy and implementation of a given product. For people coming from a technical background the PM role is a great career aspiration. In this #short [--] second video we discuss the role of a Product Manager and the four knowledge domains every PM should have. career cybersecurity cybersecurity careers digital product i.t. jobs pm product design product management product manager product manager"
YouTube Link 2022-03-15T13:38Z 39.4K followers, [----] engagements
"How Hackers Exploit Software Vulnerabilities Exploits represent any piece of code data or sequence of commands that targets a vulnerable application for the purpose of gaining unauthorized access. Log4j is one of the most popular recent exploits that is widely considered to be the most dangerous exploit of our time. In this video we will break down the anatomy of an exploit and how each part of the malicious code comes together to target a vulnerable application. Well discuss the three distinct parts most exploits have in common as well as a deep dive into Log4j. Exploit Anatomy 0:51 Lof4j"
YouTube Link 2022-02-04T13:19Z 39.4K followers, 18.1K engagements
"Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA Bypassing multi-factor authentication was once considered more of a proof of concept then an actual threat. In this video we will review four common techniques an attacker will utilize to hack multi-factor and two-factor authentication. Well review Evilgenix2 which is a popular framework for stealing authentication cookies and other methods that an attacker can utilize to bypass the authentication process. 1:06 Evilgenix2 Framework 2:51 Evilgenix Defense and Protection 3:45 Pass the Cookie 5:10 Pass the Cookie Defense"
YouTube Link 2021-12-27T18:39Z 39.4K followers, 81.2K engagements
"AIOps and MLOps: The Future of IT Explained AIOps (also known as MLOps) is a combination of big data with machine learning to enhance IT operations. Using artificial intelligence the system can find and predict network issues in real time. With Gartner predicting an increase of 700% over the next three years this technology is only just beginning. In this video we'll review what AIOps is uses cases and the five Gartner components that make up the system. 1:02 - Current I.T. Operations Triaging 1:53 - Intro to AIOps (Artificial Intelligence for IT Operations) 2:15 - Machine Learning for"
YouTube Link 2021-09-27T14:50Z 39.4K followers, 22.2K engagements
"T-Mobile Data Breach: Timeline Analysis and Lessons Learned The most recent T-Mobile hack is one of the largest data breaches in US history. [--] million current and former T-Mobile customer records containing social security numbers driver's licenses addresses and phone numbers have made their way to dark web forums. In this video we'll review the timeline of events as well as what T-Mobile could have done differently to stop this attack from ever occurring. 0:57 - T-Mobile data breach first reported 1:25 - How the attacker hacked T-Mobile 2:08 - T-Mobile confirms [--] million users impacted"
YouTube Link 2021-09-05T20:14Z 39.4K followers, [----] engagements
"What is XDR vs EDR vs MDR Breaking down Extended Detection and Response Extended Detection and Response (XDR) is a cybersecurity tool that integrates with multiple products to detect and respond to threats. While EDR (Endpoint Detection and Response) focuses on the endpoint XDR uses A.I. to ingests information from multiple sources and detect patterns across different device types. In this video we'll discuss what XDR is and how it compares to EDR and MDR (Managed Detection and Response). Overview 0:55 - What is Endpoint Detection and Response (EDR) 3:11 - Traditional Endpoint vs EDR 3:46 -"
YouTube Link 2021-08-23T17:34Z 39.4K followers, 241.2K engagements
"What is Machine Learning A.I. Models Algorithm and Learning Explained In this video we go over what Machine Learning is and how it works within the Artificial Intelligence framework. Well review the Machine Learning model learning methods and the algorithms used for different use cases. A.I. vs Machine Learning vs Deep Networks 0:42 Machine Learning Overview 1:18 Machine Learning Model 1:45 Supervised Learning 2:15 Unsupervised Learning 2:40 Semi-Supervised Learning 3:09 Reinforcement Learning 3:27 Machine Learning Formula 4:05 Classification Algorithm 4:40 Clustering Algorithm 5:40"
YouTube Link 2020-12-10T02:04Z 39.4K followers, 27.1K engagements
"Cyber security Kill Chain: Active Reconnaissance Overview Methodology and Tools Reconnaissance is the first in the cyber security kill-chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the"
YouTube Link 2020-11-08T17:00Z 39.4K followers, 10.2K engagements
"What is Open Source Intelligence (OSINT) The OSINT Tools Techniques and Framework Explained Reconnaissance is the first step of the cybersecurity kill chain and the foundation to a successful attack. Open-source Intelligence (OSINT) is the practice of collecting publicly available information about a target. In this video we'll cover what OSINT is the framework and methodology for an OSINT investigation and some of the top tools in OSINT data investigation. What is OSINT (Open-source Intelligence) 1:09 The OSINT Methodology and Process 1:34 OSINT Tools 2:23 Maltego Overview 2:30 theHarvester"
YouTube Link 2020-10-26T18:45Z 39.4K followers, 36.5K engagements
"What is Secure Access Service Edge (SASE) Secure Access Service Edge (SASE) is a term coined by Gartner that combines some of today's most popular technologies into a single solution. In this video we'll cover what SASE Core Recommended and Optional levels include and how the various technologies work together. SASE Core Recommended and Optional 0:47 Why SASE 1:32 Zero Trust Network Access 2:33 SASE Endpoint (Off-net vs on-net) 3:20 SD-WAN with SASE 4:25 SASE Policies 5:53 Cloud Access Security Broker (CASB) 6:22 Putting it all together 7:10 👇 More Info 👇 Animations by TCP Media:"
YouTube Link 2020-08-14T00:18Z 39.4K followers, 168.8K engagements
"How to Use Canary Tokens for Threat Hunting Canary tokens are a free and simple way to detect breaches in your network. In this video we'll cover how Canary Tokens can turn your entire network into a giant honeypot and demo how to set these up on your network. What are Canary Tokens 0:28 How Canary Tokens Work 1:02 Honeypots vs Canary Tokens 1:48 Demo: Setting Up Canary Tokens 2:10 Canary Token Placement and Use Cases 4:43 Other Canary Token Use Cases 6:19 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove service. 🎯 Need content"
YouTube Link 2020-06-30T14:39Z 39.4K followers, 29.6K engagements
"NextGen Firewall & IPS Evasion: [--] Defensive Techniques Firewall & IPS evasion is much easier then you think. In this video we take a look at a popular OpenSource tool called 'HTTP Evader' to see how we can bypass a nextgen firewall to deliver malware. We'll then take a look a [--] defensive measures to protect against over [---] of the most widely used evasion techniques in the wild. Evader Intro: 0:42 First Firewall Evasion Test: 1:48 Protocol Analyzer: 2:19 Protocol Enforcement: 3:18 Payload Signatures: 4:22 Second Firewall Evasion Test: 5:48 The Need For SSL Inspection: 6:13 How Deep Packet"
YouTube Link 2020-05-23T15:35Z 39.4K followers, [----] engagements
"Securing Your VPN: Six Considerations With the majority of the work force now working from home VPN's have never been more important. The increase demand to work from home can put pressure on IT organization to come up with quick solutions for business continuity. However a poorly design VPN rollout can be catastrophic for your network. In this video we'll cover how to secure your VPN network rollouts and best practices. [--]. Known Vulnerabilities in Major VPN Vendors 0:55 [--]. Selecting Secure VPN Protocols 2:00 [--]. Multi Factor Authentication 3:09 [--]. Using Certificates 3:56 [--]. Segmentation 4:39"
YouTube Link 2020-04-06T20:01Z 39.4K followers, [----] engagements
"The Iran Cyber Threat: What You Need To Know All US organizations should be on high alert after DHS released a warning (AA20-006A) that an Iran cyber threat is possible. According to CISA these attacks are likely to come from either Iranian intelligence contractors or pro-Iran Hacktivist groups. APT groups [--] [--] and [--] are powerful adversaries with Iran ties. In this video we'll take a deeper look at who these groups are and what attacks they're known for using the ATT&CK Matrix. Cyberattack Warning 0:23 APT Groups Involved 1:05 APT Targets and Industries 1:39 CISA Recommended Actions 2:10"
YouTube Link 2020-01-14T13:17Z 39.4K followers, [----] engagements
"VNF: Five Considerations in Virtualizing Your Perimeter VNF (Virtual Networking Function) has been touted as the future of the network perimeter. In this video we'll discuss what VNF is along with [--] things to consider before moving to a virtual edge. Having worked with some of the largest Telco's and MSPs in the world to build out virtual networking services. Here are [--] lessons learned along the way: [--]. Performance 0:54 [--]. ASICs 2:14 [--]. Pre-deployment/Staging 3:30 [--]. Troubleshooting 4:29 [--]. Policy Changes 5:28 VNF Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing"
YouTube Link 2019-12-18T14:16Z 39.4K followers, [----] engagements
"Securing SD-WAN: [--] Considerations Perhaps nothing has been as disruptive to the traditional WAN then SD-WAN has been over the last couple of years. Gartner predicts 93% of organizations will be doing SD-WAN by [----]. In this video we'll review some SD-WAN use cases and review how to secure your SD-WAN deployments. SD-WAN Security Landscape 0:36 [--]. Opt for on-premise security 2:04 [--]. Application Routing Best Practices 3:55 [--]. Network Leakage 5:38 [--]. Transport Security 7:36 [--]. CASB (Cloud Access Security Broker) 9:31 sd-wan software defined wan software defined networking ztp secure branch"
YouTube Link 2019-11-20T18:11Z 39.4K followers, 13.4K engagements
"ATT&CK Matrix: The Enemies Playbook ATT&CK Matrix by MITRE is the world's most comprehensive research on malware and threats to date. Based on millions of real-world events the Matrix provides the "playbook" used by the world's most notorious hacking groups and malware. In this video we'll cover everything you need to start using ATT&CK today. Expanding on the Cybersecurity Kill Chain: 1:02 ATT&CK Matrix Intro: 2:02 Understanding TTP: 3:42 Getting Started with ATT&CK: 4:26 The ATT&CK Navigator demo: 5:25 The Pyramid of Pain: 8:15 Defending against behaviors vs tools: 9:23 Implementing the"
YouTube Link 2019-09-24T11:20Z 39.4K followers, 57.6K engagements
"Securing Your AWS Virtual Private Cloud AWS' "Shared Responsibility Model" states that customers are responsible for security in their cloud. In this video we'll cover how to design a secure VPC using a Next-Gen Firewall from the AWS Marketplace. VPC Basics: 0:52 Segmenting AWS Traffic : 2:07 VPC Network Flow: 2:26 NGFW Design in AWS: 3:23 East to West (Micro Segmentation): 4:53 High Availability: 5:50 Vendor HA: 6:33 aws vpc security group network access control next-gen ngext-gen firewall palo alto fortinet checkpoint cisco firewall f5 waf Next-gen firewall ngfw cybersecurity network"
YouTube Link 2019-06-24T20:25Z 39.4K followers, 12.1K engagements
"Accomplishing Zero Trust Security Using SDP Zero Trust security is the hottest topic of conversations among CISOs and security people. But for a long time the question has been "How do I get there" The Software Defined Perimeter(SDP) is one of the most popular implementations of the Zero Trust security model. In this video we review how to accomplish Zero Trust security using SDP zero trust security models cybersecurity infosec software defined software defined perimeter sdp beyondcorp kill chain information security Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall"
YouTube Link 2019-03-15T16:21Z 39.4K followers, 42K engagements
"Breaking The Kill-Chain: A Defensive Approach The Cybersecurity Kill-Chain is a model for describing the steps an attacker must complete to carry a successful attack. In this video we'll look at defensive tools we can apply at every phase of the kill-chain as part of a multi layered security strategy. 0:00 Introduction 0:41 RECONNAISSANCE 2:23 WEAPONIZATION 3:48 DELIVERY 5:49 EXPLOITATION 7:24 INSTALLATION 8:55 COMMAND AND CONTROL 10:54 ACTIONS ON OBJECTIVE 12:21 THE CISO PERSPECTIVE 👇 More Info 👇 Animations by TCP Media: https://tcp-media.com Viral content. Tech-first thinking. White-glove"
YouTube Link 2019-02-05T19:49Z 39.4K followers, 198.8K engagements
"5 Terrifying Cyber-Security Trends for [----] Sextortion Murder For Hire Webcam hacking and more. [----] was a scary year in cyber security. Here are Five Terrifying Cyber Security Trends for [----] [--]. Sextortion Emails [--]. Webcam Hacking [--]. Hitman for Hire [--]. Attacks by Our Own Devices [--]. Supply Chain Poisoning cybersecurity security network security infosec malware supply chain webcam hacking hacker shodan hack information security sandboxing atp advanced threat advanced malware virus zero day [--] day fileless malware fileless av-comparatives av-test vb100 intrusion prevention incident response"
YouTube Link 2019-01-13T02:06Z 39.4K followers, 27.1K engagements
"5 Considerations: Sizing Your Next-Gen Firewall (NGFW) An undersized firewall can be catastrophic to your network. The CISO Perspective brings you the [--] most important things to consider when sizing your Next-Gen Firewall. [--]. CPS [--]. Total Throughput [--]. SSL [--]. NGFW Features [--]. Max Session (Concurrent Sessions) Next-gen firewall ngfw Palo Alto Fortinet checkpoint firepower firewall sizing cybersecurity firewall sizing netsec network security versa asa Cisco Pan juniper advanced threat protection fortigate incident response Zero day [--] day malware virus nss intrusion prevention ciso information"
YouTube Link 2018-12-24T01:43Z 39.4K followers, 57.3K engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/youtube::thecisoperspective