Intelligent threat intelligence for actionable actions. Or something.
Watch more videos on my YouTube channel.
Intelligent threat intelligence for actionable actions. Or something.
Watch more videos on my YouTube channel.
Microsoft Docs.com ends up leaking sensitive information: social security numbers, court documents, passwords in spreadsheets. One suggestion? File-level encryption.
Watch more videos on my YouTube channel.
Criminals are using Outlook rules to create email box proxies, effectively gaining persistence and stealth. Here’s how.
Watch more videos on my YouTube channel.
Hard to patch software, hard to use patch management, and the use of Freecell as a detective control.
Watch more videos on my YouTube channel.
At the same time frame, password managers and anti-malware tools get exploited. New vulnerabilities leads to the old question: is it worth running security tools?
Watch more videos on my YouTube channel.
Performing Web application security scans on REST APIs? It takes Swagger.
Watch more videos on my YouTube channel.
Suppose I have a multi-tenant cloud application. Suppose you are one of my users. Suppose I need to login as you for support. What are some ways I can setup security so you know I’m me?
Watch more videos on my YouTube channel.
A quick run down of security options for SOAP and REST Web services and APIs.
Watch more videos on my YouTube channel.
When it comes to IT security, what tasks are core versus what are commodity? It depends.
Watch more videos on my YouTube channel.
How we steal credentials to Windows, Facebook, and LinkedIn using Beef, rules, and Pretty Theft.
Watch more videos on my YouTube channel.