12 тысяч подписчиков
867 видео
How to Achieve Better Results by Optimizing Cyber Budgets
DEPHAZE: Pre-launch for Partners
MENA 2024: APT-Groups and the Latest Cases
The Role of Artificial Intelligence in Cybersecurity
Building Industry-Specific Security Operations Centers (SOCs)
Exposing and Fixing Physical Access Vulnerabilities
The Practical Guide to Answering the CEO’s Question: 'Are We Secure?'
Starting a Career in Cybersecurity: The Path to Becoming a White-Hat Hacker
#GITEX2024
Positive Technologies expands partnerships in the Middle East and South Asia
Positive Technologies Goes Global at
#Cybersecurity
Хакнуть сайт на Adobe Experience Manager
The five tricky issues of your serverless solution
JavaScript in PDF
Testing and verifying Linux kernel
Avoiding burnout: secrets to building a cybersecurity community
Swordfish Security's secure development framework
SIEM correlation rules and expert knowledge
Career path of a CISO: from dawn to dusk
Discovering C&C in Malicious PDF with obfuscation, encoding, and other techniques
Knowledge management with Python: tools, approaches, examples
COM/DCOM forgotten knowledge
Code query language... is not needed?
A RCE vulnerability in Managed ClickHouse through the eyes of a SOC specialist at Yandex Cloud
Analysis of the client JavaScript code for detecting HTTP endpoints
The future of the high-tech industry
Workshop. Using ERM&CK project to write response scripts
Improving fault tolerance of HTTP integrations without changing Python code
The industrial standard in management reporting
Benchmarking Static Application Security Testing tools: how good are they?