@PurpleSec - 84 本の動画
チャンネル登録者数 6450人
Welcome to the PurpleSec YouTube channel where you’ll find all things related to cyber security. If you like thought leadership videos, how-to’s, and helpful...
Key Challenges In Achieving IT Infrastructure Visibility Explained
How Cyber Criminals Are Shifting Their Attacks In 2025
How XDR Improves Infrastructure Visibility
How Defiance XDR™ Secures Small Businesses
How To Evaluate XDR, MDR, And EDR Solutions
Use Cases For XDR, MDR, And EDR
The Main Differences Between XDR, MDR, And EDR
Types Of XDR Solutions (Expert Explains)
Managed Vs. Unmanaged XDR: What Should I Choose?
XDR Implementation Strategies & Best Practices (2025)
The Differences Between XDR And Other Security Solutions
How Does XDR Work?
Do Small Businesses Need XDR?
Why XDR Is A Requirement For Cybersecurity In 2025
Understanding Extended Detection & Response (Expert Explains)
Cybersecurity Tip #10: Create Overarching Security Policies
Cybersecurity Tip #9: Set Up Guest WiFi Networks
Cybersecurity Tip #8: Conduct A Security Risk Assessment
Cybersecurity Tip #7: Enforce Multi-Factor Authentication
Cybersecurity Tip #6: Use A Password Manager
Cybersecurity Tip #5: Have A Data Backup Strategy
Cybersecurity Tip #4: Use Anti-Virus And Anti-Malware Software
Cybersecurity Tip #3: Keep Assets Up-To-Date And Patched
Cybersecurity Tip #2: Get Buy-In From Stakeholders
Cybersecurity Tip #1: Understand Business Goals & Translate Cyber Risks
CISO Explains What Cybersecurity Metrics & KPIs You NEED To Be Tracking
XDR Vs. EDR Vs. MDR: Evaluating The Best Choice
What Is Extended Detection And Response (XDR)? (Experts Explain)
Is AI The Future Of Penetration Testing?
10 Cybersecurity Tips For Small Businesses
Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec
Why You Should Learn AI In Cybersecurity
How LLMs Are Being Exploited
The Value Of A vCISO For Small Business
Vulnerability Management Metrics: Top 10 KPIs To Measure Success
Vulnerability Management SOP: Expert Reveals Top Tips
Top 10 Vulnerability Management Trends For 2025
Techniques To Improve Vulnerability Visibility & Detection
Risk-Based Vulnerability Management
How To Build A Vulnerability Management Program | #PurpleSec
How To Automate Your Vulnerability Remediation Process | PurpleSec
Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec
What Is Vulnerability Management? (Explained By Experts)
Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec
PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec
Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec
Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec
Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec
Why Is Social Engineering Effective? (Expert Explains)
Saudi Aramco $50 Million Data Breach Explained | Breach Report
Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report
Are Cyber Criminals Coming After Your Video Games? | PurpleSec
JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec
Is Your Employer Spying On You To Protect Themselves? | PurpleSec
Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec
Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec
Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report
Accellion Breach Continues Compromising Top University Security | Breach Report
Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report
Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report
Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report
What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec
New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report
Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report
The 3 Types Of Security Controls (Expert Explains) | PurpleSec
Accellion Data Breach: What We Know So Far | Breach Report
3 More Vulnerabilities Found In SolarWinds Attack | Breach Report
10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec
North Korean APT ZINC Attacks Threat Researchers | Breach Report
SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report
What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report
Preventing The SolarWinds Supply Chain Attack Using Zero Trust? | Weekly Ingest
Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest
Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report
cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest
Advanced Persistent Threat (APT) Groups | Weekly Ingest
Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest
7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec
What Are The Types Of Penetration Testing? | PurpleSec
Common Types Of Network Security Vulnerabilities | PurpleSec
Red Team VS Blue Team: What’s The Difference? | PurpleSec
Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec
Our Cyber Security Experts | Purplesec
How Often Should You Perform A Network Vulnerability Scan? | PurpleSec