PurpleSec

@PurpleSec - 84 本の動画

チャンネル登録者数 6450人

Welcome to the PurpleSec YouTube channel where you’ll find all things related to cyber security. If you like thought leadership videos, how-to’s, and helpful...

最近の動画

Key Challenges In Achieving IT Infrastructure Visibility Explained 5:08

Key Challenges In Achieving IT Infrastructure Visibility Explained

How Cyber Criminals Are Shifting Their Attacks In 2025 1:40

How Cyber Criminals Are Shifting Their Attacks In 2025

How XDR Improves Infrastructure Visibility 20:50

How XDR Improves Infrastructure Visibility

How Defiance XDR™ Secures Small Businesses 2:00

How Defiance XDR™ Secures Small Businesses

How To Evaluate XDR, MDR, And EDR Solutions 3:18

How To Evaluate XDR, MDR, And EDR Solutions

Use Cases For XDR, MDR, And EDR 1:47

Use Cases For XDR, MDR, And EDR

The Main Differences Between XDR, MDR, And EDR 1:28

The Main Differences Between XDR, MDR, And EDR

Types Of XDR Solutions (Expert Explains) 0:45

Types Of XDR Solutions (Expert Explains)

Managed Vs. Unmanaged XDR: What Should I Choose? 1:12

Managed Vs. Unmanaged XDR: What Should I Choose?

XDR Implementation Strategies & Best Practices (2025) 2:44

XDR Implementation Strategies & Best Practices (2025)

The Differences Between XDR And Other Security Solutions 1:43

The Differences Between XDR And Other Security Solutions

How Does XDR Work? 2:07

How Does XDR Work?

Do Small Businesses Need XDR?​ 1:54

Do Small Businesses Need XDR?​

Why XDR Is A Requirement For Cybersecurity In 2025 1:04

Why XDR Is A Requirement For Cybersecurity In 2025

Understanding Extended Detection & Response (Expert Explains) 0:35

Understanding Extended Detection & Response (Expert Explains)

Cybersecurity Tip #10: Create Overarching Security Policies 1:45

Cybersecurity Tip #10: Create Overarching Security Policies

Cybersecurity Tip #9: Set Up Guest WiFi Networks 1:13

Cybersecurity Tip #9: Set Up Guest WiFi Networks

Cybersecurity Tip #8: Conduct A Security Risk Assessment 4:18

Cybersecurity Tip #8: Conduct A Security Risk Assessment

Cybersecurity Tip #7: Enforce Multi-Factor Authentication 2:56

Cybersecurity Tip #7: Enforce Multi-Factor Authentication

Cybersecurity Tip #6: Use A Password Manager 2:37

Cybersecurity Tip #6: Use A Password Manager

Cybersecurity Tip #5: Have A Data Backup Strategy​ 1:33

Cybersecurity Tip #5: Have A Data Backup Strategy​

Cybersecurity Tip #4: Use Anti-Virus And Anti-Malware Software 1:18

Cybersecurity Tip #4: Use Anti-Virus And Anti-Malware Software

Cybersecurity Tip #3: Keep Assets Up-To-Date And Patched 2:29

Cybersecurity Tip #3: Keep Assets Up-To-Date And Patched

Cybersecurity Tip #2: Get Buy-In From Stakeholders 4:00

Cybersecurity Tip #2: Get Buy-In From Stakeholders

Cybersecurity Tip #1: Understand Business Goals & Translate Cyber Risks 1:03

Cybersecurity Tip #1: Understand Business Goals & Translate Cyber Risks

CISO Explains What Cybersecurity Metrics & KPIs You NEED To Be Tracking 30:36

CISO Explains What Cybersecurity Metrics & KPIs You NEED To Be Tracking

XDR Vs. EDR Vs. MDR: Evaluating The Best Choice 14:40

XDR Vs. EDR Vs. MDR: Evaluating The Best Choice

What Is Extended Detection And Response (XDR)? (Experts Explain) 18:07

What Is Extended Detection And Response (XDR)? (Experts Explain)

Is AI The Future Of Penetration Testing? 35:38

Is AI The Future Of Penetration Testing?

10 Cybersecurity Tips For Small Businesses 30:34

10 Cybersecurity Tips For Small Businesses

Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec 22:52

Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec

Why You Should Learn AI In Cybersecurity 36:34

Why You Should Learn AI In Cybersecurity

How LLMs Are Being Exploited 28:00

How LLMs Are Being Exploited

The Value Of A vCISO For Small Business 43:31

The Value Of A vCISO For Small Business

Vulnerability Management Metrics: Top 10 KPIs To Measure Success 46:02

Vulnerability Management Metrics: Top 10 KPIs To Measure Success

Vulnerability Management SOP: Expert Reveals Top Tips 39:05

Vulnerability Management SOP: Expert Reveals Top Tips

Top 10 Vulnerability Management Trends For 2025 1:00:52

Top 10 Vulnerability Management Trends For 2025

Techniques To Improve Vulnerability Visibility & Detection 42:29

Techniques To Improve Vulnerability Visibility & Detection

Risk-Based Vulnerability Management 28:42

Risk-Based Vulnerability Management

How To Build A Vulnerability Management Program | #PurpleSec 14:27

How To Build A Vulnerability Management Program | #PurpleSec

How To Automate Your Vulnerability Remediation Process | PurpleSec 19:29

How To Automate Your Vulnerability Remediation Process | PurpleSec

Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec 4:34

Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec

What Is Vulnerability Management? (Explained By Experts) 16:39

What Is Vulnerability Management? (Explained By Experts)

Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec 4:54

Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec

PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec 5:19

PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec

Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec 4:13

Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec

Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec 6:11

Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec

Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec 5:07

Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec

Why Is Social Engineering Effective? (Expert Explains) 39:50

Why Is Social Engineering Effective? (Expert Explains)

Saudi Aramco $50 Million Data Breach Explained | Breach Report 16:41

Saudi Aramco $50 Million Data Breach Explained | Breach Report

Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report 29:38

Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report

Are Cyber Criminals Coming After Your Video Games? | PurpleSec 14:04

Are Cyber Criminals Coming After Your Video Games? | PurpleSec

JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec 39:12

JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec

Is Your Employer Spying On You To Protect Themselves? | PurpleSec 31:30

Is Your Employer Spying On You To Protect Themselves? | PurpleSec

Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec 24:21

Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec

Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec 24:03

Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec

Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report 59:56

Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report

Accellion Breach Continues Compromising Top University Security | Breach Report 1:03:12

Accellion Breach Continues Compromising Top University Security | Breach Report

Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report 51:52

Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report

Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report 57:16

Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report

Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report 47:50

Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report

What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec 29:36

What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec

New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report 42:53

New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report

Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report 34:51

Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report

The 3 Types Of Security Controls (Expert Explains) | PurpleSec 20:19

The 3 Types Of Security Controls (Expert Explains) | PurpleSec

Accellion Data Breach: What We Know So Far | Breach Report 54:44

Accellion Data Breach: What We Know So Far | Breach Report

3 More Vulnerabilities Found In SolarWinds Attack | Breach Report 28:44

3 More Vulnerabilities Found In SolarWinds Attack | Breach Report

10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec 22:19

10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec

North Korean APT ZINC Attacks Threat Researchers | Breach Report 1:06:31

North Korean APT ZINC Attacks Threat Researchers | Breach Report

SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report 41:16

SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report

What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report 30:06

What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report

Preventing The SolarWinds Supply Chain Attack Using Zero Trust?  | Weekly Ingest 45:32

Preventing The SolarWinds Supply Chain Attack Using Zero Trust? | Weekly Ingest

Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest 20:08

Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest

Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report 21:58

Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report

cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest 27:54

cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest

Advanced Persistent Threat (APT) Groups | Weekly Ingest 56:48

Advanced Persistent Threat (APT) Groups | Weekly Ingest

Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest 41:41

Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest

7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec 18:04

7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec

What Are The Types Of Penetration Testing? | PurpleSec 17:14

What Are The Types Of Penetration Testing? | PurpleSec

Common Types Of Network Security Vulnerabilities | PurpleSec 21:24

Common Types Of Network Security Vulnerabilities | PurpleSec

Red Team VS Blue Team: What’s The Difference? | PurpleSec 12:16

Red Team VS Blue Team: What’s The Difference? | PurpleSec

Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec 15:46

Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec

Our Cyber Security Experts | Purplesec 2:06

Our Cyber Security Experts | Purplesec

How Often Should You Perform A Network Vulnerability Scan? | PurpleSec 5:19

How Often Should You Perform A Network Vulnerability Scan? | PurpleSec

Security Beyond The Checkbox

XDRがインフラストラクチャの可視性を向上させる方法 20:50

XDRがインフラストラクチャの可視性を向上させる方法

26 回視聴 - 2 日前

CISOがサイバーセキュリティの指標とKPIの追跡の必要性を解説 30:36

CISOがサイバーセキュリティの指標とKPIの追跡の必要性を解説

368 回視聴 - 1 か月前

XDR vs. EDR vs. MDR: 最適な選択肢を評価する 14:40

XDR vs. EDR vs. MDR: 最適な選択肢を評価する

633 回視聴 - 1 か月前

拡張検知・対応(XDR)とは?(専門家による解説) 18:07

拡張検知・対応(XDR)とは?(専門家による解説)

1314 回視聴 - 1 か月前

Is AI The Future Of Penetration Testing? 35:38

Is AI The Future Of Penetration Testing?

2410 回視聴 - 1 年前

10 Cybersecurity Tips For Small Businesses 30:34

10 Cybersecurity Tips For Small Businesses

3716 回視聴 - 1 年前

Why You Should Learn AI In Cybersecurity 36:34

Why You Should Learn AI In Cybersecurity

1万 回視聴 - 1 年前

How LLMs Are Being Exploited 28:00

How LLMs Are Being Exploited

939 回視聴 - 1 年前

The Value Of A vCISO For Small Business 43:31

The Value Of A vCISO For Small Business

2012 回視聴 - 1 年前

Vulnerability Management Metrics: Top 10 KPIs To Measure Success 46:02

Vulnerability Management Metrics: Top 10 KPIs To Measure Success

3758 回視聴 - 2 年前

Vulnerability Management SOP: Expert Reveals Top Tips 39:05

Vulnerability Management SOP: Expert Reveals Top Tips

1547 回視聴 - 2 年前

Top 10 Vulnerability Management Trends For 2025 1:00:52

Top 10 Vulnerability Management Trends For 2025

2399 回視聴 - 2 年前