all InfoSec news
The Second Rule of Hacking: There Are No Rules
March 14, 2024, 1:09 p.m. | SANS Offensive Operations
SANS Offensive Operations www.youtube.com
Businesses and organizations have been playing a game of cat and mouse with hackers for close to 50 years. The score depends on how you decide to keep it. The corporate approach has traditionally focused on tools and compliance to detect and block attacks, but have you ever wondered how hackers get past things like antivirus, firewalls, and intrusion detection systems? This talk is about diving into the tools and techniques hackers use to regularly evade detection …
attacks block businesses cat cat and mouse compliance corporate detect game hackers hacking mouse organizations rules score the score tools
More from www.youtube.com / SANS Offensive Operations
The Second Rule of Hacking: There Are No Rules
2 months, 2 weeks ago |
www.youtube.com
OT Pen-testing: How Not to Sink an Oil Rig
2 months, 2 weeks ago |
www.youtube.com
A Compendium of Exploits and Bypasses for eBPF-based Cloud Security
5 months, 2 weeks ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)