all InfoSec news
The Second Rule of Hacking: There Are No Rules
March 14, 2024, 1:09 p.m. | SANS Offensive Operations
SANS Offensive Operations www.youtube.com
Businesses and organizations have been playing a game of cat and mouse with hackers for close to 50 years. The score depends on how you decide to keep it. The corporate approach has traditionally focused on tools and compliance to detect and block attacks, but have you ever wondered how hackers get past things like antivirus, firewalls, and intrusion detection systems? This talk is about diving into the tools and techniques hackers use to regularly evade detection …
attacks block businesses cat cat and mouse compliance corporate detect game hackers hacking mouse organizations rules score the score tools
More from www.youtube.com / SANS Offensive Operations
The Second Rule of Hacking: There Are No Rules
1 month, 1 week ago |
www.youtube.com
OT Pen-testing: How Not to Sink an Oil Rig
1 month, 1 week ago |
www.youtube.com
A Compendium of Exploits and Bypasses for eBPF-based Cloud Security
4 months, 1 week ago |
www.youtube.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior InfoSec Manager - Risk and Compliance
@ Federal Reserve System | Remote - Virginia
Security Analyst
@ Fortra | Mexico
Incident Responder
@ Babcock | Chester, GB, CH1 6ER
Vulnerability, Access & Inclusion Lead
@ Monzo | Cardiff, London or Remote (UK)
Information Security Analyst
@ Unissant | MD, USA