Sitemap - 2024 - Packt SecPro
_secpro Premium #3: APIs and Elastic Stack
#175: Hunting the EMERALDWHALE
_secpro Premium #2: A new ransom, the same as the old ransom
#16: Network Automation - Insights, Architecure, and Observability
#15: Transitioning Into IT Auditing with Lewis Heuermann
_secpro Premium #1: Change is Difficult
#170: Ransomware and Pager Bombs
#167: Critically Investigating
#166: WannaTry Setting Up a Posture?
Critical Infrastructure Maintenance Policy
#164: The Ethical Hacking Starter Pack
#13: Navigating the World of Ethical Hacking & Incident Response with Shane Hartman
#162: Transformation and Overcoming Threats
#12: Succeeding in IT Transformation & Security Leadership with David J. Gee
#160: Whose Misjudgment? Which Culpability?
#11: Becoming a Better Cybersecurity Architect with Lester Nichols
#10: Navigating the Journey of Mature Secure SDLC Programs with Ben DiMolfetta
Quantum Computing and Cybersecurity
Expert Roundtable: The Role of AI in Cybersecurity's Future
PowerTalk: Transforming Cybersecurity with Generative AI with Clint Bodungen
#153: Blocking Botnets - a Coup
#152: Focusing on Emerging Threats.
SecPro Sessions: Emerging Cyber Risks - Where Should We Focus? with Tim Rains
#151: APIs and Architects - Looking to the Future.
#9: API Security - Strategizing for the Future with Colin Domoney
#150: Re-recalibrating the Basics
SecPro Sessions: Decoding Gartner's Top Strategic Security Trends of 2023 with Tia Hopkins
#149: Recalibrating the Basics
#8: Compliance, AI, and Cyber Resilience with a vCISO with Debra Baker
Webinar: Solid Foundations in Microsoft Defender 365
#147: Threat Actors and In-deception
#146: Forensic Inspections and a Digital Sign-off
Podcast #7: Managing Challenges in Computer Forensics with William Oettinger
#145: Quantum Curiosities and Azure Pentesting
Podcast #6: Azure Penetration Testing for Ethical Hackers with Karl Fosaaen
#144: Rotten Apples and People Search Malverts.
Podcast #5: What is Palo Alto Networks? with Tom Piens
Community Wisdom #2: There are 'no stupid questions'
Community Wisdom #1: Preparing for Zero Day Vulnerabilities
Communications and Equipment Policy
#143: Threats, Trends, and Strategies - Again!
Podcast #4: Cybersecurity Threats, Malware Trends and Strategies with Tim Rains
#142: Elastic Stack, Injection Attack, and "NoName" Back.
Podcast #3: Threat Hunting using Elastic Stack with Andrew Pease
#141: Kali Insights, Two Ransomware Gangs Down, and a Facebook Leak.
Podcast #2: The Ultimate Kali Linux Guide with Glen D. Singh
Cybersecurity Incident Communication Log
#139: Last Stop with the Adversary!
Podcast #1: Hack the Cybersecurity Interview with Ken, Christophe, and Tia
#137: Are Toothbrushes Now DDoS Threats?
#136: Conferring with Experts!
#135: Leaks? But Nothing Like This...