Sitemap - 2024 - Packt SecPro

_secpro Premium #3: APIs and Elastic Stack

Reflecting on APTs

#175: Hunting the EMERALDWHALE

_secpro Premium #2: A new ransom, the same as the old ransom

#16: Network Automation - Insights, Architecure, and Observability

#15: Transitioning Into IT Auditing with Lewis Heuermann

#174: Hacked Back

WannaChat?

#173: Back to Step Zero

#172: The State of the Update

Ransomware Awareness

Ransomware Crisis Protocol

#171: Going hAIwire

_secpro Premium #1: Change is Difficult

#170: Ransomware and Pager Bombs

#169: Growing Tensions

#168: A Change in Pace

#14: Why Critical Infrastructure Security and Security Research Matter with Soledad Antelada Toledano

#167: Critically Investigating

#166: WannaTry Setting Up a Posture?

Critical Infrastructure Maintenance Policy

#165: Transform Yourself!

#164: The Ethical Hacking Starter Pack

#13: Navigating the World of Ethical Hacking & Incident Response with Shane Hartman

Update Management Policy

#163: The Black Hat Review

#162: Transformation and Overcoming Threats

#12: Succeeding in IT Transformation & Security Leadership with David J. Gee

#161: CrowdStruck Out?

Malware Recovery Playbook

#160: Whose Misjudgment? Which Culpability?

#159: RAT Catching

#158: AI Today - Part V

#157: AI Today - Part IV

#11: Becoming a Better Cybersecurity Architect with Lester Nichols

#156: AI Today - Part III

#10: Navigating the Journey of Mature Secure SDLC Programs with Ben DiMolfetta

Lab Anti-Virus Policy

Quantum Computing and Cybersecurity

#155: AI Today - Part II

Expert Roundtable: The Role of AI in Cybersecurity's Future

Blocking Botnets – a Coup

LLMs and Zero-Days

#154: AI Today - Part I

PowerTalk: Transforming Cybersecurity with Generative AI with Clint Bodungen

#153: Blocking Botnets - a Coup

Internet DMZ Equipment Policy

#152: Focusing on Emerging Threats.

SecPro Sessions: Emerging Cyber Risks - Where Should We Focus? with Tim Rains

DMZ Internet Policy

#151: APIs and Architects - Looking to the Future.

#9: API Security - Strategizing for the Future with Colin Domoney

Server Security Policy

#150: Re-recalibrating the Basics

SecPro Sessions: Decoding Gartner's Top Strategic Security Trends of 2023 with Tia Hopkins

Internet Usage Policy

#149: Recalibrating the Basics

#8: Compliance, AI, and Cyber Resilience with a vCISO with Debra Baker

The ABCs of Cybersecurity

#148: Defending 365

Webinar: Solid Foundations in Microsoft Defender 365

#147: Threat Actors and In-deception

Risk Assessment Policy

#146: Forensic Inspections and a Digital Sign-off

Podcast #7: Managing Challenges in Computer Forensics with William Oettinger

VPN policy

#145: Quantum Curiosities and Azure Pentesting

Podcast #6: Azure Penetration Testing for Ethical Hackers with Karl Fosaaen

Digital Signatures Policy

#144: Rotten Apples and People Search Malverts.

Podcast #5: What is Palo Alto Networks? with Tom Piens

Community Wisdom #2: There are 'no stupid questions'

Community Wisdom #1: Preparing for Zero Day Vulnerabilities

Communications and Equipment Policy

#143: Threats, Trends, and Strategies - Again!

Podcast #4: Cybersecurity Threats, Malware Trends and Strategies with Tim Rains

AI Security Guidelines

#142: Elastic Stack, Injection Attack, and "NoName" Back.

Podcast #3: Threat Hunting using Elastic Stack with Andrew Pease

Acceptable Use Policy

#141: Kali Insights, Two Ransomware Gangs Down, and a Facebook Leak.

Podcast #2: The Ultimate Kali Linux Guide with Glen D. Singh

Cybersecurity Incident Communication Log

#140: LockBit Locked Out!

#139: Last Stop with the Adversary!

#138: Patch Tuesday review!

Podcast #1: Hack the Cybersecurity Interview with Ken, Christophe, and Tia

#137: Are Toothbrushes Now DDoS Threats?

#136: Conferring with Experts!

#135: Leaks? But Nothing Like This...

#133: Putting the Complain in Compliance?

#132: Better to Give Than to Deceive...?