Advanced Attacker Automation: Botnet capabilities and techniques used to evade your defences
31:55
David Warburton (F5) - Presentation from SECCON NL 2022
Related Videos
In Security
-
Play video The Power of the Platform: Cisco SASE
The Power of the Platform: Cisco SASE
By integrating market-leading SD-WAN with cloud-native SSE, Cisco SASE delivers secure access in an optimized and orchestrated way. See each component working together - identifying and optimizing the best - and most secure - path for your business.
2:03
-
Play video Secure Campus Overview Video
Secure Campus Overview Video
As AI is embedded into daily workflows, campus networks must be simpler to operate, secure by design, and built for real-time performance. Cisco Secure Campus achieves this with Agentic Operations, integrated security, and high-performance networking
2:15
-
Play video AI-Ready Wireless Security: Integrating WPA3 & Beyond
AI-Ready Wireless Security: Integrating WPA3 & Beyond
Delve into AI-Ready Wireless Security: WPA3's evolution from WEP, its role in Wi-Fi 6E/7 (MLO, EHT), and enhanced cryptography. Covers holistic network security & emerging post-quantum cryptography to counter future threats.
18:53
-
Play video SASE for the AI Era from Cisco
SASE for the AI Era from Cisco
Your organization can do amazing things with AI, if your network is ready for it. Cisco's SASE solution is designed to meet the new needs of the AI era - by identifying, optimizing, and securing AI traffic flows.
1:46
-
Play video The AI Ready Enterprise: Building a Secure Network Architecture for What's Next
The AI Ready Enterprise: Building a Secure Network Architecture for What's Next
Campus networks are under pressure— increased traffic, AI workloads, hybrid work, and a rising tide of IoT devices create unprecedented risks. Simplify and secure your AI-ready infrastructure with scalable, integrated security solutions to deliver a
2:22
-
Play video Cisco Cyber Vision: Protecting OT at Scale
Cisco Cyber Vision: Protecting OT at Scale
Get unparalleled visibility and threat detection across operational technology networks by analyzing industrial protocols and integrating with Cisco security products to secure OT environments at scale.
1:56