Advanced Attacker Automation: Botnet capabilities and techniques used to evade your defences
31:55
David Warburton (F5) - Presentation from SECCON NL 2022
Related Videos
In Security
-
Play video Peco Foods Goes Zero Trust: Modern Security with Cisco SASE
Peco Foods Goes Zero Trust: Modern Security with Cisco SASE
Peco Foods partnered with Cisco to modernize security by replacing legacy systems with a secure access service edge (SASE) framework. The company's goals are to unify networking and security, enable zero trust and streamline management.
2:55
-
Play video Cisco SASE: End-to-end. Everywhere.
Cisco SASE: End-to-end. Everywhere.
This video shows how Cisco SASE unifies network architecture and security policy, optimizing user experience and IT efficiency to accelerate zero trust security.
1:05
-
Play video Workflows | Meraki Wireless SSID Configuration with ISE
Workflows | Meraki Wireless SSID Configuration with ISE
Discover how AI Assistant uses Workflows to automate Meraki Wireless SSID configuration with 802.1X RADIUS authentication, streamlining NAC deployment with Cisco ISE for secure wireless access.
8:22
-
Play video Cisco Secure Firewall 6100 Series Overview
Cisco Secure Firewall 6100 Series Overview
The Cisco Secure Firewall 6100 Series is an ultra-high-end series firewall that protects AI-ready data centers and telecom mobility infrastructure with exceptional performance density, line-rate advanced threat protection, and modular scalability.
1:14
-
Play video Birla Opus Paints - Connected Factories, Smarter Paint
Birla Opus Paints - Connected Factories, Smarter Paint
Birla Opus Paints built six new factories with one digital backbone, achieving speed, security, and resilience through Cisco-powered connected operations.
1:47
-
Play video Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Universal ZTNA from Cisco: Zero Friction. Zero Imposters. Zero Downtime.
Today, zero trust is the new normal. You get the least access to get the job done; nothing more. It sounds easy, but it’s not. Users and things are everywhere. Accessing sensitive assets, on any device, from anywhere. But so are attackers.
1:40