Advanced Attacker Automation: Botnet capabilities and techniques used to evade your defences
31:55
David Warburton (F5) - Presentation from SECCON NL 2022
Related Videos
In Security
-
Play video Policy Assistant and Experience Insights with Cisco Secure Access
Policy Assistant and Experience Insights with Cisco Secure Access
This presentation by Fay Lee and Justin Murphy, focuses on Cisco Secure Access and the integration of Generative AI (Gen AI) and ThousandEyes technology for enhancing security and user experience.
56:07
-
Play video Creating a Zero Trust Environment in DoD
Creating a Zero Trust Environment in DoD
A discussion with Marcos Rogers: Leveraging a Comply to Connect Security Architecture
4:31
-
Play video Cisco Secure Interconnection of Heterogeneous Fabrics (ACI and VXLAN EVPN)
Cisco Secure Interconnection of Heterogeneous Fabrics (ACI and VXLAN EVPN)
In this presentation, Lukas Krattiger and Max Ardica from Cisco's Data Center Business Unit discuss new functionalities for Cisco Data Center networking.
30:17
-
Play video Cisco Cyber Vision Deployment - Episode 1 - Center OVA Deployment - 4.2.3
Cisco Cyber Vision Deployment - Episode 1 - Center OVA Deployment - 4.2.3
In part one of our Cisco Cyber Vision deployment series, we present an overview of the Cisco Cyber Vision Center and walk through the deployment process of the Cyber Vision Center ova into a VMWare ESXi environment.
10:21
-
Play video Risk Based Endpoint Security with Cisco Vulnerability Management and Cisco Secure Endpoint
Risk Based Endpoint Security with Cisco Vulnerability Management and Cisco Secure Endpoint
Cisco Vulnerability Management integrates with Cisco Secure Endpoint to ingest endpoint vulnerability data, enabling users to detect, assess, prioritize, and manage endpoint vulnerabilities with a data science-driven approach.
1:33
-
Play video Cisco Cloud Application Security Overview Video
Cisco Cloud Application Security Overview Video
Do you wish you could monitor, detect, prevent, and dynamically remediate threats from your cloud applications and underlying infrastructure - all from one tool? See how it's possible with Cisco Cloud Application Security.
2:18