The Guide to Outsmarting Hackers
Download this overview of CYE’s offensive approach to cybersecurity.Read Now!
Cyber Talks is a series where we share real stories, practical insights, and proven tips - all based on our experts' cyber experience and knowledge.
In this episode of Cyber Talks, CYE CEO Reuven Aronashvili sits with field CISO and bestselling author Ira Winkler for an unfiltered, everything-goes discussion about security space NFTs, Web 3, budgeting, 2023 predictions, and much more.
Join our experts as they dive into Recon and information harvesting techniques, MFA issues, and divulge stories from their very own experiences.
Eps. 8 | 23 Min
Our panel of highly skilled women discuss the challenges posed by an excess of security measures, the benefits of a purple team approach, and offer unique insights from their own experiences as women.
Eps. 7 | 19 Min
What is phishing and how can you protect yourself from it? Listen to our experts divulge the latest information on the topic.
Eps. 6 | 14 Min
Can data and AI predict the cost of a cyberattack? Listen to a deep dive into the future of cyber risk quantification.
Eps. 5 | 21 Min
Why should every CISO integrate threat intelligence into their security plans? Listen to our experts delve into how accurate intel can save you both money and effort.
Eps. 4 | 17 Min
Are you falling victim to the most common social engineering attacks? Listen to our experts’ advice on the best way to address this issue.
Eps. 3 | 5 Min
Are your developers doing what they should to make your apps secure? Listen to our application security expert address your most critical issues.
Eps. 2 | 8 Min
Heard of tunneled connections and want to know more? Read here to learn how to create and detect them in Windows Event Logs.
Want to see how a mass scamming plot was uncovered - and how you can uncover the next? Read on here!
Abusing a misconfiguration to bypass Palo Alto GlobalProtect VPN multi-factor-authentication.
Want to learn how to design a post exploitation arsenal that removes hurdles from your red team operators? Dive in Here!
The Cloud forces us to rethink a lot of security concepts. Due to many different services available it’s easy to lose count of bad administration patterns. Read on to raise your awareness of AzureAD Security.
As more and more organizations migrate to the cloud, IT and security teams should be aware of security weaknesses. Read on to discover how attackers abuse GCP identities to take over organizations.
Sometimes in order to focus on solving the real challenge, you need a comprehensive, all-in-one how-to guide to help you get started. Dive into this guide to learn how to create a Python Slackbot step-by-step.
To ensure no mistakes or misconfigurations are made when implementing new code, caution must be taken. However, what if we told you that your code should do security checks at the last moment?
Understanding the impact and likelihood of a data breach helps organizations evaluate risk and budget cybersecurity spending correctly. Learn how you can do this.
Since the war between Russia and Ukraine began, we've seen Russia's cybercrime capabilities greatly expand. Should we be worried about impending attacks?
Attackers often use techniques to search for vulnerabilities and misconfigurations in the AWS environment. What can you do to protect yourself?
Webinar: The Impact of Evolving Cybersecurity Compliance on Businesses | Oct. 3Join us >>