قواعد للأمن السيبراني: ما يجب فعله وما يجب تجنبه
@security-shapes
قواعد للأمن السيبراني: ما يجب فعله وما يجب تجنبه
3:29
10 Conseils de Cyberscurity
@security-shapes
10 Conseils de Cyberscurity
3:03
How to Choose Security Vendors Aligned with Your Architecture
@security-shapes
How to Choose Security Vendors Aligned with Your Architecture
5:13
Honeypots, Honey files & Honeytokens & DNS Sinkholes
@security-shapes
Honeypots, Honey files & Honeytokens & DNS Sinkholes
4:35
Why not considering SCBOM Supply chain bill of Materials Could be a new prespective on supply chain
@security-shapes
Why not considering SCBOM Supply chain bill of Materials Could be a new prespective on supply chain
2:50
Governance
@security-shapes
Governance
4:38
Why not considering SCBOM  Supply chain bill of Materials Could be a new prespective on supply chain
@security-shapes
Why not considering SCBOM Supply chain bill of Materials Could be a new prespective on supply chain
2:52
What is Mobile Security? Mobile Security | Protect your Phone from hackers | @security-shapes
@security-shapes
What is Mobile Security? Mobile Security | Protect your Phone from hackers | @security-shapes
3:37
what is Cloud Jacking? Cloud Jacking Explained | Cloud Security | Cyber Security @security-shapes
@security-shapes
what is Cloud Jacking? Cloud Jacking Explained | Cloud Security | Cyber Security @security-shapes
2:21
Boost Your Cybersecurity Strategy with NIST's CSF 2.0: New Updates & Enhanced Governance nistcsf2.0
@security-shapes
Boost Your Cybersecurity Strategy with NIST's CSF 2.0: New Updates & Enhanced Governance nistcsf2.0
2:56
Cybersecurity challenges in Smart Cities: Navigating governance,Culture, and collaboration for Urban
@security-shapes
Cybersecurity challenges in Smart Cities: Navigating governance,Culture, and collaboration for Urban
3:37
Who am I?
@security-shapes
Who am I?
2:09
How about Securing Your APIs Essential Tips for Robust API Security @security-shapes  Cyber Security
@security-shapes
How about Securing Your APIs Essential Tips for Robust API Security @security-shapes Cyber Security
4:41
Cyber Kill Chain Exposed: A Complete Guide || Cyber Security || @security-shapes #cyberkillchain
@security-shapes
Cyber Kill Chain Exposed: A Complete Guide || Cyber Security || @security-shapes #cyberkillchain
4:16
What is Micro Segmentation? Cyber Security || @security-shapes || Micro-Segmentation #cybersecurity
@security-shapes
What is Micro Segmentation? Cyber Security || @security-shapes || Micro-Segmentation #cybersecurity
3:28
Breaking the Chains of Trust: Welcome to the Zero Trust Evolution Zero Trust Explained CyberSecurity
@security-shapes
Breaking the Chains of Trust: Welcome to the Zero Trust Evolution Zero Trust Explained CyberSecurity
14:42
Master Your Data with the 3-2-1 Rule Backup Strategy Ultimate Data Protection Guide @security-shapes
@security-shapes
Master Your Data with the 3-2-1 Rule Backup Strategy Ultimate Data Protection Guide @security-shapes
2:53
Risks in Product & Service Acquisition
@security-shapes
Risks in Product & Service Acquisition
4:56
Ready to Crush Your 2024 Goals? Discover the SMART Way! 🎯
@security-shapes
Ready to Crush Your 2024 Goals? Discover the SMART Way! 🎯
3:40
Safeguard Your Festive Joy: 10 Crucial Cybersecurity Tips for the Holidays!
@security-shapes
Safeguard Your Festive Joy: 10 Crucial Cybersecurity Tips for the Holidays!
9:32
What if I told you: the essential Do’s and don'ts of online security!
@security-shapes
What if I told you: the essential Do’s and don'ts of online security!
4:03
Beyond Locks and keys Homomohic encryption Unveiled
@security-shapes
Beyond Locks and keys Homomohic encryption Unveiled
3:57
Cyberattackssteps
@security-shapes
Cyberattackssteps
4:04
Exploring the Secure World of IPsec
@security-shapes
Exploring the Secure World of IPsec
3:12
Understanding SOC Audits
@security-shapes
Understanding SOC Audits
4:16
Have you ever heard of SMART goals?
@security-shapes
Have you ever heard of SMART goals?
2:24
Have you ever heard of SMART goals?
@security-shapes
Have you ever heard of SMART goals?
2:24
Unveiling the Power of Wiping, Degaussing, and Cryptoshredding
@security-shapes
Unveiling the Power of Wiping, Degaussing, and Cryptoshredding
3:56
Have you ever heard of SMART goals?
@security-shapes
Have you ever heard of SMART goals?
1:50
CMMI Maturity Levels
@security-shapes
CMMI Maturity Levels
4:02
CMMI Maturity Levels
@security-shapes
CMMI Maturity Levels
4:02
Securing Your Digital Landscape: A Deep Dive into Third-Party Partnerships and Data Protection
@security-shapes
Securing Your Digital Landscape: A Deep Dive into Third-Party Partnerships and Data Protection
2:14
Incident Response - Successfully Navigating Cybersecurity Challenges
@security-shapes
Incident Response - Successfully Navigating Cybersecurity Challenges
4:25
Exploring the World of Software Security: Learn to Protect Your Digital World!
@security-shapes
Exploring the World of Software Security: Learn to Protect Your Digital World!
7:14
🔐 Security Throughout the Cycle🔐
@security-shapes
🔐 Security Throughout the Cycle🔐
3:56
Recovery Strategies 2
@security-shapes
Recovery Strategies 2
3:14
Recovery Strategies 1
@security-shapes
Recovery Strategies 1
10:25
Network Defense
@security-shapes
Network Defense
13:39
Fortifying Your Digital Castle: 4 Pillars of Cybersecurity Awareness
@security-shapes
Fortifying Your Digital Castle: 4 Pillars of Cybersecurity Awareness
3:26
SecDevOps: the Art of balancing security and speed
@security-shapes
SecDevOps: the Art of balancing security and speed
4:46
Devsecops transformation
@security-shapes
Devsecops transformation
0:54
📦 SBOM: Your Software Transparency Solution! 🌐
@security-shapes
📦 SBOM: Your Software Transparency Solution! 🌐
4:49
come mitigare i rischi associati al uso del open source nella supply chain part 2/2
@security-shapes
come mitigare i rischi associati al uso del open source nella supply chain part 2/2
0:54
come mitigare i rischi associati al uso del open source nella supply chain #informationsecurity
@security-shapes
come mitigare i rischi associati al uso del open source nella supply chain #informationsecurity
0:47
I vantaggi del uso del open source
@security-shapes
I vantaggi del uso del open source
1:01
Devsecops vs SecDevOps
@security-shapes
Devsecops vs SecDevOps
3:45
Supply chain open source #informationsecurity #svilupposoftware
@security-shapes
Supply chain open source #informationsecurity #svilupposoftware
0:43
DevSecOps vs SecDevOps #informationsecurity
@security-shapes
DevSecOps vs SecDevOps #informationsecurity
1:01
GRC: An Integrated Approach for Responsible and Secure Business Management
@security-shapes
GRC: An Integrated Approach for Responsible and Secure Business Management
4:06
GRC: An Integrated Approach for Responsible and Secure Business Management
@security-shapes
GRC: An Integrated Approach for Responsible and Secure Business Management
4:16
GRC: An Integrated Approach for Responsible and Secure Business Management
@security-shapes
GRC: An Integrated Approach for Responsible and Secure Business Management
4:31
GRC: An Integrated Approach for Responsible and Secure Business Management
@security-shapes
GRC: An Integrated Approach for Responsible and Secure Business Management
4:06
5G Network Security: Unveiling the Invisible Shield
@security-shapes
5G Network Security: Unveiling the Invisible Shield
6:39
5G Network Security: Unveiling the Invisible Shield
@security-shapes
5G Network Security: Unveiling the Invisible Shield
6:05
5G Network Security: Unveiling the Invisible Shield
@security-shapes
5G Network Security: Unveiling the Invisible Shield
6:09
5G Network Security: Unveiling the Invisible Shield
@security-shapes
5G Network Security: Unveiling the Invisible Shield
6:01
Safeguarding the Future - An Overview of OT Security
@security-shapes
Safeguarding the Future - An Overview of OT Security
11:20
Safeguarding the Future - An Overview of OT Security
@security-shapes
Safeguarding the Future - An Overview of OT Security
9:44
Safeguarding the Future - An Overview of OT Security
@security-shapes
Safeguarding the Future - An Overview of OT Security
11:03
Safeguarding the Future - An Overview of OT Security
@security-shapes
Safeguarding the Future - An Overview of OT Security
10:26
Security architectures and their concrete impacts
@security-shapes
Security architectures and their concrete impacts
5:46
Security architectures and their concrete impacts
@security-shapes
Security architectures and their concrete impacts
7:28
Security architectures and their concrete impacts
@security-shapes
Security architectures and their concrete impacts
7:40
Security architectures and their concrete impacts
@security-shapes
Security architectures and their concrete impacts
7:36
أمن وحماية إنترنت الأشياء
@security-shapes
أمن وحماية إنترنت الأشياء
6:43
Security internet of things (IOT)
@security-shapes
Security internet of things (IOT)
7:12
Sécurité de l'IoT (sécurité de l'internet des objets)
@security-shapes
Sécurité de l'IoT (sécurité de l'internet des objets)
7:02
security Internet of things (IOT)
@security-shapes
security Internet of things (IOT)
7:14
AI-Driven security operations (SOC)-Francais
@security-shapes
AI-Driven security operations (SOC)-Francais
5:56
AI-Driven security operations (SOC)-English
@security-shapes
AI-Driven security operations (SOC)-English
5:50
عمليات أمنية مدفوعة بالذكاء الاصطناعي (SOC)Security Operation Center
@security-shapes
عمليات أمنية مدفوعة بالذكاء الاصطناعي (SOC)Security Operation Center
4:26
AI-Driven security operations (SOC)
@security-shapes
AI-Driven security operations (SOC)
6:18
هندسة اجتماعية  Social engineering
@security-shapes
هندسة اجتماعية Social engineering
6:12
Ingénierie sociale
@security-shapes
Ingénierie sociale
5:43
Social Engineering
@security-shapes
Social Engineering
6:59
Social Engineering IT
@security-shapes
Social Engineering IT
9:30