Who Wins at Threat Modelling: AI or a Real Hacker?
Cytix
Who Wins at Threat Modelling: AI or a Real Hacker?
18:41
🤖 Can AI help find vulnerabilities scanners miss?
Cytix
🤖 Can AI help find vulnerabilities scanners miss?
1:13
AI vs Humans: Can AI Replace Pentesters?
Cytix
AI vs Humans: Can AI Replace Pentesters?
21:26
Security scanners aren't as smart as you think...
Cytix
Security scanners aren't as smart as you think...
1:35
🚨 SQL Injection: Hack it or Track it?
Cytix
🚨 SQL Injection: Hack it or Track it?
2:23
Hack it or Track it: The Hunt for Cyber Vulnerabilities
Cytix
Hack it or Track it: The Hunt for Cyber Vulnerabilities
20:01
⚠️ AI Scanners vs. Human Hackers – Who Wins? 🤖🔥
Cytix
⚠️ AI Scanners vs. Human Hackers – Who Wins? 🤖🔥
1:20
LTST Season 2 Ep 4 - Micro Pen-Testing: When Less is More in Cybersecurity
Cytix
LTST Season 2 Ep 4 - Micro Pen-Testing: When Less is More in Cybersecurity
16:07
🔍 Micro Pen Testing: The Targeted Security Game-Changer!
Cytix
🔍 Micro Pen Testing: The Targeted Security Game-Changer!
0:42
🔥 AI for Cybersecurity? How Language Models Are Changing Threat Modelling! 🤯
Cytix
🔥 AI for Cybersecurity? How Language Models Are Changing Threat Modelling! 🤯
0:40
What Does Threat Modelling Mean in Cyber Security Testing?
Cytix
What Does Threat Modelling Mean in Cyber Security Testing?
1:01
LTST Season 2 Ep. 3 - Breaking Down Threat Modeling in Security Testing: A Cybersecurity Essential
Cytix
LTST Season 2 Ep. 3 - Breaking Down Threat Modeling in Security Testing: A Cybersecurity Essential
19:28
LTST Season 2 Ep 2 - What Security Can Learn From Quality Control
Cytix
LTST Season 2 Ep 2 - What Security Can Learn From Quality Control
27:48
The benefits of using development tickets to inform your security testing programme
Cytix
The benefits of using development tickets to inform your security testing programme
0:37
Why development tickets hold the answer to detecting every vulnerability type
Cytix
Why development tickets hold the answer to detecting every vulnerability type
0:39
LTST Season 2 Ep.1 - Enhancing Pentesting Effectiveness with Jira Tickets
Cytix
LTST Season 2 Ep.1 - Enhancing Pentesting Effectiveness with Jira Tickets
12:50
How can Jira tickets aid your security testing programme?
Cytix
How can Jira tickets aid your security testing programme?
0:39
🛡️ How to achieve holistic security testing programmes for enterprises… 🛡️
Cytix
🛡️ How to achieve holistic security testing programmes for enterprises… 🛡️
1:12
⚖️ The problem of trying to scale application security ⚖️
Cytix
⚖️ The problem of trying to scale application security ⚖️
0:57
Ever wondered where security vulnerabilities come from? 🤔
Cytix
Ever wondered where security vulnerabilities come from? 🤔
0:44
🔬 Ever wondered what it takes to build a security testing team? 🔬
Cytix
🔬 Ever wondered what it takes to build a security testing team? 🔬
0:44
Why LLMs should be part of your security testing strategy 🧑‍💻
Cytix
Why LLMs should be part of your security testing strategy 🧑‍💻
0:53
Why does customised reporting in cybersecurity matter?
Cytix
Why does customised reporting in cybersecurity matter?
0:53
📝 When it comes to security testing Context. Is Everything. 📝
Cytix
📝 When it comes to security testing Context. Is Everything. 📝
1:04
💡How easy is to create access control issues?
Cytix
💡How easy is to create access control issues?
0:51
We let an access control issue into our system!
Cytix
We let an access control issue into our system!
0:55
Vulnerability Deep Dive: Access Control Issues
Cytix
Vulnerability Deep Dive: Access Control Issues
16:55
The importance of determining who, what, when, why, and how for tickets
Cytix
The importance of determining who, what, when, why, and how for tickets
0:34
Why scanners shouldn't be the only method for finding vulnerabilities
Cytix
Why scanners shouldn't be the only method for finding vulnerabilities
0:52
Depth vs Coverage in Security Testing
Cytix
Depth vs Coverage in Security Testing
15:23
Why Business Logic Flaws Often Go Unnoticed
Cytix
Why Business Logic Flaws Often Go Unnoticed
0:59
The Unique Challenges of Finding Business Logic Flaws
Cytix
The Unique Challenges of Finding Business Logic Flaws
0:52
Vulnerability Deep Dive: Business Logic Flaws
Cytix
Vulnerability Deep Dive: Business Logic Flaws
24:13
What's the Real Reason Behind Your Pentest?
Cytix
What's the Real Reason Behind Your Pentest?
0:44
How to Build an Internal Security Testing Team
Cytix
How to Build an Internal Security Testing Team
17:52
💡What to Check Before Hiring Internal Pentesters
Cytix
💡What to Check Before Hiring Internal Pentesters
1:00
Prioritising Speed to Detection Over Vulnerability Volume
Cytix
Prioritising Speed to Detection Over Vulnerability Volume
1:06
How Can Offensive Security Teams Prioritise What and Where to Test?
Cytix
How Can Offensive Security Teams Prioritise What and Where to Test?
0:57
How Can Offensive Security Do Better?
Cytix
How Can Offensive Security Do Better?
0:44
Where Do Vulnerabilities Come From?
Cytix
Where Do Vulnerabilities Come From?
25:13
An Example of the Impact of Context in a Penetration Test
Cytix
An Example of the Impact of Context in a Penetration Test
0:41
Why Context Matters In Security Testing
Cytix
Why Context Matters In Security Testing
17:26
💡 Drivers Behind Cyber Security Testing
Cytix
💡 Drivers Behind Cyber Security Testing
0:37
💡 Tolerance Within Cyber Security Testing
Cytix
💡 Tolerance Within Cyber Security Testing
1:00
💡 How to Security Test Different Assets.
Cytix
💡 How to Security Test Different Assets.
1:12
How To Run An Enterprise Security Testing Programme
Cytix
How To Run An Enterprise Security Testing Programme
25:50
Deciphering a Sales Pitch from Industry Education in Cyber Security
Cytix
Deciphering a Sales Pitch from Industry Education in Cyber Security
0:54
What Security Engineers Consider When Evaluating New Tools
Cytix
What Security Engineers Consider When Evaluating New Tools
0:54
The Token 'Security Person' vs Integrated Security Operations.
Cytix
The Token 'Security Person' vs Integrated Security Operations.
0:54
A Cyber Security Engineer and A Vendor Meet in A Podcast Studio
Cytix
A Cyber Security Engineer and A Vendor Meet in A Podcast Studio
26:33
💡 Why Building Depth in a Security Testing Programme is Key.
Cytix
💡 Why Building Depth in a Security Testing Programme is Key.
0:59
💡 How to get started with LLMs in security testing.
Cytix
💡 How to get started with LLMs in security testing.
0:53
💡 LLMs in Cyber Security Testing
Cytix
💡 LLMs in Cyber Security Testing
1:03
How To Safely Use LLMs in Cyber Security Testing
Cytix
How To Safely Use LLMs in Cyber Security Testing
1:13
The Role of LLMs in Security Testing
Cytix
The Role of LLMs in Security Testing
25:07
💡 Why are LLMs so polarised in security testing?
Cytix
💡 Why are LLMs so polarised in security testing?
1:03
💡The Main Thing To Consider When Scaling a Security Testing Programme
Cytix
💡The Main Thing To Consider When Scaling a Security Testing Programme
0:33
💡 The Scalability Challenge in Security Testing
Cytix
💡 The Scalability Challenge in Security Testing
0:57
💡 How to Scale a Security Testing Programme
Cytix
💡 How to Scale a Security Testing Programme
0:56
How To Scale A Security Testing Programme
Cytix
How To Scale A Security Testing Programme
25:27
Webinar: The Role of LLMs in Security Testing
Cytix
Webinar: The Role of LLMs in Security Testing
34:19
💡 Is your external pentester spending their time in the way you think?
Cytix
💡 Is your external pentester spending their time in the way you think?
0:42
Are You Setting up Your Pentester for Success or Wasted Time?
Cytix
Are You Setting up Your Pentester for Success or Wasted Time?
1:33
💡Are you informing your pentester enough at the start of the process?
Cytix
💡Are you informing your pentester enough at the start of the process?
0:40
How to Get the Full Value Out of Your Human Security Testing
Cytix
How to Get the Full Value Out of Your Human Security Testing
27:56
Help your pentester out!
Cytix
Help your pentester out!
0:40
Are you making the same mistake at the start of your pentest?
Cytix
Are you making the same mistake at the start of your pentest?
0:51
Why Lack of Context Causes False Positives in Automated Scanners
Cytix
Why Lack of Context Causes False Positives in Automated Scanners
0:43
Are Humans Holding Back the Potential of Automated Testing Tools?
Cytix
Are Humans Holding Back the Potential of Automated Testing Tools?
1:00
Automated Security Testing - Benefits & Limitations
Cytix
Automated Security Testing - Benefits & Limitations
30:45
What to Consider When Choosing Automated Testing Tools
Cytix
What to Consider When Choosing Automated Testing Tools
1:26
Is a Bug Bounty Programme Continuous Testing?
Cytix
Is a Bug Bounty Programme Continuous Testing?
2:32
Context Matters in Security Testing!
Cytix
Context Matters in Security Testing!
0:36
The Beauty of Continuous Testing
Cytix
The Beauty of Continuous Testing
0:53
The Need for Continuous Security Testing
Cytix
The Need for Continuous Security Testing
29:10
How Do We Repair the Relationship Between Developers and Pentesters?
Cytix
How Do We Repair the Relationship Between Developers and Pentesters?
2:33
Security Testing Tools vs Humans - What Can We Do Better?
Cytix
Security Testing Tools vs Humans - What Can We Do Better?
1:34
Is the role of a Pentester changing?
Cytix
Is the role of a Pentester changing?
1:50
The Big CISO Shoot 2024
Cytix
The Big CISO Shoot 2024
3:30
How Can Penetration Testing Be Made Better
Cytix
How Can Penetration Testing Be Made Better
2:06
How Can Additional Context Make Penetration Testing More Effective?
Cytix
How Can Additional Context Make Penetration Testing More Effective?
2:00
Calculate ROI on Security Testing
Cytix
Calculate ROI on Security Testing
1:21
How do you understand performance over time? | Cytix
Cytix
How do you understand performance over time? | Cytix
1:11
How to work out MTTD (Mean Time to Detection)? | Cytix
Cytix
How to work out MTTD (Mean Time to Detection)? | Cytix
1:03
Will there come a day where there are 0 vulnerabilities to find? | Cytix
Cytix
Will there come a day where there are 0 vulnerabilities to find? | Cytix
1:05
How do you work out MTTR (Mean Time to Response)? | Cytix
Cytix
How do you work out MTTR (Mean Time to Response)? | Cytix
1:07
What metrics are important? | Cytix
Cytix
What metrics are important? | Cytix
1:25
How to make dynamic testing work for DevOps teams | Cytix
Cytix
How to make dynamic testing work for DevOps teams | Cytix
1:38
Are there too many tools? | Cytix
Cytix
Are there too many tools? | Cytix
1:24
Real Cyber Talk with Cytix | Saskia Coplans & Daniel Smart | SE1 EP7
Cytix
Real Cyber Talk with Cytix | Saskia Coplans & Daniel Smart | SE1 EP7
35:05
Real Cyber Talk with Cytix | Mike Koss- CISO at RTGS.global | SE1 EP6
Cytix
Real Cyber Talk with Cytix | Mike Koss- CISO at RTGS.global | SE1 EP6
31:01
Is the UK falling behind internationally? | Cytix
Cytix
Is the UK falling behind internationally? | Cytix
1:14
With all the tools people have at their disposal, why do issues still get through? | Cytix
Cytix
With all the tools people have at their disposal, why do issues still get through? | Cytix
2:13
Real Cyber Talk with Cytix | James Bore- Cyber Security Expert | SE1 EP5
Cytix
Real Cyber Talk with Cytix | James Bore- Cyber Security Expert | SE1 EP5
32:29
How do open source tools compare to commercial products? | Cytix
Cytix
How do open source tools compare to commercial products? | Cytix
0:56
What is meant by finding the economic line between manual and automated testing? | Cytix
Cytix
What is meant by finding the economic line between manual and automated testing? | Cytix
0:46
The Big CISO Shoot- Register Now! | Cytix
Cytix
The Big CISO Shoot- Register Now! | Cytix
0:46
Is finding more and more vulnerabilities actually helping? | Cytix
Cytix
Is finding more and more vulnerabilities actually helping? | Cytix
0:36
Real Cyber Talk with Cytix | Matt Summers- Head of Security | SE1, EP4
Cytix
Real Cyber Talk with Cytix | Matt Summers- Head of Security | SE1, EP4
33:43
How are companies addressing their vulnerability backlogs? | Cytix
Cytix
How are companies addressing their vulnerability backlogs? | Cytix
1:45