Cytix
Who Wins at Threat Modelling: AI or a Real Hacker?
18:41
Cytix
🤖 Can AI help find vulnerabilities scanners miss?
1:13
Cytix
AI vs Humans: Can AI Replace Pentesters?
21:26
Cytix
Security scanners aren't as smart as you think...
1:35
Cytix
🚨 SQL Injection: Hack it or Track it?
2:23
Cytix
Hack it or Track it: The Hunt for Cyber Vulnerabilities
20:01
Cytix
⚠️ AI Scanners vs. Human Hackers – Who Wins? 🤖🔥
1:20
Cytix
LTST Season 2 Ep 4 - Micro Pen-Testing: When Less is More in Cybersecurity
16:07
Cytix
🔍 Micro Pen Testing: The Targeted Security Game-Changer!
0:42
Cytix
🔥 AI for Cybersecurity? How Language Models Are Changing Threat Modelling! 🤯
0:40
Cytix
What Does Threat Modelling Mean in Cyber Security Testing?
1:01
Cytix
LTST Season 2 Ep. 3 - Breaking Down Threat Modeling in Security Testing: A Cybersecurity Essential
19:28
Cytix
LTST Season 2 Ep 2 - What Security Can Learn From Quality Control
27:48
Cytix
The benefits of using development tickets to inform your security testing programme
0:37
Cytix
Why development tickets hold the answer to detecting every vulnerability type
0:39
Cytix
LTST Season 2 Ep.1 - Enhancing Pentesting Effectiveness with Jira Tickets
12:50
Cytix
How can Jira tickets aid your security testing programme?
0:39
Cytix
🛡️ How to achieve holistic security testing programmes for enterprises… 🛡️
1:12
Cytix
⚖️ The problem of trying to scale application security ⚖️
0:57
Cytix
Ever wondered where security vulnerabilities come from? 🤔
0:44
Cytix
🔬 Ever wondered what it takes to build a security testing team? 🔬
0:44
Cytix
Why LLMs should be part of your security testing strategy 🧑💻
0:53
Cytix
Why does customised reporting in cybersecurity matter?
0:53
Cytix
📝 When it comes to security testing Context. Is Everything. 📝
1:04
Cytix
💡How easy is to create access control issues?
0:51
Cytix
We let an access control issue into our system!
0:55
Cytix
Vulnerability Deep Dive: Access Control Issues
16:55
Cytix
The importance of determining who, what, when, why, and how for tickets
0:34
Cytix
Why scanners shouldn't be the only method for finding vulnerabilities
0:52
Cytix
Depth vs Coverage in Security Testing
15:23
Cytix
Why Business Logic Flaws Often Go Unnoticed
0:59
Cytix
The Unique Challenges of Finding Business Logic Flaws
0:52
Cytix
Vulnerability Deep Dive: Business Logic Flaws
24:13
Cytix
What's the Real Reason Behind Your Pentest?
0:44
Cytix
How to Build an Internal Security Testing Team
17:52
Cytix
💡What to Check Before Hiring Internal Pentesters
1:00
Cytix
Prioritising Speed to Detection Over Vulnerability Volume
1:06
Cytix
How Can Offensive Security Teams Prioritise What and Where to Test?
0:57
Cytix
How Can Offensive Security Do Better?
0:44
Cytix
Where Do Vulnerabilities Come From?
25:13
Cytix
An Example of the Impact of Context in a Penetration Test
0:41
Cytix
Why Context Matters In Security Testing
17:26
Cytix
💡 Drivers Behind Cyber Security Testing
0:37
Cytix
💡 Tolerance Within Cyber Security Testing
1:00
Cytix
💡 How to Security Test Different Assets.
1:12
Cytix
How To Run An Enterprise Security Testing Programme
25:50
Cytix
Deciphering a Sales Pitch from Industry Education in Cyber Security
0:54
Cytix
What Security Engineers Consider When Evaluating New Tools
0:54
Cytix
The Token 'Security Person' vs Integrated Security Operations.
0:54
Cytix
A Cyber Security Engineer and A Vendor Meet in A Podcast Studio
26:33
Cytix
💡 Why Building Depth in a Security Testing Programme is Key.
0:59
Cytix
💡 How to get started with LLMs in security testing.
0:53
Cytix
💡 LLMs in Cyber Security Testing
1:03
Cytix
How To Safely Use LLMs in Cyber Security Testing
1:13
Cytix
The Role of LLMs in Security Testing
25:07
Cytix
💡 Why are LLMs so polarised in security testing?
1:03
Cytix
💡The Main Thing To Consider When Scaling a Security Testing Programme
0:33
Cytix
💡 The Scalability Challenge in Security Testing
0:57
Cytix
💡 How to Scale a Security Testing Programme
0:56
Cytix
How To Scale A Security Testing Programme
25:27
Cytix
Webinar: The Role of LLMs in Security Testing
34:19
Cytix
💡 Is your external pentester spending their time in the way you think?
0:42
Cytix
Are You Setting up Your Pentester for Success or Wasted Time?
1:33
Cytix
💡Are you informing your pentester enough at the start of the process?
0:40
Cytix
How to Get the Full Value Out of Your Human Security Testing
27:56
Cytix
Help your pentester out!
0:40
Cytix
Are you making the same mistake at the start of your pentest?
0:51
Cytix
Why Lack of Context Causes False Positives in Automated Scanners
0:43
Cytix
Are Humans Holding Back the Potential of Automated Testing Tools?
1:00
Cytix
Automated Security Testing - Benefits & Limitations
30:45
Cytix
What to Consider When Choosing Automated Testing Tools
1:26
Cytix
Is a Bug Bounty Programme Continuous Testing?
2:32
Cytix
Context Matters in Security Testing!
0:36
Cytix
The Beauty of Continuous Testing
0:53
Cytix
The Need for Continuous Security Testing
29:10
Cytix
How Do We Repair the Relationship Between Developers and Pentesters?
2:33
Cytix
Security Testing Tools vs Humans - What Can We Do Better?
1:34
Cytix
Is the role of a Pentester changing?
1:50
Cytix
The Big CISO Shoot 2024
3:30
Cytix
How Can Penetration Testing Be Made Better
2:06
Cytix
How Can Additional Context Make Penetration Testing More Effective?
2:00
Cytix
Calculate ROI on Security Testing
1:21
Cytix
How do you understand performance over time? | Cytix
1:11
Cytix
How to work out MTTD (Mean Time to Detection)? | Cytix
1:03
Cytix
Will there come a day where there are 0 vulnerabilities to find? | Cytix
1:05
Cytix
How do you work out MTTR (Mean Time to Response)? | Cytix
1:07
Cytix
What metrics are important? | Cytix
1:25
Cytix
How to make dynamic testing work for DevOps teams | Cytix
1:38
Cytix
Are there too many tools? | Cytix
1:24
Cytix
Real Cyber Talk with Cytix | Saskia Coplans & Daniel Smart | SE1 EP7
35:05
Cytix
Real Cyber Talk with Cytix | Mike Koss- CISO at RTGS.global | SE1 EP6
31:01
Cytix
Is the UK falling behind internationally? | Cytix
1:14
Cytix
With all the tools people have at their disposal, why do issues still get through? | Cytix
2:13
Cytix
Real Cyber Talk with Cytix | James Bore- Cyber Security Expert | SE1 EP5
32:29
Cytix
How do open source tools compare to commercial products? | Cytix
0:56
Cytix
What is meant by finding the economic line between manual and automated testing? | Cytix
0:46
Cytix
The Big CISO Shoot- Register Now! | Cytix
0:46
Cytix
Is finding more and more vulnerabilities actually helping? | Cytix
0:36
Cytix
Real Cyber Talk with Cytix | Matt Summers- Head of Security | SE1, EP4
33:43
Cytix
How are companies addressing their vulnerability backlogs? | Cytix
1:45