BLINDSPOT: Master the art of anticipation.
PRODAFT
BLINDSPOT: Master the art of anticipation.
1:58
Cybersecurity professionals explain the dangers of ransomware
PRODAFT
Cybersecurity professionals explain the dangers of ransomware
48:17
How can keystroke logging compromise your credentials?
PRODAFT
How can keystroke logging compromise your credentials?
4:37
The cybersecurity pitfalls of social media you didn't know
PRODAFT
The cybersecurity pitfalls of social media you didn't know
4:02
Why does SystemBC dominate the ransomware scene?
PRODAFT
Why does SystemBC dominate the ransomware scene?
3:19
The growing threat of cyber espionage
PRODAFT
The growing threat of cyber espionage
4:24
What is the difference between deep web and dark web?
PRODAFT
What is the difference between deep web and dark web?
3:41
Collaborative cyber defence: Merging public & private efforts
PRODAFT
Collaborative cyber defence: Merging public & private efforts
4:41
5 Reasons why Rhadamanthys will affect the cybersecurity landscape
PRODAFT
5 Reasons why Rhadamanthys will affect the cybersecurity landscape
3:22
Understanding Prometheus TDS
PRODAFT
Understanding Prometheus TDS
3:43
Ensure NIS2 compliance with BLINDSPOT (without blind spots)
PRODAFT
Ensure NIS2 compliance with BLINDSPOT (without blind spots)
4:23
The NIS2 Directive: What EU businesses need to know
PRODAFT
The NIS2 Directive: What EU businesses need to know
4:29
What is the TOR network and how does it work?
PRODAFT
What is the TOR network and how does it work?
4:05
Threat hunting VS incident response: What's the difference?
PRODAFT
Threat hunting VS incident response: What's the difference?
3:42
What should you know about cybersecurity in 2024
PRODAFT
What should you know about cybersecurity in 2024
3:58
How do you protect your online privacy?
PRODAFT
How do you protect your online privacy?
3:42
Why is ransomware still such a persistent threat?
PRODAFT
Why is ransomware still such a persistent threat?
3:56
Supply chain resilience: Would your company last?
PRODAFT
Supply chain resilience: Would your company last?
3:43
Are remote workers susceptible to cyberattacks?
PRODAFT
Are remote workers susceptible to cyberattacks?
3:50
Spoofing vs Phishing: Do You Know The Difference?
PRODAFT
Spoofing vs Phishing: Do You Know The Difference?
3:40
The Rise of Deepfakes: Can You Recognize Them?
PRODAFT
The Rise of Deepfakes: Can You Recognize Them?
4:04
How Can Cyberattacks Affect Critical Network Infrastructures?
PRODAFT
How Can Cyberattacks Affect Critical Network Infrastructures?
4:29
Cybersecurity and Global Risk: Protecting Your Organization from a Deteriorating Risk Landscape pt2
PRODAFT
Cybersecurity and Global Risk: Protecting Your Organization from a Deteriorating Risk Landscape pt2
4:11
What Is The Difference Between DDoS and DoS Attacks?
PRODAFT
What Is The Difference Between DDoS and DoS Attacks?
3:58
How Can CISOs Address the Challenges They Face?
PRODAFT
How Can CISOs Address the Challenges They Face?
4:09
Ready, Steady, Go: Traffic Lights Protocol (TLP) in Cybersecurity
PRODAFT
Ready, Steady, Go: Traffic Lights Protocol (TLP) in Cybersecurity
4:17
One Step Ahead: How To Use Threat Intelligence Efficiently?
PRODAFT
One Step Ahead: How To Use Threat Intelligence Efficiently?
4:38
AI and ML In Your Security Infrastructure: Integrating Threat Detection Systems
PRODAFT
AI and ML In Your Security Infrastructure: Integrating Threat Detection Systems
4:16
Combating Insider Threats: Detection, Prevention,  and Implementation
PRODAFT
Combating Insider Threats: Detection, Prevention, and Implementation
4:40
Your Phone Is Listening: How to Sniff Out Eavesdropping Attacks
PRODAFT
Your Phone Is Listening: How to Sniff Out Eavesdropping Attacks
4:46
The Impact of a Deteriorating Risk Landscape on Your Business
PRODAFT
The Impact of a Deteriorating Risk Landscape on Your Business
4:27
What Are The 7 Stages of a Cyberattack? Understand The Cyber Kill Chain
PRODAFT
What Are The 7 Stages of a Cyberattack? Understand The Cyber Kill Chain
5:18
10 Best Practices To Secure Your Data
PRODAFT
10 Best Practices To Secure Your Data
5:22
Can You Predict a Cyberattack? Myths And Misconceptions About Cybersecurity, Debunked
PRODAFT
Can You Predict a Cyberattack? Myths And Misconceptions About Cybersecurity, Debunked
4:05
Threat Intelligence & Risk Management: The Seemingly Odd Collaboration That Can Save Your Business
PRODAFT
Threat Intelligence & Risk Management: The Seemingly Odd Collaboration That Can Save Your Business
4:00
How to Utilise MFA So Your Passwords Are NOT Easy to Crack?
PRODAFT
How to Utilise MFA So Your Passwords Are NOT Easy to Crack?
5:03
Swiss Pavilion FIC 2023
PRODAFT
Swiss Pavilion FIC 2023
4:43
Internet of Things and Cybersecurity: How Do You Protect This Interconnected World?
PRODAFT
Internet of Things and Cybersecurity: How Do You Protect This Interconnected World?
5:13
The Reverse Side of AI:  How are Cybercriminals Using Artificial Intelligence?
PRODAFT
The Reverse Side of AI: How are Cybercriminals Using Artificial Intelligence?
5:12
Six Main Challenges Businesses Face in Risk Management & Assessment
PRODAFT
Six Main Challenges Businesses Face in Risk Management & Assessment
5:13
Seeing Through the Fog: Detecting Malicious Sites and Fake Social Media
PRODAFT
Seeing Through the Fog: Detecting Malicious Sites and Fake Social Media
4:36
Shameless Promo of PRODAFT's New Website
PRODAFT
Shameless Promo of PRODAFT's New Website
0:55
Understanding Social Engineering Techniques and Why They Are So Convincing
PRODAFT
Understanding Social Engineering Techniques and Why They Are So Convincing
5:07
Action Counts More than Intention: How to Make Threat Intelligence Actionable
PRODAFT
Action Counts More than Intention: How to Make Threat Intelligence Actionable
4:40
Common Money Laundering Practices and Cryptocurrency Uses by Cybercriminals
PRODAFT
Common Money Laundering Practices and Cryptocurrency Uses by Cybercriminals
4:47
2023 RECAP aka Cybersecurity in Numbers
PRODAFT
2023 RECAP aka Cybersecurity in Numbers
1:18
Proactive Vs. Reactive Approach to Cybersecurity
PRODAFT
Proactive Vs. Reactive Approach to Cybersecurity
5:01
What the Pandemic Taught Us about the Supply Chain Risks
PRODAFT
What the Pandemic Taught Us about the Supply Chain Risks
5:01
The Evolution of the Cybercriminal Tactics, Techniques and Procedures (TTPs)
PRODAFT
The Evolution of the Cybercriminal Tactics, Techniques and Procedures (TTPs)
4:13
Why Threat Actors’ Motivations Matter
PRODAFT
Why Threat Actors’ Motivations Matter
4:30
Why Cybercrime Groups Are Shifting Focus Towards Extortion
PRODAFT
Why Cybercrime Groups Are Shifting Focus Towards Extortion
4:14
What you Need to Know About Zero-Day and One-Day Vulnerabilities
PRODAFT
What you Need to Know About Zero-Day and One-Day Vulnerabilities
4:48
The Dark Side of Buying Tickets Online
PRODAFT
The Dark Side of Buying Tickets Online
4:57
Raven Call EP5: Utilizing The Covert Potential of Detection Engineering
PRODAFT
Raven Call EP5: Utilizing The Covert Potential of Detection Engineering
32:37
Raven Call EP4: The Intricate World of Cybercrime TTPs and Devious Affiliations
PRODAFT
Raven Call EP4: The Intricate World of Cybercrime TTPs and Devious Affiliations
35:44
PRODAFT - Teambuilding (Bouncing Castle)
PRODAFT
PRODAFT - Teambuilding (Bouncing Castle)
1:27
PRODAFT - Teambuilding (Camp)
PRODAFT
PRODAFT - Teambuilding (Camp)
1:13
PRODAFT - Team Building
PRODAFT
PRODAFT - Team Building
1:03
Raven Call EP3: Undertaking the Journey of Multiple Zero-Days
PRODAFT
Raven Call EP3: Undertaking the Journey of Multiple Zero-Days
29:07
Shorts - Raven Call: Nomadic Octopus’ Paperbug Campaign
PRODAFT
Shorts - Raven Call: Nomadic Octopus’ Paperbug Campaign
0:56
Raven Call EP2: Nomadic Octopus’ Paperbug Campaign
PRODAFT
Raven Call EP2: Nomadic Octopus’ Paperbug Campaign
27:24
Raven Call EP1: Evolution of Credential Theft & Infostealer Industry
PRODAFT
Raven Call EP1: Evolution of Credential Theft & Infostealer Industry
13:34
PTI-117 (VoipDialer): Next-generation vishing attacks are on the rise
PRODAFT
PTI-117 (VoipDialer): Next-generation vishing attacks are on the rise
3:13