26:52 Unveiling the Unseen: A Responsible Approach to Web Vulnerability Disclosure Access42 Cybersecurity 99 views - 9 months ago
19:38 Handling the Modern-Day Attacker with a Defensive Layered Approach (SOC) Access42 Cybersecurity 56 views - 9 months ago
28:19 The Overlooked Threat: Why Mobile Devices Are Your Weakest Link Access42 Cybersecurity 94 views - 9 months ago
37:55 Stronger together, building the future of cyber resilience Access42 Cybersecurity 48 views - 9 months ago
20:12 Cybersecurity Summit 2025: The Perimeter Has Shifted – Cyber Resilience in a Borderless World Access42 Cybersecurity 53 views - 9 months ago
37:36 Hunting mobile threats: Insights, Trends and Mitigation Strategies - Sascha Spangenberg (Lookout) Access42 Cybersecurity 44 views - 1 year ago
34:54 Identity has become the new ‘zero day’ vulnerability - Stijn Rommens (Vectra) Access42 Cybersecurity 236 views - 1 year ago
30:35 CrowdStrike 2024 Global Threat Report: The Year of Stealth - Issam Aouad Tabet (CrowdStrike) Access42 Cybersecurity 211 views - 1 year ago
33:47 API Posture Governance, van strategie naar uitvoering - Martijn Bosschaart (SALT) Access42 Cybersecurity 72 views - 1 year ago
28:41 Hunters Fireside Chat – The Role Of AI In The Modern SOC Access42 Cybersecurity 198 views - 1 year ago
52:05 Contextualising Vulnerabilities with Identity and Threat - Gavin Millard (Tenable) Access42 Cybersecurity 97 views - 1 year ago
37:06 Cybercriminals are leading the innovation race by Ronald Kingma (Access42) Access42 Cybersecurity 109 views - 2 years ago
35:42 How to safeguard against Phishing and Business E-Mail Compromise by Sander Hofman (Mimecast) Access42 Cybersecurity 60 views - 2 years ago
34:52 Protecting your Linux environment through Identity Consolidation by Patrick van der Veen (Delinea) Access42 Cybersecurity 32 views - 2 years ago
27:50 Cyberattacks are not an act of black magic! - by Marcel Kosters (Vectra) Access42 Cybersecurity 25 views - 2 years ago
31:23 The PAM Maturity Model, A step-by-step framework for reducing risk by Patrick van der Veen (Delinea) Access42 Cybersecurity 246 views - 2 years ago
46:07 The Jay-Z Rule: A Blueprint for Preemptive Security by Gavin Millard (Tenable) Access42 Cybersecurity 217 views - 2 years ago
17:37 Access42 Cybersecurity Raw & Uncut - Voorspelling 2023 Access42 Cybersecurity 80 views - 3 years ago
15:27 Access42 en Vectra over Netwerk Detectie & Response Access42 Cybersecurity 75 views - 3 years ago
22:12 Cofense - How to Combine AI and Human Intelligence for Optimal Phishing Defense Access42 Cybersecurity 52 views - 4 years ago
15:38 Mimecast - Eén cyberaanval is genoeg om het vertrouwen en klandizie van de consument te verliezen Access42 Cybersecurity 14 views - 4 years ago
55:30 Risk Based Vulnerability Management - Access42 and Tenable Access42 Cybersecurity 42 views - 6 years ago