43:22 "Jurassic Park: A Tale of Risk Policy And Governance" with James Bore Digital Overdose 170 views - 3 years ago
23:25 The Crabby Hacker - Mind the Gap: Understanding What Your Security Control Framework Covers & Misses Digital Overdose 82 views - 3 years ago
27:06 Peter Luo - Automate Security Operations With Node-RED Digital Overdose 305 views - 3 years ago
18:07 Alexandru Lazar - Helping Humanitarian NGO's: Perspectives from the CyberPeace Builders Program Digital Overdose 67 views - 3 years ago
13:39 Danielle Arcon - Grey(hat)'s Anatomy: Common grounds of body immunity and cybersecurity Digital Overdose 83 views - 3 years ago
41:29 Abigail Simmons & Chloe - Commentaries on the security industry, hosted by James Bore ft. Brambles Digital Overdose 77 views - 3 years ago
28:50 Tori Outlaw - Cryptology: Pre Tech Era (a short history) Digital Overdose 179 views - 3 years ago
21:39 AlienX - How I hacked our college as my first internal testing experience Digital Overdose 37 views - 3 years ago
30:18 Daniel Oates-Lee - SMBeagle: Our free and open-source SMB file share auditing tool Digital Overdose 363 views - 3 years ago
28:27 Chris Meistre - Red Teaming: My first physical assessment Digital Overdose 96 views - 3 years ago
34:02 Patrick Rus - Leveraging Telegram Bots to automate country specific OSINT Workflows Digital Overdose 589 views - 3 years ago
35:19 Ahmed Rashwan / rsasec0x01 - Offensive Security: Welcome To The Dark Side Digital Overdose 163 views - 3 years ago
29:32 Squiblydoo - From Novice to Noticed: A malware analyst's observations... Digital Overdose 231 views - 3 years ago
1:19:21 F.U.D. and Cybersecurity: Retrospection and Introspection - @AtomicNicos Digital Overdose 58 views - 4 years ago
42:37 Gary Hawkins - "My Pathway in Security / AMA" Episode 2 Digital Overdose 59 views - 4 years ago
43:47 Python: Usage for data retrieval and data analysis with [REDACTED] Digital Overdose 16 views - 4 years ago
38:06 Git - Collaborative work, without DRIVE-ing you mad with [REDACTED] Digital Overdose 18 views - 4 years ago
1:25:26 Active Directory: The Main Services with James Bore (@Coffee_Fueled) Digital Overdose 97 views - 4 years ago
1:06:19 OSINT Fundamental Methodology and Demo - AtomicNicos @DigitalOverdose Digital Overdose 185 views - 4 years ago
29:26 Systematic OSINT and the OSINTFUNdamentals - BOsintBlanc Digital Overdose 230 views - 5 years ago
33:22 Parting ways with Purdue? The Effect of Industry 4.0 on ICS Security Architectures- Michael McGinley Digital Overdose 57 views - 5 years ago
28:46 All Your Modules Are Belong To Us - An Introduction to Python Module Hijacking - Sam Ferguson Digital Overdose 47 views - 5 years ago
32:17 Preparing for the OSCP Without Any PenTesting Experience - Drew Jones Digital Overdose 2.3K views - 5 years ago
27:16 Capabilities: That one vulnerability vector you don't realize exists - 3t3rn4l P4r4d0x Digital Overdose 217 views - 5 years ago
26:32 0-Days & Nat 20's - CVSSv3 Through the Lens of Dungeons & Dragons - Alex Hoffman / RedWedgeX Digital Overdose 75 views - 5 years ago
29:40 Smart phone to medical device in five (not so) easy steps - Josephine Windsor-Lewis Digital Overdose 93 views - 5 years ago
18:05 Application Logic Vulnerabilities and My Journey - Suryansh M. / 0xd4rk Digital Overdose 155 views - 5 years ago
31:49 "Moving forward in cybersecurity", with Vivian Band, Juan Spinel, Elizabeth Momola and James Bore Digital Overdose 76 views - 5 years ago
29:04 A.I. - The Inevitable Threat - Luna Belfort & Alvaro Leno Digital Overdose 66 views - 5 years ago