19:29 How To Automate Your Vulnerability Remediation Process | PurpleSec PurpleSec 11K views - 3 years ago
46:02 Vulnerability Management Metrics: Top 10 KPIs To Measure Success PurpleSec 4.5K views - 2 years ago
18:04 7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec PurpleSec 50K views - 5 years ago
18:08 What Is Extended Detection And Response (XDR)? (Experts Explain) PurpleSec 1.6K views - 11 months ago
22:52 Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec PurpleSec 26K views - 1 year ago
1:06:31 North Korean APT ZINC Attacks Threat Researchers | Breach Report PurpleSec 284 views - 5 years ago
2:16 What Is The Vulnerability Management Lifecycle? | #PurpleSec Clips PurpleSec Clips 1.2K views - 3 years ago
41:41 Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest PurpleSec 425 views - 5 years ago
4:13 Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec PurpleSec 271 views - 3 years ago
6:11 Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec PurpleSec 514 views - 3 years ago
30:06 What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report PurpleSec 292 views - 5 years ago
28:44 3 More Vulnerabilities Found In SolarWinds Attack | Breach Report PurpleSec 311 views - 5 years ago
15:46 Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec PurpleSec 46.7K views - 5 years ago
27:54 cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest PurpleSec 584 views - 5 years ago