Channel Avatar

Cytix @UCW696ZNBA3ByUltAAwcJ1nQ@youtube.com

43 subscribers - no pronouns :c

Integrate security testing into your workflow Cytix is an A


16:07
LTST Season 2 Ep 4 - Micro Pen-Testing: When Less is More in Cybersecurity
19:28
LTST Season 2 Ep. 3 - Breaking Down Threat Modeling in Security Testing: A Cybersecurity Essential
27:48
LTST Season 2 Ep 2 - What Security Can Learn From Quality Control
12:50
LTST Season 2 Ep.1 - Enhancing Pentesting Effectiveness with Jira Tickets
16:55
Vulnerability Deep Dive: Access Control Issues
15:23
Depth vs Coverage in Security Testing
24:13
Vulnerability Deep Dive: Business Logic Flaws
17:52
How to Build an Internal Security Testing Team
01:06
Prioritising Speed to Detection Over Vulnerability Volume
25:13
Where Do Vulnerabilities Come From?
17:26
Why Context Matters In Security Testing
01:12
💡 How to Security Test Different Assets.
25:50
How To Run An Enterprise Security Testing Programme
26:33
A Cyber Security Engineer and A Vendor Meet in A Podcast Studio
01:03
💡 LLMs in Cyber Security Testing
01:13
How To Safely Use LLMs in Cyber Security Testing
25:07
The Role of LLMs in Security Testing
01:03
💡 Why are LLMs so polarised in security testing?
25:27
How To Scale A Security Testing Programme
34:19
Webinar: The Role of LLMs in Security Testing
01:33
Are You Setting up Your Pentester for Success or Wasted Time?
27:56
How to Get the Full Value Out of Your Human Security Testing
30:45
Automated Security Testing - Benefits & Limitations
01:26
What to Consider When Choosing Automated Testing Tools
02:32
Is a Bug Bounty Programme Continuous Testing?
29:10
The Need for Continuous Security Testing
02:33
How Do We Repair the Relationship Between Developers and Pentesters?
01:34
Security Testing Tools vs Humans - What Can We Do Better?
01:50
Is the role of a Pentester changing?
03:30
The Big CISO Shoot 2024
02:06
How Can Penetration Testing Be Made Better
02:00
How Can Additional Context Make Penetration Testing More Effective?
01:21
Calculate ROI on Security Testing
01:11
How do you understand performance over time? | Cytix
01:03
How to work out MTTD (Mean Time to Detection)? | Cytix
01:05
Will there come a day where there are 0 vulnerabilities to find? | Cytix
01:07
How do you work out MTTR (Mean Time to Response)? | Cytix
01:25
What metrics are important? | Cytix
01:38
How to make dynamic testing work for DevOps teams | Cytix
01:24
Are there too many tools? | Cytix
35:05
Real Cyber Talk with Cytix | Saskia Coplans & Daniel Smart | SE1 EP7
31:01
Real Cyber Talk with Cytix | Mike Koss- CISO at RTGS.global | SE1 EP6
01:14
Is the UK falling behind internationally? | Cytix
02:13
With all the tools people have at their disposal, why do issues still get through? | Cytix
32:29
Real Cyber Talk with Cytix | James Bore- Cyber Security Expert | SE1 EP5
00:46
The Big CISO Shoot- Register Now! | Cytix
33:43
Real Cyber Talk with Cytix | Matt Summers- Head of Security | SE1, EP4
01:45
How are companies addressing their vulnerability backlogs? | Cytix
34:11
Real Cyber Talk with Chris Hodson | SE1, EP1 | Cytix
01:22
Where do vulnerabilities come from? | Cytix
01:41
How do you draw the line between Automation and Manual? | Cytix
29:53
Real Cyber Talk with Cytix | Andy Ash- CISO at Netacea | SE1 EP3
01:20
What feeds of information are crucial to an effective security testing programme? | Cytix
01:28
What is security posture management? | Cytix
02:18
How can we leverage LLM's to aid vulnerability management? | Cytix
02:04
What are the problems with continuous testing in its current state? | Cytix
01:30
Is there value in understanding the history behind a vulnerability? | Cytix
42:38
Real Cyber Talk with Cytix | Stuart Coulson- Cyber Ecosystem Project Manager | SE1 EP2
01:14
Should False Positives still exist in 2023? | Cytix
03:43
Is SAST the answer? | The Pros and Cons of using SAST