Channel Avatar

Phoenix Security @[email protected]

4.4K subscribers - no pronouns :c

This channel is focused on promoting application security kn


01:54
Lockheed Martin's Cyber Threat Intel: Know Your Enemy
06:02
#NVD #CVE Crisis: Current Status and Future Outlook #cybersecurity #vulnerabilitymanagement
05:11
Revolutionizing Vulnerability Management: Francesco Cipollone’s AI Threat-Centric Approach 🔍
00:38
Vulnerability on Kubernetes Hack: 6500 Clusters at Risk!
15:07
Vulnerability CVE-2025-1974 IngressNightmare: Patch Now or Face RCE in Your Kubernetes Cluster
00:37
GitHub Hack: Millions of Repositories at Risk!
01:47
GitHub Hack: How Attackers REALLY Did It
00:32
Software Supply Chain: Security Risks Exposed
01:08
GitHub Actions Hacked? No...Just TJAction
00:43
GitHub Hack: How Attackers REALLY Got In!
00:43
GitHub Action Hack: How Attackers REALLY Got In!
00:43
GitHub Hack: How Attackers REALLY Got In!
26:25
TJ-Action Compromise: Uncovering the Massive GitHub Actions Supply Chain Attack All you need to know
18:41
Is Risk-Based #vulnerabilitymanagement Worth the Hype in Modern Cloud deployments? #aspm
04:21
Cybersecurity Leader: Balancing Work, Family, and Fitness
02:59
Exploiting Software Vulnerabilities: RCE & Memory Corruption
03:48
Log4j Vulnerability: Root Cause Analysis with AI
03:54
Why Log4j Was More Than Just a Cybersecurity Incident and is still hard to find?
02:34
Why Log4j is the Worst Cybersecurity Incident Ever a root cause analysis
34:59
Patch Fatigue: The Unseen Cyber Crisis in Application Security and Vulnerability Managment !
06:12
Elevate #vulnerabilitymanagement: Phoenix Security’s Blast Radius & Business Unit Impact #copilot 🔍
04:04
How Cybersecurity Exploits ACTUALLY Work - appsec to cloudsec why vulnerabilities keep on winning
01:53
Unlocking Network Security: The Evolution of Scanning Techniques
04:07
Solve Cloud Security Challenges: Lineage, Attribution & Reachability
01:34
Stop Vulnerability Burnout: A 4D Risk Formula
02:58
NVD's HUGE Backlog: Vulnerability Crisis Explained
01:15
Unused Libraries? Delete them NOW!
01:38
Solve App Security: Lineage & Attribution
04:42
Solve Code Ownership & Security Challenges
03:44
Ultimate Guide to Modern Cloud Security
02:47
EU vs. US: AI Regulation Showdown
03:16
Compliance vs Security: Finding the Middle Ground
03:41
Container Security: From Reactive to Proactive
09:43
Master #applicationsecurity in #Cloud native #vulnerabilitymanagement - Reachability Analysis ASPM
01:18
Unlocking Modern Scanning Secrets for Code Safety!
01:53
Unlocking Network Security: The Evolution of Scanning Techniques
01:30
Mastering Vulnerability Scans: Insights from Snyk and Trivy
01:27
Uncovering Vulnerabilities: The Power of Container Scanning!
01:00
Prioritizing CVEs: Runtime vs Code Vulnerabilities Explained! The power of Reachability Analysis
01:36
Reachability Analysis: Less Intrusive, More Flexible
01:21
Prioritize Vulnerabilities: Stop the Security Mess!
03:17
Stop Reacting, Start Preventing: Proactive Security
01:38
DevOps FAILED? Bridging Security Communication Gaps
02:16
AI Simplifies #Cybersecurity: focus on #Vulnerabilities leveraging a Threat Centric approach
02:19
Why Are #Software #Vulnerabilities Exploding?
02:23
AI Solves Age-Old Security Root Cause Problems
01:15
Software Supply Chain Security: Solved?
03:56
#CyberWalk EP5 Understanding Traceability and recheability analysis #ASPM #applicationsecurity
03:53
#CyberWalk EP4 #DemystifyingReachability #CyberSecurityTalks #aspm #application security
00:30
Unleash Your Passion: Designing with Excitement
00:35
Unlocking Success: The Power of Asset Inventory Systems
01:01
Harnessing the Power of Storytelling in Leadership
01:28
Boost Security with the 2-Way Communication Model
02:28
Boosting Product Quality: The Key to Leadership Support
00:30
Unleash Your Passion: Designing with Excitement
00:51
Transforming Application Security: The Role of Champions
02:49
Unlocking the Power of Rewards: Status, Access, and More
03:09
TOP #Exploited #Vulnerabilities in 2023/24 #CISA Vulnerabilities Analysis! 🚨 Must Know Insights! 📊
02:33
Unlocking #Reachability: Navigating Software and Network Complexity with #prioritization
04:31
Mastering #Container #Security: Effective #Patching Strategies focusing on version #cybersecurity