PurpleSec
Key Challenges In Achieving IT Infrastructure Visibility Explained
5:08
PurpleSec
How Cyber Criminals Are Shifting Their Attacks In 2025
1:40
PurpleSec
How XDR Improves Infrastructure Visibility
20:50
PurpleSec
How Defiance XDR™ Secures Small Businesses
2:00
PurpleSec
How To Evaluate XDR, MDR, And EDR Solutions
3:18
PurpleSec
Use Cases For XDR, MDR, And EDR
1:47
PurpleSec
The Main Differences Between XDR, MDR, And EDR
1:28
PurpleSec
Types Of XDR Solutions (Expert Explains)
0:45
PurpleSec
Managed Vs. Unmanaged XDR: What Should I Choose?
1:12
PurpleSec
XDR Implementation Strategies & Best Practices (2025)
2:44
PurpleSec
The Differences Between XDR And Other Security Solutions
1:43
PurpleSec
How Does XDR Work?
2:07
PurpleSec
Do Small Businesses Need XDR?
1:54
PurpleSec
Why XDR Is A Requirement For Cybersecurity In 2025
1:04
PurpleSec
Understanding Extended Detection & Response (Expert Explains)
0:35
PurpleSec
Cybersecurity Tip #10: Create Overarching Security Policies
1:45
PurpleSec
Cybersecurity Tip #9: Set Up Guest WiFi Networks
1:13
PurpleSec
Cybersecurity Tip #8: Conduct A Security Risk Assessment
4:18
PurpleSec
Cybersecurity Tip #7: Enforce Multi-Factor Authentication
2:56
PurpleSec
Cybersecurity Tip #6: Use A Password Manager
2:37
PurpleSec
Cybersecurity Tip #5: Have A Data Backup Strategy
1:33
PurpleSec
Cybersecurity Tip #4: Use Anti-Virus And Anti-Malware Software
1:18
PurpleSec
Cybersecurity Tip #3: Keep Assets Up-To-Date And Patched
2:29
PurpleSec
Cybersecurity Tip #2: Get Buy-In From Stakeholders
4:00
PurpleSec
Cybersecurity Tip #1: Understand Business Goals & Translate Cyber Risks
1:03
PurpleSec
CISO Explains What Cybersecurity Metrics & KPIs You NEED To Be Tracking
30:36
PurpleSec
XDR Vs. EDR Vs. MDR: Evaluating The Best Choice
14:40
PurpleSec
What Is Extended Detection And Response (XDR)? (Experts Explain)
18:07
PurpleSec
Is AI The Future Of Penetration Testing?
35:38
PurpleSec
10 Cybersecurity Tips For Small Businesses
30:34
PurpleSec
Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec
22:52
PurpleSec
Why You Should Learn AI In Cybersecurity
36:34
PurpleSec
How LLMs Are Being Exploited
28:00
PurpleSec
The Value Of A vCISO For Small Business
43:31
PurpleSec
Vulnerability Management Metrics: Top 10 KPIs To Measure Success
46:02
PurpleSec
Vulnerability Management SOP: Expert Reveals Top Tips
39:05
PurpleSec
Top 10 Vulnerability Management Trends For 2025
1:00:52
PurpleSec
Techniques To Improve Vulnerability Visibility & Detection
42:29
PurpleSec
Risk-Based Vulnerability Management
28:42
PurpleSec
How To Build A Vulnerability Management Program | #PurpleSec
14:27
PurpleSec
How To Automate Your Vulnerability Remediation Process | PurpleSec
19:29
PurpleSec
Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec
4:34
PurpleSec
What Is Vulnerability Management? (Explained By Experts)
16:39
PurpleSec
Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec
4:54
PurpleSec
PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec
5:19
PurpleSec
Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec
4:13
PurpleSec
Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec
6:11
PurpleSec
Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec
5:07
PurpleSec
Why Is Social Engineering Effective? (Expert Explains)
39:50
PurpleSec
Saudi Aramco $50 Million Data Breach Explained | Breach Report
16:41
PurpleSec
Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report
29:38
PurpleSec
Are Cyber Criminals Coming After Your Video Games? | PurpleSec
14:04
PurpleSec
JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec
39:12
PurpleSec
Is Your Employer Spying On You To Protect Themselves? | PurpleSec
31:30
PurpleSec
Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec
24:21
PurpleSec
Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec
24:03
PurpleSec
Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report
59:56
PurpleSec
Accellion Breach Continues Compromising Top University Security | Breach Report
1:03:12
PurpleSec
Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report
51:52
PurpleSec
Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report
57:16
PurpleSec
Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report
47:50
PurpleSec
What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec
29:36
PurpleSec
New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report
42:53
PurpleSec
Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report
34:51
PurpleSec
The 3 Types Of Security Controls (Expert Explains) | PurpleSec
20:19
PurpleSec
Accellion Data Breach: What We Know So Far | Breach Report
54:44
PurpleSec
3 More Vulnerabilities Found In SolarWinds Attack | Breach Report
28:44
PurpleSec
10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec
22:19
PurpleSec
North Korean APT ZINC Attacks Threat Researchers | Breach Report
1:06:31
PurpleSec
SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report
41:16
PurpleSec
What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report
30:06
PurpleSec
Preventing The SolarWinds Supply Chain Attack Using Zero Trust? | Weekly Ingest
45:32
PurpleSec
Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest
20:08
PurpleSec
Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report
21:58
PurpleSec
cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest
27:54
PurpleSec
Advanced Persistent Threat (APT) Groups | Weekly Ingest
56:48
PurpleSec
Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest
41:41
PurpleSec
7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec
18:04
PurpleSec
What Are The Types Of Penetration Testing? | PurpleSec
17:14
PurpleSec
Common Types Of Network Security Vulnerabilities | PurpleSec
21:24
PurpleSec
Red Team VS Blue Team: What’s The Difference? | PurpleSec
12:16
PurpleSec
Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec
15:46
PurpleSec
Our Cyber Security Experts | Purplesec
2:06
PurpleSec
How Often Should You Perform A Network Vulnerability Scan? | PurpleSec
5:19