Key Challenges In Achieving IT Infrastructure Visibility Explained
PurpleSec
Key Challenges In Achieving IT Infrastructure Visibility Explained
5:08
How Cyber Criminals Are Shifting Their Attacks In 2025
PurpleSec
How Cyber Criminals Are Shifting Their Attacks In 2025
1:40
How XDR Improves Infrastructure Visibility
PurpleSec
How XDR Improves Infrastructure Visibility
20:50
How Defiance XDR™ Secures Small Businesses
PurpleSec
How Defiance XDR™ Secures Small Businesses
2:00
How To Evaluate XDR, MDR, And EDR Solutions
PurpleSec
How To Evaluate XDR, MDR, And EDR Solutions
3:18
Use Cases For XDR, MDR, And EDR
PurpleSec
Use Cases For XDR, MDR, And EDR
1:47
The Main Differences Between XDR, MDR, And EDR
PurpleSec
The Main Differences Between XDR, MDR, And EDR
1:28
Types Of XDR Solutions (Expert Explains)
PurpleSec
Types Of XDR Solutions (Expert Explains)
0:45
Managed Vs. Unmanaged XDR: What Should I Choose?
PurpleSec
Managed Vs. Unmanaged XDR: What Should I Choose?
1:12
XDR Implementation Strategies & Best Practices (2025)
PurpleSec
XDR Implementation Strategies & Best Practices (2025)
2:44
The Differences Between XDR And Other Security Solutions
PurpleSec
The Differences Between XDR And Other Security Solutions
1:43
How Does XDR Work?
PurpleSec
How Does XDR Work?
2:07
Do Small Businesses Need XDR?​
PurpleSec
Do Small Businesses Need XDR?​
1:54
Why XDR Is A Requirement For Cybersecurity In 2025
PurpleSec
Why XDR Is A Requirement For Cybersecurity In 2025
1:04
Understanding Extended Detection & Response (Expert Explains)
PurpleSec
Understanding Extended Detection & Response (Expert Explains)
0:35
Cybersecurity Tip #10: Create Overarching Security Policies
PurpleSec
Cybersecurity Tip #10: Create Overarching Security Policies
1:45
Cybersecurity Tip #9: Set Up Guest WiFi Networks
PurpleSec
Cybersecurity Tip #9: Set Up Guest WiFi Networks
1:13
Cybersecurity Tip #8: Conduct A Security Risk Assessment
PurpleSec
Cybersecurity Tip #8: Conduct A Security Risk Assessment
4:18
Cybersecurity Tip #7: Enforce Multi-Factor Authentication
PurpleSec
Cybersecurity Tip #7: Enforce Multi-Factor Authentication
2:56
Cybersecurity Tip #6: Use A Password Manager
PurpleSec
Cybersecurity Tip #6: Use A Password Manager
2:37
Cybersecurity Tip #5: Have A Data Backup Strategy​
PurpleSec
Cybersecurity Tip #5: Have A Data Backup Strategy​
1:33
Cybersecurity Tip #4: Use Anti-Virus And Anti-Malware Software
PurpleSec
Cybersecurity Tip #4: Use Anti-Virus And Anti-Malware Software
1:18
Cybersecurity Tip #3: Keep Assets Up-To-Date And Patched
PurpleSec
Cybersecurity Tip #3: Keep Assets Up-To-Date And Patched
2:29
Cybersecurity Tip #2: Get Buy-In From Stakeholders
PurpleSec
Cybersecurity Tip #2: Get Buy-In From Stakeholders
4:00
Cybersecurity Tip #1: Understand Business Goals & Translate Cyber Risks
PurpleSec
Cybersecurity Tip #1: Understand Business Goals & Translate Cyber Risks
1:03
CISO Explains What Cybersecurity Metrics & KPIs You NEED To Be Tracking
PurpleSec
CISO Explains What Cybersecurity Metrics & KPIs You NEED To Be Tracking
30:36
XDR Vs. EDR Vs. MDR: Evaluating The Best Choice
PurpleSec
XDR Vs. EDR Vs. MDR: Evaluating The Best Choice
14:40
What Is Extended Detection And Response (XDR)? (Experts Explain)
PurpleSec
What Is Extended Detection And Response (XDR)? (Experts Explain)
18:07
Is AI The Future Of Penetration Testing?
PurpleSec
Is AI The Future Of Penetration Testing?
35:38
10 Cybersecurity Tips For Small Businesses
PurpleSec
10 Cybersecurity Tips For Small Businesses
30:34
Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec
PurpleSec
Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec
22:52
Why You Should Learn AI In Cybersecurity
PurpleSec
Why You Should Learn AI In Cybersecurity
36:34
How LLMs Are Being Exploited
PurpleSec
How LLMs Are Being Exploited
28:00
The Value Of A vCISO For Small Business
PurpleSec
The Value Of A vCISO For Small Business
43:31
Vulnerability Management Metrics: Top 10 KPIs To Measure Success
PurpleSec
Vulnerability Management Metrics: Top 10 KPIs To Measure Success
46:02
Vulnerability Management SOP: Expert Reveals Top Tips
PurpleSec
Vulnerability Management SOP: Expert Reveals Top Tips
39:05
Top 10 Vulnerability Management Trends For 2025
PurpleSec
Top 10 Vulnerability Management Trends For 2025
1:00:52
Techniques To Improve Vulnerability Visibility & Detection
PurpleSec
Techniques To Improve Vulnerability Visibility & Detection
42:29
Risk-Based Vulnerability Management
PurpleSec
Risk-Based Vulnerability Management
28:42
How To Build A Vulnerability Management Program | #PurpleSec
PurpleSec
How To Build A Vulnerability Management Program | #PurpleSec
14:27
How To Automate Your Vulnerability Remediation Process | PurpleSec
PurpleSec
How To Automate Your Vulnerability Remediation Process | PurpleSec
19:29
Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec
PurpleSec
Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec
4:34
What Is Vulnerability Management? (Explained By Experts)
PurpleSec
What Is Vulnerability Management? (Explained By Experts)
16:39
Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec
PurpleSec
Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec
4:54
PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec
PurpleSec
PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec
5:19
Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec
PurpleSec
Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec
4:13
Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec
PurpleSec
Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec
6:11
Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec
PurpleSec
Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec
5:07
Why Is Social Engineering Effective? (Expert Explains)
PurpleSec
Why Is Social Engineering Effective? (Expert Explains)
39:50
Saudi Aramco $50 Million Data Breach Explained | Breach Report
PurpleSec
Saudi Aramco $50 Million Data Breach Explained | Breach Report
16:41
Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report
PurpleSec
Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report
29:38
Are Cyber Criminals Coming After Your Video Games? | PurpleSec
PurpleSec
Are Cyber Criminals Coming After Your Video Games? | PurpleSec
14:04
JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec
PurpleSec
JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec
39:12
Is Your Employer Spying On You To Protect Themselves? | PurpleSec
PurpleSec
Is Your Employer Spying On You To Protect Themselves? | PurpleSec
31:30
Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec
PurpleSec
Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec
24:21
Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec
PurpleSec
Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec
24:03
Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report
PurpleSec
Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report
59:56
Accellion Breach Continues Compromising Top University Security | Breach Report
PurpleSec
Accellion Breach Continues Compromising Top University Security | Breach Report
1:03:12
Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report
PurpleSec
Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report
51:52
Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report
PurpleSec
Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report
57:16
Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report
PurpleSec
Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report
47:50
What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec
PurpleSec
What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec
29:36
New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report
PurpleSec
New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report
42:53
Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report
PurpleSec
Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report
34:51
The 3 Types Of Security Controls (Expert Explains) | PurpleSec
PurpleSec
The 3 Types Of Security Controls (Expert Explains) | PurpleSec
20:19
Accellion Data Breach: What We Know So Far | Breach Report
PurpleSec
Accellion Data Breach: What We Know So Far | Breach Report
54:44
3 More Vulnerabilities Found In SolarWinds Attack | Breach Report
PurpleSec
3 More Vulnerabilities Found In SolarWinds Attack | Breach Report
28:44
10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec
PurpleSec
10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec
22:19
North Korean APT ZINC Attacks Threat Researchers | Breach Report
PurpleSec
North Korean APT ZINC Attacks Threat Researchers | Breach Report
1:06:31
SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report
PurpleSec
SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report
41:16
What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report
PurpleSec
What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report
30:06
Preventing The SolarWinds Supply Chain Attack Using Zero Trust?  | Weekly Ingest
PurpleSec
Preventing The SolarWinds Supply Chain Attack Using Zero Trust? | Weekly Ingest
45:32
Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest
PurpleSec
Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest
20:08
Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report
PurpleSec
Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report
21:58
cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest
PurpleSec
cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest
27:54
Advanced Persistent Threat (APT) Groups | Weekly Ingest
PurpleSec
Advanced Persistent Threat (APT) Groups | Weekly Ingest
56:48
Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest
PurpleSec
Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest
41:41
7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec
PurpleSec
7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec
18:04
What Are The Types Of Penetration Testing? | PurpleSec
PurpleSec
What Are The Types Of Penetration Testing? | PurpleSec
17:14
Common Types Of Network Security Vulnerabilities | PurpleSec
PurpleSec
Common Types Of Network Security Vulnerabilities | PurpleSec
21:24
Red Team VS Blue Team: What’s The Difference? | PurpleSec
PurpleSec
Red Team VS Blue Team: What’s The Difference? | PurpleSec
12:16
Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec
PurpleSec
Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec
15:46
Our Cyber Security Experts | Purplesec
PurpleSec
Our Cyber Security Experts | Purplesec
2:06
How Often Should You Perform A Network Vulnerability Scan? | PurpleSec
PurpleSec
How Often Should You Perform A Network Vulnerability Scan? | PurpleSec
5:19