www.youtube.com Open in urlscan Pro
2a00:1450:4001:828::200e  Public Scan

Submitted URL: https://csk7r04.na1.hs-sales-engage.com/Ctc/DM+23284/cSK7R04/Jl22-6qcW7lCdLW6lZ3lKW8Vk7M52S7bWHW721ncF9brR9FW23FQqs2lYPd0W7J-lr16D3jGTW8...
Effective URL: https://www.youtube.com/watch?si=W-6zD1LQUZcnVnUl&v=EerwN2o9SyQ&feature=youtu.be
Submission Tags: falconsandbox
Submission: On September 11 via api from US — Scanned from GB

Form analysis 1 forms found in the DOM

/results

<form id="search-form" action="/results" class="style-scope ytd-searchbox">
  <div id="container" class="style-scope ytd-searchbox">
    <yt-icon id="search-icon" class="style-scope ytd-searchbox"><!--css-build:shady--><!--css-build:shady--><span class="yt-icon-shape yt-spec-icon-shape">
        <div style="width: 100%; height: 100%; display: block; fill: currentcolor;"><svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" height="24" viewBox="0 0 24 24" width="24" focusable="false" aria-hidden="true"
            style="pointer-events: none; display: inherit; width: 100%; height: 100%;">
            <path clip-rule="evenodd" d="M16.296 16.996a8 8 0 11.707-.708l3.909 3.91-.707.707-3.909-3.909zM18 11a7 7 0 00-14 0 7 7 0 1014 0z" fill-rule="evenodd"></path>
          </svg></div>
      </span></yt-icon>
    <div id="search-input" class="ytd-searchbox-spt" slot="search-input"><input id="search" autocapitalize="none" autocomplete="off" autocorrect="off" name="search_query" tabindex="0" type="text" spellcheck="false" placeholder="Search"
        aria-label="Search"></div>
    <div id="search-clear-button" class="style-scope ytd-searchbox" hidden=""><ytd-button-renderer class="style-scope ytd-searchbox" button-renderer="" button-next=""><!--css-build:shady--><yt-button-shape><button
            class="yt-spec-button-shape-next yt-spec-button-shape-next--text yt-spec-button-shape-next--mono yt-spec-button-shape-next--size-m yt-spec-button-shape-next--icon-only-default" aria-label="Clear search query" title="" style="">
            <div class="yt-spec-button-shape-next__icon" aria-hidden="true"><yt-icon style="width: 24px; height: 24px;"><!--css-build:shady--><!--css-build:shady--><span class="yt-icon-shape yt-spec-icon-shape">
                  <div style="width: 100%; height: 100%; display: block; fill: currentcolor;"><svg xmlns="http://www.w3.org/2000/svg" enable-background="new 0 0 24 24" height="24" viewBox="0 0 24 24" width="24" focusable="false" aria-hidden="true"
                      style="pointer-events: none; display: inherit; width: 100%; height: 100%;">
                      <path d="m12.71 12 8.15 8.15-.71.71L12 12.71l-8.15 8.15-.71-.71L11.29 12 3.15 3.85l.71-.71L12 11.29l8.15-8.15.71.71L12.71 12z"></path>
                    </svg></div>
                </span></yt-icon></div><yt-touch-feedback-shape style="border-radius: inherit;">
              <div class="yt-spec-touch-feedback-shape yt-spec-touch-feedback-shape--touch-response" aria-hidden="true">
                <div class="yt-spec-touch-feedback-shape__stroke" style=""></div>
                <div class="yt-spec-touch-feedback-shape__fill" style=""></div>
              </div>
            </yt-touch-feedback-shape>
          </button></yt-button-shape><tp-yt-paper-tooltip offset="8" disable-upgrade=""></tp-yt-paper-tooltip></ytd-button-renderer></div>
  </div>
  <div id="search-container" class="ytd-searchbox-spt" slot="search-container"></div>
</form>

Text Content

•


NaN / NaN













•



NaN / NaN










Back





GB
Skip navigation

Search
Search



Sign in



GB






How To Do Application Security Right

Search

Watch Later

Share

Copy link

Info

Shopping


Tap to unmute

2x



If playback doesn't begin shortly, try restarting your device.









•

You're signed out
Videos that you watch may be added to the TV's watch history and influence TV
recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm

Up next

Live
Upcoming


CancelPlay now


Independent Security Evaluators

Subscribe

Subscribed
Your technology solves problems through innovation. Security is a
differentiator, and it matters to your customers: unless you give them
assurance, they hesitate to buy. However, building security into the design
process is challenging. Finding unknown security vulnerabilities is both crucial
and complex. To do these right, it requires experts who have spent years
acquiring specialized skills. When companies need to solve these problems — and
achieve a competitive edge — they hire Independent Security Evaluators (ISE).
We're ethical hackers, computer scientists, reverse engineers, cryptographers,
software developers, penetration testers, and security consultants. We’ve hacked
cars, phones, and medical devices and published research on all of it. From
finding vulnerabilities to solving complex design problems, we’ve helped
hundreds of companies including Google, Netflix, Amazon, and Microsoft. As a
result, each of them achieved their mission.

How to Turn a Router Into Part of a Botnet (Livestream)
1:34:59
The Blockchain Bandit: Finding Over 700 Active Private Keys On Ethereum's
Blockchain
6:06


Share
Include playlist


An error occurred while retrieving sharing information. Please try again later.



0:00






0:00 / 3:47•Watch full videoLive
•


•


Scroll for details




HOW TO DO APPLICATION SECURITY RIGHT

Independent Security Evaluators
Independent Security Evaluators
528 subscribers



<__slot-el>
Subscribe



<__slot-el>
Subscribed



24




Share

Download

Download

Save








1.9K views 4 years ago
1,971 views • Premiered on 13 May 2020

Show less
You need to prove that your app is secure, so you need vulnerability
assessments, penetration testing, ethical hacking, source code review or some
other type of security assessment. You need to find & fix security
vulnerabilities. If you do it right, you can reduce risk and remove security as
a blocker to sales. The way to tackle all of these is by achieving security
excellence. Here’s how we help you do exactly that. …...more
...more
KEY MOMENTS

VIEW ALL





EXPLOITABLE VULNERABILITIES IN IPHONE

EXPLOITABLE VULNERABILITIES IN IPHONE

0:33

EXPLOITABLE VULNERABILITIES IN IPHONE

0:33




ASSESS SECURITY BEYOND PENETRATION TESTING

ASSESS SECURITY BEYOND PENETRATION TESTING

0:52

ASSESS SECURITY BEYOND PENETRATION TESTING

0:52




REMEDIATE A COLLABORATIVE PROCESS

REMEDIATE A COLLABORATIVE PROCESS

1:29

REMEDIATE A COLLABORATIVE PROCESS

1:29




Transcript

Follow along using the transcript.

Show transcript



INDEPENDENT SECURITY EVALUATORS

528 subscribers
Videos

About

Videos


About





Show less









HOW TO DO APPLICATION SECURITY RIGHT

1,971 views1.9K views
Premiered on 13 May 2020

24




Share

Download

Download

Save














0 COMMENTS

Sort comments
Sort by
Top comments

Newest first






Add a comment…












COMMENTS




Top comments

Newest first











KEY MOMENTS








EXPLOITABLE VULNERABILITIES IN IPHONE

EXPLOITABLE VULNERABILITIES IN IPHONE

0:33

EXPLOITABLE VULNERABILITIES IN IPHONE

0:33




ASSESS SECURITY BEYOND PENETRATION TESTING

ASSESS SECURITY BEYOND PENETRATION TESTING

0:52

ASSESS SECURITY BEYOND PENETRATION TESTING

0:52




REMEDIATE A COLLABORATIVE PROCESS

REMEDIATE A COLLABORATIVE PROCESS

1:29

REMEDIATE A COLLABORATIVE PROCESS

1:29


Sync to video time
Sync to video time




DESCRIPTION







How To Do Application Security Right

You need to prove that your app is secure, so you need vulnerability
assessments, penetration testing, ethical hacking, source code review or some
other type of security assessment. You need to find & fix security
vulnerabilities. If you do it right, you can reduce risk and remove security as
a blocker to sales. The way to tackle all of these is by achieving security
excellence. Here’s how we help you do exactly that. https://www.ise.io/
  / isesecurity  
Show less ...more
You need to prove that your app is secure, so you need vulnerability
assessments, penetration testing, ethical hacking, source code review or some
other type of security assessment. You need to find & fix security
vulnerabilities. If you do it right, you can reduce risk and remove security as
a blocker to sales. The way to tackle all of these is by achieving security
excellence. Here’s how we help you do exactly that. https://www.ise.io/
  / isesecurity   …...more
...moreShow less

KEY MOMENTS

VIEW ALL





EXPLOITABLE VULNERABILITIES IN IPHONE

EXPLOITABLE VULNERABILITIES IN IPHONE

0:33

EXPLOITABLE VULNERABILITIES IN IPHONE

0:33




ASSESS SECURITY BEYOND PENETRATION TESTING

ASSESS SECURITY BEYOND PENETRATION TESTING

0:52

ASSESS SECURITY BEYOND PENETRATION TESTING

0:52




REMEDIATE A COLLABORATIVE PROCESS

REMEDIATE A COLLABORATIVE PROCESS

1:29

REMEDIATE A COLLABORATIVE PROCESS

1:29




Transcript

Follow along using the transcript.

Show transcript



INDEPENDENT SECURITY EVALUATORS

528 subscribers
Videos

About

Videos


About






TRANSCRIPT










NaN / NaN








Chat Replay has been disabled for this Premiere.



10:59
10:59
Now playing




3 THINGS I WISH I KNEW. DO NOT GO INTO CYBER SECURITY WITHOUT KNOWING!

Cyber Tom
Cyber Tom
•
•
410K views 1 year ago







16:38
16:38
Now playing




DETECT HACKERS & MALWARE ON YOUR COMPUTER (LITERALLY FOR FREE)

John Hammond
John Hammond

Verified
•
•
306K views 11 months ago







13:49
13:49
Now playing




7 CYBERSECURITY TIPS NOBODY TELLS YOU (BUT ARE EASY TO DO)

All Things Secured
All Things Secured

Verified
•
•
91K views 6 days ago


New







21:49
21:49
Now playing




STRIDE THREAT MODELING FOR BEGINNERS - IN 20 MINUTES

Netsec Explained
Netsec Explained
•
•
31K views 10 months ago







19:26
19:26
Now playing




NEVER INSTALL THESE PROGRAMS ON YOUR PC... EVER!!!

JayzTwoCents
JayzTwoCents

Verified
•
•
3.3M views 4 months ago







42:46
42:46
Now playing




HOW THE BEST HACKERS LEARN THEIR CRAFT

RSA Conference
RSA Conference

Verified
•
•
2.6M views 6 years ago







8:34
8:34
Now playing




HOW HACKERS BYPASS MFA? [2 WAYS TO STOP THEM]

Threatscape
Threatscape
•
•
6.1K views 3 weeks ago







13:06
13:06
Now playing




NESSUS VULNERABILITY SCANNER TUTORIAL (CYBER SECURITY TOOLS)

Jon Good
Jon Good
•
•
237K views 4 years ago







19:40
19:40
Now playing




WEB SERVER CONCEPTS AND EXAMPLES

WebConcepts
WebConcepts
•
•
244K views 3 years ago







10:19
10:19
Now playing




HOW TO KNOW IF YOUR PC IS HACKED? SUSPICIOUS NETWORK ACTIVITY 101

The PC Security Channel
The PC Security Channel

Verified
•
•
1.2M views 2 years ago







12:22
12:22
Now playing




SPLUNK TUTORIAL FOR BEGINNERS (CYBER SECURITY TOOLS)

Jon Good
Jon Good
•
•
195K views 1 year ago







12:40
12:40
Now playing




TOP OSINT TOOLS IN 2024 | ARE THESE TOO CREEPY?

iMentor
iMentor
•
•
118K views 10 months ago







35:28
35:28
Now playing




SECURING MOBILE APPS WITH THE OWASP MASVS AND MSTG

Owasp Atlanta
Owasp Atlanta
•
•
2K views 2 years ago







15:13
15:13
Now playing




OPNSENSE: PROTECT YOUR HOME LAN WITH A TRANSPARENT FILTERING BRIDGE WITH STEP BY
STEP INSTRUCTIONS

Dave's Garage
Dave's Garage

Verified
•
•
676K views 5 months ago







32:05
32:05
Now playing




BUILDING THE WORLD'S LARGEST FUNCTIONAL IPHONE

DIY Perks
DIY Perks

Verified
•
•
1.5M views 5 days ago


New







17:11
17:11
Now playing




FREE PATH TO BECOME AN ETHICAL HACKER (2024 ROADMAP)

The Infosec Academy
The Infosec Academy
•
•
410K views 1 year ago







19:03
19:03
Now playing




SOLVING A REAL INVESTIGATION USING OSINT

Gary Ruddell
Gary Ruddell
•
•
164K views 1 year ago







18:52
18:52
Now playing




HAKBYTE: HOW TO FIND ANYTHING ON THE INTERNET WITH GOOGLE DORKS

Hak5
Hak5

Verified
•
•
1M views 3 years ago







51:29
51:29
Now playing




MASTER BURP SUITE LIKE A PRO IN JUST 1 HOUR

Netsec Explained
Netsec Explained
•
•
76K views 11 months ago







35:16
35:16
Now playing




HOW TO GET ARRESTED IN 30 MINUTES: CRACKING A GSM CAPTURE FILE IN REAL-TIME WITH
AIRPROBE AND KRAKEN

Rob VK8FOES
Rob VK8FOES
•
•
1.7M views 1 year ago









Show more








Saving your choice
An error occurred while saving your choice. Try again.

A Google company
en-GB

Afrikaans Azərbaycan Bahasa Indonesia Bahasa Malaysia Bosanski Català Čeština
Dansk Deutsch Eesti English (India) English (UK) English (US) Español (España)
Español (Latinoamérica) Español (US) Euskara Filipino Français Français (Canada)
Galego Hrvatski IsiZulu Íslenska Italiano Kiswahili Latviešu valoda Lietuvių
Magyar Nederlands Norsk O‘zbek Polski Português Português (Brasil) Română Shqip
Slovenčina Slovenščina Srpski Suomi Svenska Tiếng Việt Türkçe Беларуская
Български Кыргызча Қазақ Тілі Македонски Монгол Русский Српски Українська
Ελληνικά Հայերեն עברית اردو العربية فارسی नेपाली मराठी हिन्दी অসমীয়া বাংলা
ਪੰਜਾਬੀ ગુજરાતી ଓଡ଼ିଆ தமிழ் తెలుగు ಕನ್ನಡ മലയാളം සිංහල ภาษาไทย ລາວ ဗမာ ქართული
አማርኛ ខ្មែរ 中文 (简体) 中文 (繁體) 中文 (香港) 日本語 한국어
Sign in

Sign in


BEFORE YOU CONTINUE TO YOUTUBE


We use cookies and data to
 * Deliver and maintain Google services
 * Track outages and protect against spam, fraud and abuse
 * Measure audience engagement and site statistics to understand how our
   services are used and enhance the quality of those services
   

If you choose to 'Accept all', we will also use cookies and data to
 * Develop and improve new services
 * Deliver and measure the effectiveness of ads
 * Show personalised content, depending on your settings
 * Show personalised ads, depending on your settings
   

If you choose to 'Reject all', we will not use cookies for these additional
purposes.
Non-personalised content and ads are influenced by things like the content that
you’re currently viewing and your location (ad serving is based on general
location). Personalised content and ads can also include things like video
recommendations, a customised YouTube homepage and tailored ads based on past
activity, like the videos that you watch and the things that you search for on
YouTube. We also use cookies and data to tailor the experience to be
age-appropriate, if relevant.
Select 'More options' to see additional information, including details about
managing your privacy settings. You can also visit g.co/privacytools at any
time.
Reject all

Accept all

More options

Privacy Policy • Terms of Service