www.youtube.com
Open in
urlscan Pro
2a00:1450:4001:828::200e
Public Scan
Submitted URL: https://csk7r04.na1.hs-sales-engage.com/Ctc/DM+23284/cSK7R04/Jl22-6qcW7lCdLW6lZ3lKW8Vk7M52S7bWHW721ncF9brR9FW23FQqs2lYPd0W7J-lr16D3jGTW8...
Effective URL: https://www.youtube.com/watch?si=W-6zD1LQUZcnVnUl&v=EerwN2o9SyQ&feature=youtu.be
Submission Tags: falconsandbox
Submission: On September 11 via api from US — Scanned from GB
Effective URL: https://www.youtube.com/watch?si=W-6zD1LQUZcnVnUl&v=EerwN2o9SyQ&feature=youtu.be
Submission Tags: falconsandbox
Submission: On September 11 via api from US — Scanned from GB
Form analysis
1 forms found in the DOM/results
<form id="search-form" action="/results" class="style-scope ytd-searchbox">
<div id="container" class="style-scope ytd-searchbox">
<yt-icon id="search-icon" class="style-scope ytd-searchbox"><!--css-build:shady--><!--css-build:shady--><span class="yt-icon-shape yt-spec-icon-shape">
<div style="width: 100%; height: 100%; display: block; fill: currentcolor;"><svg xmlns="http://www.w3.org/2000/svg" fill="currentColor" height="24" viewBox="0 0 24 24" width="24" focusable="false" aria-hidden="true"
style="pointer-events: none; display: inherit; width: 100%; height: 100%;">
<path clip-rule="evenodd" d="M16.296 16.996a8 8 0 11.707-.708l3.909 3.91-.707.707-3.909-3.909zM18 11a7 7 0 00-14 0 7 7 0 1014 0z" fill-rule="evenodd"></path>
</svg></div>
</span></yt-icon>
<div id="search-input" class="ytd-searchbox-spt" slot="search-input"><input id="search" autocapitalize="none" autocomplete="off" autocorrect="off" name="search_query" tabindex="0" type="text" spellcheck="false" placeholder="Search"
aria-label="Search"></div>
<div id="search-clear-button" class="style-scope ytd-searchbox" hidden=""><ytd-button-renderer class="style-scope ytd-searchbox" button-renderer="" button-next=""><!--css-build:shady--><yt-button-shape><button
class="yt-spec-button-shape-next yt-spec-button-shape-next--text yt-spec-button-shape-next--mono yt-spec-button-shape-next--size-m yt-spec-button-shape-next--icon-only-default" aria-label="Clear search query" title="" style="">
<div class="yt-spec-button-shape-next__icon" aria-hidden="true"><yt-icon style="width: 24px; height: 24px;"><!--css-build:shady--><!--css-build:shady--><span class="yt-icon-shape yt-spec-icon-shape">
<div style="width: 100%; height: 100%; display: block; fill: currentcolor;"><svg xmlns="http://www.w3.org/2000/svg" enable-background="new 0 0 24 24" height="24" viewBox="0 0 24 24" width="24" focusable="false" aria-hidden="true"
style="pointer-events: none; display: inherit; width: 100%; height: 100%;">
<path d="m12.71 12 8.15 8.15-.71.71L12 12.71l-8.15 8.15-.71-.71L11.29 12 3.15 3.85l.71-.71L12 11.29l8.15-8.15.71.71L12.71 12z"></path>
</svg></div>
</span></yt-icon></div><yt-touch-feedback-shape style="border-radius: inherit;">
<div class="yt-spec-touch-feedback-shape yt-spec-touch-feedback-shape--touch-response" aria-hidden="true">
<div class="yt-spec-touch-feedback-shape__stroke" style=""></div>
<div class="yt-spec-touch-feedback-shape__fill" style=""></div>
</div>
</yt-touch-feedback-shape>
</button></yt-button-shape><tp-yt-paper-tooltip offset="8" disable-upgrade=""></tp-yt-paper-tooltip></ytd-button-renderer></div>
</div>
<div id="search-container" class="ytd-searchbox-spt" slot="search-container"></div>
</form>
Text Content
• NaN / NaN • NaN / NaN Back GB Skip navigation Search Search Sign in GB How To Do Application Security Right Search Watch Later Share Copy link Info Shopping Tap to unmute 2x If playback doesn't begin shortly, try restarting your device. • You're signed out Videos that you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer. CancelConfirm Up next Live Upcoming CancelPlay now Independent Security Evaluators Subscribe Subscribed Your technology solves problems through innovation. Security is a differentiator, and it matters to your customers: unless you give them assurance, they hesitate to buy. However, building security into the design process is challenging. Finding unknown security vulnerabilities is both crucial and complex. To do these right, it requires experts who have spent years acquiring specialized skills. When companies need to solve these problems — and achieve a competitive edge — they hire Independent Security Evaluators (ISE). We're ethical hackers, computer scientists, reverse engineers, cryptographers, software developers, penetration testers, and security consultants. We’ve hacked cars, phones, and medical devices and published research on all of it. From finding vulnerabilities to solving complex design problems, we’ve helped hundreds of companies including Google, Netflix, Amazon, and Microsoft. As a result, each of them achieved their mission. How to Turn a Router Into Part of a Botnet (Livestream) 1:34:59 The Blockchain Bandit: Finding Over 700 Active Private Keys On Ethereum's Blockchain 6:06 Share Include playlist An error occurred while retrieving sharing information. Please try again later. 0:00 0:00 / 3:47•Watch full videoLive • • Scroll for details HOW TO DO APPLICATION SECURITY RIGHT Independent Security Evaluators Independent Security Evaluators 528 subscribers <__slot-el> Subscribe <__slot-el> Subscribed 24 Share Download Download Save 1.9K views 4 years ago 1,971 views • Premiered on 13 May 2020 Show less You need to prove that your app is secure, so you need vulnerability assessments, penetration testing, ethical hacking, source code review or some other type of security assessment. You need to find & fix security vulnerabilities. If you do it right, you can reduce risk and remove security as a blocker to sales. The way to tackle all of these is by achieving security excellence. Here’s how we help you do exactly that. …...more ...more KEY MOMENTS VIEW ALL EXPLOITABLE VULNERABILITIES IN IPHONE EXPLOITABLE VULNERABILITIES IN IPHONE 0:33 EXPLOITABLE VULNERABILITIES IN IPHONE 0:33 ASSESS SECURITY BEYOND PENETRATION TESTING ASSESS SECURITY BEYOND PENETRATION TESTING 0:52 ASSESS SECURITY BEYOND PENETRATION TESTING 0:52 REMEDIATE A COLLABORATIVE PROCESS REMEDIATE A COLLABORATIVE PROCESS 1:29 REMEDIATE A COLLABORATIVE PROCESS 1:29 Transcript Follow along using the transcript. Show transcript INDEPENDENT SECURITY EVALUATORS 528 subscribers Videos About Videos About Show less HOW TO DO APPLICATION SECURITY RIGHT 1,971 views1.9K views Premiered on 13 May 2020 24 Share Download Download Save 0 COMMENTS Sort comments Sort by Top comments Newest first Add a comment… COMMENTS Top comments Newest first KEY MOMENTS EXPLOITABLE VULNERABILITIES IN IPHONE EXPLOITABLE VULNERABILITIES IN IPHONE 0:33 EXPLOITABLE VULNERABILITIES IN IPHONE 0:33 ASSESS SECURITY BEYOND PENETRATION TESTING ASSESS SECURITY BEYOND PENETRATION TESTING 0:52 ASSESS SECURITY BEYOND PENETRATION TESTING 0:52 REMEDIATE A COLLABORATIVE PROCESS REMEDIATE A COLLABORATIVE PROCESS 1:29 REMEDIATE A COLLABORATIVE PROCESS 1:29 Sync to video time Sync to video time DESCRIPTION How To Do Application Security Right You need to prove that your app is secure, so you need vulnerability assessments, penetration testing, ethical hacking, source code review or some other type of security assessment. You need to find & fix security vulnerabilities. If you do it right, you can reduce risk and remove security as a blocker to sales. The way to tackle all of these is by achieving security excellence. Here’s how we help you do exactly that. https://www.ise.io/ / isesecurity Show less ...more You need to prove that your app is secure, so you need vulnerability assessments, penetration testing, ethical hacking, source code review or some other type of security assessment. You need to find & fix security vulnerabilities. If you do it right, you can reduce risk and remove security as a blocker to sales. The way to tackle all of these is by achieving security excellence. Here’s how we help you do exactly that. https://www.ise.io/ / isesecurity …...more ...moreShow less KEY MOMENTS VIEW ALL EXPLOITABLE VULNERABILITIES IN IPHONE EXPLOITABLE VULNERABILITIES IN IPHONE 0:33 EXPLOITABLE VULNERABILITIES IN IPHONE 0:33 ASSESS SECURITY BEYOND PENETRATION TESTING ASSESS SECURITY BEYOND PENETRATION TESTING 0:52 ASSESS SECURITY BEYOND PENETRATION TESTING 0:52 REMEDIATE A COLLABORATIVE PROCESS REMEDIATE A COLLABORATIVE PROCESS 1:29 REMEDIATE A COLLABORATIVE PROCESS 1:29 Transcript Follow along using the transcript. Show transcript INDEPENDENT SECURITY EVALUATORS 528 subscribers Videos About Videos About TRANSCRIPT NaN / NaN Chat Replay has been disabled for this Premiere. 10:59 10:59 Now playing 3 THINGS I WISH I KNEW. DO NOT GO INTO CYBER SECURITY WITHOUT KNOWING! Cyber Tom Cyber Tom • • 410K views 1 year ago 16:38 16:38 Now playing DETECT HACKERS & MALWARE ON YOUR COMPUTER (LITERALLY FOR FREE) John Hammond John Hammond Verified • • 306K views 11 months ago 13:49 13:49 Now playing 7 CYBERSECURITY TIPS NOBODY TELLS YOU (BUT ARE EASY TO DO) All Things Secured All Things Secured Verified • • 91K views 6 days ago New 21:49 21:49 Now playing STRIDE THREAT MODELING FOR BEGINNERS - IN 20 MINUTES Netsec Explained Netsec Explained • • 31K views 10 months ago 19:26 19:26 Now playing NEVER INSTALL THESE PROGRAMS ON YOUR PC... EVER!!! JayzTwoCents JayzTwoCents Verified • • 3.3M views 4 months ago 42:46 42:46 Now playing HOW THE BEST HACKERS LEARN THEIR CRAFT RSA Conference RSA Conference Verified • • 2.6M views 6 years ago 8:34 8:34 Now playing HOW HACKERS BYPASS MFA? [2 WAYS TO STOP THEM] Threatscape Threatscape • • 6.1K views 3 weeks ago 13:06 13:06 Now playing NESSUS VULNERABILITY SCANNER TUTORIAL (CYBER SECURITY TOOLS) Jon Good Jon Good • • 237K views 4 years ago 19:40 19:40 Now playing WEB SERVER CONCEPTS AND EXAMPLES WebConcepts WebConcepts • • 244K views 3 years ago 10:19 10:19 Now playing HOW TO KNOW IF YOUR PC IS HACKED? SUSPICIOUS NETWORK ACTIVITY 101 The PC Security Channel The PC Security Channel Verified • • 1.2M views 2 years ago 12:22 12:22 Now playing SPLUNK TUTORIAL FOR BEGINNERS (CYBER SECURITY TOOLS) Jon Good Jon Good • • 195K views 1 year ago 12:40 12:40 Now playing TOP OSINT TOOLS IN 2024 | ARE THESE TOO CREEPY? iMentor iMentor • • 118K views 10 months ago 35:28 35:28 Now playing SECURING MOBILE APPS WITH THE OWASP MASVS AND MSTG Owasp Atlanta Owasp Atlanta • • 2K views 2 years ago 15:13 15:13 Now playing OPNSENSE: PROTECT YOUR HOME LAN WITH A TRANSPARENT FILTERING BRIDGE WITH STEP BY STEP INSTRUCTIONS Dave's Garage Dave's Garage Verified • • 676K views 5 months ago 32:05 32:05 Now playing BUILDING THE WORLD'S LARGEST FUNCTIONAL IPHONE DIY Perks DIY Perks Verified • • 1.5M views 5 days ago New 17:11 17:11 Now playing FREE PATH TO BECOME AN ETHICAL HACKER (2024 ROADMAP) The Infosec Academy The Infosec Academy • • 410K views 1 year ago 19:03 19:03 Now playing SOLVING A REAL INVESTIGATION USING OSINT Gary Ruddell Gary Ruddell • • 164K views 1 year ago 18:52 18:52 Now playing HAKBYTE: HOW TO FIND ANYTHING ON THE INTERNET WITH GOOGLE DORKS Hak5 Hak5 Verified • • 1M views 3 years ago 51:29 51:29 Now playing MASTER BURP SUITE LIKE A PRO IN JUST 1 HOUR Netsec Explained Netsec Explained • • 76K views 11 months ago 35:16 35:16 Now playing HOW TO GET ARRESTED IN 30 MINUTES: CRACKING A GSM CAPTURE FILE IN REAL-TIME WITH AIRPROBE AND KRAKEN Rob VK8FOES Rob VK8FOES • • 1.7M views 1 year ago Show more Saving your choice An error occurred while saving your choice. Try again. A Google company en-GB Afrikaans Azərbaycan Bahasa Indonesia Bahasa Malaysia Bosanski Català Čeština Dansk Deutsch Eesti English (India) English (UK) English (US) Español (España) Español (Latinoamérica) Español (US) Euskara Filipino Français Français (Canada) Galego Hrvatski IsiZulu Íslenska Italiano Kiswahili Latviešu valoda Lietuvių Magyar Nederlands Norsk O‘zbek Polski Português Português (Brasil) Română Shqip Slovenčina Slovenščina Srpski Suomi Svenska Tiếng Việt Türkçe Беларуская Български Кыргызча Қазақ Тілі Македонски Монгол Русский Српски Українська Ελληνικά Հայերեն עברית اردو العربية فارسی नेपाली मराठी हिन्दी অসমীয়া বাংলা ਪੰਜਾਬੀ ગુજરાતી ଓଡ଼ିଆ தமிழ் తెలుగు ಕನ್ನಡ മലയാളം සිංහල ภาษาไทย ລາວ ဗမာ ქართული አማርኛ ខ្មែរ 中文 (简体) 中文 (繁體) 中文 (香港) 日本語 한국어 Sign in Sign in BEFORE YOU CONTINUE TO YOUTUBE We use cookies and data to * Deliver and maintain Google services * Track outages and protect against spam, fraud and abuse * Measure audience engagement and site statistics to understand how our services are used and enhance the quality of those services If you choose to 'Accept all', we will also use cookies and data to * Develop and improve new services * Deliver and measure the effectiveness of ads * Show personalised content, depending on your settings * Show personalised ads, depending on your settings If you choose to 'Reject all', we will not use cookies for these additional purposes. Non-personalised content and ads are influenced by things like the content that you’re currently viewing and your location (ad serving is based on general location). Personalised content and ads can also include things like video recommendations, a customised YouTube homepage and tailored ads based on past activity, like the videos that you watch and the things that you search for on YouTube. We also use cookies and data to tailor the experience to be age-appropriate, if relevant. Select 'More options' to see additional information, including details about managing your privacy settings. You can also visit g.co/privacytools at any time. Reject all Accept all More options Privacy Policy • Terms of Service