![ITSEC & Cyberrisks Baltics](/img/default-banner.jpg)
- Видео 450
- Просмотров 329 962
ITSEC & Cyberrisks Baltics
Латвия
Добавлен 6 июл 2015
Data Security Solutions helps private and public organizations mostly from Latvia, Lithuania, and Estonia to secure their critical information, protect networks from intruders, securely control email and web gateways in both directions, stopping viruses and spam, prevent data leakage through gateways, and manage the weakest link - users, their PC's, laptops, gadgets, emails, private, and financial data, and much more. The business is 100% IT security focused, that includes Data, Endpoint, Network, Mobile, Application, Identity, Cloud Security and Security Management.
DSSITSEC SilvanJongerius - How Blockchain and AI challenge the GDPR
Meeting the requirements of the GDPR is challenging, in particular when using Blockchain or AI. Where most people will cringe when mentioning the GDPR’s right to be forgotten and Blockchain in one sentence, this talk will explore how these particular challenges can be resolved, and how they could even be designed in a way that helps compliance.
Просмотров: 159
Видео
Chester Wisniewski-Back to the basics: A fresh approach to old problems
Просмотров 924 года назад
When we hear about data breaches in the news, all too often we hear experts say, “If they had only gotten the basics right, they would have avoided this terrible event.” It turns out that the basics are really hard and we are often too dismissive, not just of how important they are to get right, but how they fit into modern network defense. This talk will cover those tricky-to-achieve basics, n...
Ota Čermák - Data breach is our daily bread
Просмотров 794 года назад
Tales from the underground. Real data leaks that happened to various companies exposed to the audience. Thoughts on how we can protect ourselves and our companies and what to do when „stuff“ happens.
Gabriel Mazarache - WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend
Просмотров 604 года назад
Gabriel Mazarache - WHAT IT MEANS TO BE VULNERABLE The complexity of the human-technology blend
Luka Mulej - How to make your remote control secure
Просмотров 1574 года назад
Luka Mulej - How to make your remote control secure
Jani Haapio - Extending Zero Trust from network to endpoint
Просмотров 2024 года назад
Jani Haapio - Extending Zero Trust from network to endpoint
Padraigh Conway -Avoiding a Data Breach
Просмотров 594 года назад
Padraigh Conway -Avoiding a Data Breach
Christian Damsgaard Jensen -Hackers & Pirates (Cybersecurity at the High Seas)
Просмотров 2064 года назад
Christian Damsgaard Jensen -Hackers & Pirates (Cybersecurity at the High Seas)
Grant Colgan - 4G-5G Good for your health bad for security
Просмотров 3314 года назад
Grant Colgan - 4G-5G Good for your health bad for security
Sheldon Nailer - SECURE US TO SECURE ME
Просмотров 1014 года назад
Sheldon Nailer - SECURE US TO SECURE ME
Bryan Geraldo - Why Visibility Matters for Hunting for both OT and IT
Просмотров 424 года назад
Bryan Geraldo - Why Visibility Matters for Hunting for both OT and IT
Chester Wisniewski - Evolution of risk - From endpoint ransomware to supply chain compromise
Просмотров 654 года назад
Chester Wisniewski - Evolution of risk - From endpoint ransomware to supply chain compromise
Philipp Kalweit - Deep dive into cybersecurity
Просмотров 1,3 тыс.4 года назад
Philipp Kalweit - Deep dive into cybersecurity
DSS ITSEC 2019 grand opening with Rick Feds
Просмотров 2754 года назад
DSS ITSEC 2019 grand opening with Rick Feds
DSS ITSEC 2018 interview with Leif Jensen
Просмотров 505 лет назад
DSS ITSEC 2018 interview with Leif Jensen
More like "Jean Pereira", ethical lier and fraudster 🙃 He posts non-sense on LinkedIn, deletes all negative comments and blocks people who did not get fooled by his BS, makes claims about anything and everything... 🤣🤣🤣
Help me bad people cell simulator can't call out or receive 451 berean ln Apt a also cameras and audio in my tv and house using my car stingray to charge it they follow me mailbox not even saje fake police
This speaker is a god
7yrs old. Mexican drug lords did deploy their own cell network
10:02 the link.
This was made 7 years ago and the changes are 1) you can detect the ISMI catcher on a map with accuracy. 2) you can see the CID and stats on the ISMI catcher easily including mmc full info. Jammers owned by the ISMI catcher user do not work and are illegal as they mess up nearby homes. But you cannot to this day be able to guard against them. And yes they are used by criminals that are also government contractors to hide illegal activities with dirty cops . Innocent people are being spied upon...especially whistleblowers. Even people who stalk women for sexual gratification who also work for government. I have been a victim for years... and personally I think that people and agencies who use these to stalk innocent people and protect druggies or corporations that harm people are soul trash. In my case, they are even trying to steal from me under the guise of government. These folks belong in jail and we need stricker rules to protect innocent people.
0:19 😮😮😮*$#@+™✓
The name SECBIZ should have been a red flag for everyone
what happened?
Bro is a liar🤡
why?
bro is a big lier watch the video from live overflow he is a genius in faking a person yes
which video? could you give more info please?
@@TheAn0nym0u5 bro watch the video lmao
@@TheAn0nym0u5 even for this question i know u arent even deep into anything of computers lmao
@@vaginalexplorer69 bro im not competing for the person which has the longest dick as you are trying to do... i just asked a question. if your life is so bored to give answers like that, i am sorry for you! really! enjoy
What about for an iPhone?
A1
❤
优秀
感谢您的反馈 user-jg6dm7bs7d,祝您玩得愉快
Thanks , man those Morhers look like scared , insecured , weak , chickens on a farm , allover the place ! Jan 5 , 2023
In these rural areas the land stealing is a nightmare. Forcing elderly in nursing homes or mental health facilities!!! Especially in central Illinois. Yes these ip providers plus cell providers are being criminals by allowing others to abuse this technology and not give the paying population a clue.
Send here LogRhythm video
Ok Mr "Tom" you definitely got my attention
Nice
Andris Bariss is my dad.
Americans are so gullible. The government spying on you is now the least of your troubles. Criminal networks, including criminalized private investigators and intelligence firms, now freely illegally intercept phone calls and invade their targets' privacy. It's lawless out there, and organized crime is having a field day. THAT is the biggest threat to national security.
for advertisment by sms its nice
This moderator is not a good moderator. At all
what if you put your phone on airplane mode
Sorry, didn’t make it 5 minutes into this one. The old definition of droning.
Excuse my ignorance on the subject, but can these (or similar devices) be used for intercepting/jamming a home wifi network or an individual computer/laptop? Or do they only work for mobile/cell-phone networks? ie. could something like this be used to trick my laptop into thinking it's connected directly to my home wifi router, but in reality it is actually connecting to a nearby interceptor/man-in-the-middle, (in the same way that wifi extenders do) and then onto my router after that?
If you are close to your router it is a little hard, but if the signal strength of your neighbor or a roomate is higher than your router...than yes.
Is he shaking?
Certainly wouldn't call the Swedish government's security "highly capable"...
Informative presentation but very slow and need to be more organized. Thank you
Hz mne cet ne zaslo
Labs video!
А можно погромче
Mr. Tarun I need to know more about DLP how can i reach you.?
HD jakosc Panie Andrzeju by sie sprzydala
Can 5g network secure against this ?
Adorable attempt at hijacking what honeypots really are, or, rather, WHO.
So to crash 💥 software feed it corrupt file. No browser is safe. I am a data storage person best to back up ⬆️ often and keep security patches up to date.
Yeah this is what happens when people listen to such BS. This guy is just a fraudster...
This is a good thing u don't know people I think it's fine and dandy It's a good thing
9:44 Cute girl and not subtle guy
Hahahha
Hello. If a mobile device has been subject to an imsi catcher ? Does this device send things to see what the mobile device is writing or watching for example? I read it gets the imei as well. So, if the target mobile moves outside this area that the hacker is using this catcher , will it be safe now from the hacking? Thank u and waiting
No. It can only operate within the radius of the imsi catcher after it is out of range it won't work
Not gonna lie, They had us on the first half..
Nice presentation
anyone know how to hack conflict of nations ww3 game xd???
Janne, you're inspirational guy ! Glad to hear you. Imrich
Genius
All of this spying is not implied threat it may be time for the establishment to be arrested, then investigated and followed for many,many penalties...legal....penalties. Any thing else goes without mentioned or advertised. I say this as most of the activity is done from criminal intent. And government support. So I say why then do we need government???
If all of this activity is going on. What then do the people who are acting as presented have else to do. Like the above sentence...LOLOLOLOL
LATVIANS! WHERE UR POTATOS
I use to work for a US Telecom with obviously access to where exactly our towers are and what ID's they produce. This was the only way I was able to detect that my phone was grabbing on to one.
My gawd, get this man some sunlight. He is whiter than micheal jackson.