- Видео 66
- Просмотров 45 176
Xecurity Pulse
США
Добавлен 24 окт 2019
Taha Sajid is a Principal Solutions Architect and a 5G Security Lead. He is responsible for solutions, security design and architecture, vulnerability management and security operations for the 5G wireless network. He is also focused on driving Data Privacy controls and security standards of 5G for 3GPP SA3 group aimed towards Zero Trust Security policy.
Taha is also a principal cybersecurity advisor at digital currency think tank advising central banks and financial institutions. Taha has authored a book recently" Ultimate Blockchain Security”, a book that explains strategies on securing blockchain applications and mitigations against crypto scams. In addition, his online courses cybersecurity for 5G, blockchain, and Fintech is used by thousands of professionals, having a 5-star rating.
www.linkedin.com/in/taha-sajid/
www.tahasajid.com/
#3GPP #5g #cybersecurity #blockchain #5gsecurity #networksecurity #fintech #cbdc #cyber #cybercrime #threats #securitybreach
Taha is also a principal cybersecurity advisor at digital currency think tank advising central banks and financial institutions. Taha has authored a book recently" Ultimate Blockchain Security”, a book that explains strategies on securing blockchain applications and mitigations against crypto scams. In addition, his online courses cybersecurity for 5G, blockchain, and Fintech is used by thousands of professionals, having a 5-star rating.
www.linkedin.com/in/taha-sajid/
www.tahasajid.com/
#3GPP #5g #cybersecurity #blockchain #5gsecurity #networksecurity #fintech #cbdc #cyber #cybercrime #threats #securitybreach
Securing Cloud-Native 5G Networks: A Comprehensive Webinar by Xecurity Pulse
#xecuritypulse #TahaSajid #telecom #5g #cybersecurity #cloudnative #5gnetwork
Join Taha and Milind in this comprehensive webinar as they dive into the critical security considerations for cloud-native 5G networks. As 5G technology rapidly expands, ensuring the security of cloud-based infrastructures becomes increasingly important.
Key Take-aways from the session:
• Understand Critical Security Challenges in 5G Cloud-Native Networks
• Learn how to implement industry best practices to enhance the security of 5G networks in cloud-native environments.
• Understand practical approaches to safeguard against sophisticated threats like lateral movement within modern network infrastructures.
• ...
Join Taha and Milind in this comprehensive webinar as they dive into the critical security considerations for cloud-native 5G networks. As 5G technology rapidly expands, ensuring the security of cloud-based infrastructures becomes increasingly important.
Key Take-aways from the session:
• Understand Critical Security Challenges in 5G Cloud-Native Networks
• Learn how to implement industry best practices to enhance the security of 5G networks in cloud-native environments.
• Understand practical approaches to safeguard against sophisticated threats like lateral movement within modern network infrastructures.
• ...
Просмотров: 63
Видео
5G Security Bootcamp - Xecurity Pulse
Просмотров 3614 дней назад
🚀 Xecurity Pulse proudly announces the Game-Changing 5G Security Bootcamp - Where Telecom Meets Cyber Security! 🔐 🔍 What you'll master: ✅ 5G security architecture - from standards to real-world implementations ✅ Advanced threat modeling in telecom environments ✅ Security testing that goes beyond the basics ✅ Battle-tested mitigation strategies for 5G-specific vulnerabilities ⚡ What makes it dif...
Xecurity Pulse!
Просмотров 3521 день назад
#XecurityPulse #TahaSajid #telecom #5g #cybersecurity 📗 My Ultimate Blockchain Security Handbook: 👉 www.amazon.com/dp/B0CKRNDR25 🔗 Let’s connect on Social Media: Linkedin - www.linkedin.com/in/taha-sajid XP Linkedin - www.linkedin.com/company/xecurity-pulse/ Website - www.tahasajid.com XP website - www.xecuritypulse.com Facebook - xecuritypulse Instagram - xecuritypul...
Mastering RAN Evolution with Ibrahim & Taha
Просмотров 254Месяц назад
"Mastering RAN Evolution & Cloud Native Technology" Join Taha and Ibrahim in this insightful journey into the world of Radio Access Networks (RAN) and the transformative power of Cloud Native Technology. In this episode, they break down how RAN is evolving to meet the demands of modern networks and discuss the latest trends in cloud native infrastructure. Discover how the intersection of these ...
Cyber Intelligence & National Security Unveiled
Просмотров 89Месяц назад
Cyber Intelligence & National Security | With Taha Sajid & Marcela Denniston In this insightful episode, Xecurity Pulse founder and host Taha Sajid along with cybersecurity expert Marcela, sets to explore the critical intersection of Cyber Intelligence and National Security. They discuss the growing importance of digital defense, the evolving threats facing nations today, and the strategies gov...
Mastering eBPF : Deep dive on Kernel | Hands on Demo
Просмотров 90Месяц назад
Mastering eBPF : Deep dive on Kernel | Hands on Demo
Splunk Enterprise Deep Dive: Architecture, Design, and Hands-On Demo
Просмотров 1582 месяца назад
Splunk Enterprise Deep Dive: Architecture, Design, and Hands-On Demo
Coffee with Karim: A Multifaceted Journey Throughout Telecom, Cloud & Entrepreneurship
Просмотров 1812 месяца назад
Coffee with Karim: A Multifaceted Journey Throughout Telecom, Cloud & Entrepreneurship
Dive Into Malware: Live Analysis & Hands-On Demo
Просмотров 1,2 тыс.2 месяца назад
Dive Into Malware: Live Analysis & Hands-On Demo
Hidden in Plain Sight: The Shocking Truth About Your Exposed IoT Devices
Просмотров 1 тыс.2 месяца назад
Hidden in Plain Sight: The Shocking Truth About Your Exposed IoT Devices
Decoding AI - Mastering OpenAI Whisper with Josué Batista
Просмотров 1492 месяца назад
Decoding AI - Mastering OpenAI Whisper with Josué Batista
Myth vs. Reality: Why Cybersecurity Data Fabric Changes Everything
Просмотров 1 тыс.2 месяца назад
Myth vs. Reality: Why Cybersecurity Data Fabric Changes Everything
AT&T Cyber Attack - Analysis and Prevention - by Taha Sajid
Просмотров 963 месяца назад
AT&T Cyber Attack - Analysis and Prevention - by Taha Sajid
Harnessing Next Gen SOC for Telecom Networks - Webinar
Просмотров 1,1 тыс.3 месяца назад
Harnessing Next Gen SOC for Telecom Networks - Webinar
Fast Track US Green Card | No Sponsorship Required | EB2 NIW
Просмотров 2373 месяца назад
Fast Track US Green Card | No Sponsorship Required | EB2 NIW
5G Security and Monitoring | Guarding the Next-Gen Network
Просмотров 1,3 тыс.3 месяца назад
5G Security and Monitoring | Guarding the Next-Gen Network
ZERO TRUST SECURITY | ZSCALER | SASE | SDWAN
Просмотров 1 тыс.4 месяца назад
ZERO TRUST SECURITY | ZSCALER | SASE | SDWAN
Secret Recipe to Win Extraordinary Ability Visa | Understanding EB-1
Просмотров 2074 месяца назад
Secret Recipe to Win Extraordinary Ability Visa | Understanding EB-1
Safeguarding the Digital Future : Teaching American Youth Blockchain and Cybersecurity
Просмотров 807 месяцев назад
Safeguarding the Digital Future : Teaching American Youth Blockchain and Cybersecurity
Phishing Attack Simulation - Blockchain Application
Просмотров 457 месяцев назад
Phishing Attack Simulation - Blockchain Application
Cybersecurity Career Path and Opportunities
Просмотров 2027 месяцев назад
Cybersecurity Career Path and Opportunities
Solution Design of Endpoint Detection & Response (EDR) in 5G
Просмотров 19110 месяцев назад
Solution Design of Endpoint Detection & Response (EDR) in 5G
CyberSecurity Framework for DLT based Central Bank Digital Currency (CBDC)
Просмотров 12910 месяцев назад
CyberSecurity Framework for DLT based Central Bank Digital Currency (CBDC)
Zero Trust Security Architecture with Microsoft MVP - Webinar
Просмотров 1,1 тыс.Год назад
Zero Trust Security Architecture with Microsoft MVP - Webinar
Cyber Security Course for FinTech - Taha Sajid
Просмотров 3,8 тыс.2 года назад
Cyber Security Course for FinTech - Taha Sajid
5G Security Architecture with Mitigation Strategy (Part 2)
Просмотров 1,4 тыс.2 года назад
5G Security Architecture with Mitigation Strategy (Part 2)
Hi how can we join this bootcamp
@@RizwanAhmed-wt2tu xecuritypulse.com/5g-security-bootcamp/
Very nice guys
@@omarrauf7459 Thank you
❤
welldone
welldone
nice
nice
nice
❤
❤
@@ayeshataha7652 thank you
nice
@@ayeshataha7652 thank you
Awesome job. You made it into my feed! Keep up the good work
@@AncestryLands thank you
Hi Sajid JI, I am also in 5g. Could you please PM your phone number ?. your voluble insights might help others like me.
@@nagdevineni6823 thank you
@@nagdevineni6823 follow #tahasajid on Linkedin
.
Thank you
Very nice discussion, keep it up
Thank you
You should also arrange some sessions for Telco security for the ORAN
For sure, thank you so much for your suggestion.
Yes, will do that. thank you.
Thanks for sharing
@@Musafiras107-vk6lx welcome
Got it.
Just subscribed.
💖💖
You're right
@@sisterandborther9812 thank you
Fascinating concept! Data Fabric could revolutionize our approach.
@@kaptan-chauhan indeed, do share your feedback after applying the concepts
Eye-opening webinar! Data Fabric is a game-changer in cybersecurity.
@@subha493 Thank you
Great presentation! Cybersecurity Data Fabric is the future.
@@NXT_Rudra_tm thank you
This video is a must-see for cybersecurity professionals. Very informative!
@@RajveerBhat-j7u thank you
Amazing insights into Data Fabric. Excited to learn more!
The future of digital defense is here! Taha Sajid’s insights into Cybersecurity Data Fabric are both enlightening and actionable. Highly recommend this webinar.
@@rajibdey8346 thank you for your feedback
Wow, this is a game-changer! I had no idea how Cybersecurity Data Fabric could transform digital defense. Can't wait to implement these strategies!
@@nikkichomde3401 Thank you
Incredible insights from Taha Sajid! This webinar really opened my eyes to the potential of Data Fabric in cybersecurity. Thanks for sharing!
@@pinkirajput2791 Thank you, appreciate your feedback
This video is a must-watch for anyone in cybersecurity. The way Data Fabric can unify defense strategies is mind-blowing. Great job on the presentation!
@@Mtbotlive99 thank you dear
Just finished watching-this is revolutionary! The concept of Cybersecurity Data Fabric is something I hadn't considered before. Looking forward to applying these ideas.
@@ManjuYadav-dc3rq loved the feedback
Thank you for your commens and feedback
Love how you explained the MITRE Attack Framework. It’s a powerful tool for analyzing threats.
Thank you
Awesome video on malware prevention strategies. These tips will be invaluable for enhancing our security practices!
Thank you, i am glad you liked it
Great demo on tracking malicious IPs. The hands-on approach made it super clear!
Thank you.
Fantastic breakdown of DDOS attacks! Really helpful for understanding the mechanics behind them.
Thank you, appreaciate your feedback
The indicators of compromise section was eye-opening. Definitely learned a lot about spotting issues early.
Thank you
Great video! Zero Trust Security seems like a game changer for modern cybersecurity. Thanks for breaking it down so clearly!
Yes, thank you
I’ve been hearing a lot about Zero Trust lately. This video really helped me understand how it can protect against evolving threats.
Thank you
This video clarifies the importance of Zero Trust Security. It's impressive how it addresses both internal and external threats effectively.
Thank you, indeed
I got you what i wanted. Go on....
thank you
This is an incredibly informative video! The live analysis really helps to understand how malware behaves in real-time. Thanks taha
You are welcome
Walaikum as salam sajid. Thanks for sharing with us❤❤❤
Thank you
@@XecurityPulsebyTahaSajid You're welcome
❤
thank you
Congratulation and thanks a lot for detailed explanation.
@@krishnakumar-uc5hk Thank you
Great work
Great work
Appreciate your efforts
@@adsm-1512 thank you
Nice one!! Can you share the link to the hands-on course? Thanks.
Thank you. Here it is www.lablabee.com/
I would love for us to work together on this brilliant framework!
Yes, thank you. Happy to collaborate !