ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

European PDNS Readiness - Viliam Peli & George Buhai (Whalebone)

Автор: Virus Bulletin

Загружено: 2025-11-25

Просмотров: 89

Описание: Presented at the VB2025 conference in Berlin, 24 - 26 September 2025.
↓ Slides: https://www.virusbulletin.com/uploads...
↓ Paper: N/A
→ Details: https://www.virusbulletin.com/confere...

✪ PRESENTED BY ✪

• Viliam Peli (Whalebone)
• George Buhai (Whalebone)

✪ ABSTRACT ✪

As cyber threats increasingly target critical infrastructure and public services, Protective DNS (PDNS) has become a strategic tool for governments to strengthen national cyber resilience. This talk provides a focused assessment of European PDNS readiness, examining how member states are adopting and integrating DNS-based threat mitigation into their cybersecurity frameworks.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
European PDNS Readiness - Viliam Peli & George Buhai (Whalebone)

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Arachnid alert: Latrodectus loader crawls through defences — Albert Zsigovits VMRay

Arachnid alert: Latrodectus loader crawls through defences — Albert Zsigovits VMRay

From billion queries to action: how DNS4EU transforms threat defence — Sebastian Garcia

From billion queries to action: how DNS4EU transforms threat defence — Sebastian Garcia

Collaborative response to emerging critical RCE vulnerabilities in exposed edge devices

Collaborative response to emerging critical RCE vulnerabilities in exposed edge devices

Fireside chat: The tortured “cybersecurity” poets department

Fireside chat: The tortured “cybersecurity” poets department

Event Based Control  When to Act, When to Wait, and Why It Matters

Event Based Control When to Act, When to Wait, and Why It Matters

Smashing smishing by quashing quishing — Andrew Brandt (Netcraft)

Smashing smishing by quashing quishing — Andrew Brandt (Netcraft)

Tracking the IoT botnet's bloodline: code footprints don’t lie

Tracking the IoT botnet's bloodline: code footprints don’t lie

The dark prescription: inside the infrastructure of illegal online pharmacies

The dark prescription: inside the infrastructure of illegal online pharmacies

Sophistication or missed opportunity? Analysing XE Group’s long term exploitation of zero days...

Sophistication or missed opportunity? Analysing XE Group’s long term exploitation of zero days...

Automotive: opportunities arising from disruption in the automotive sector – a UK perspective

Automotive: opportunities arising from disruption in the automotive sector – a UK perspective

Why Curiosity Is More Powerful Than Intelligence | Richard Feynman

Why Curiosity Is More Powerful Than Intelligence | Richard Feynman

Unmasking the GrassCall campaign: the hackers behind job recruitment cyber scams

Unmasking the GrassCall campaign: the hackers behind job recruitment cyber scams

this makes me really upset

this makes me really upset

Demystifying the Playboy RaaS — Gijs Rijnders, Dutch National Police

Demystifying the Playboy RaaS — Gijs Rijnders, Dutch National Police

Vietnamese hacking group: a rising of information-stealing campaigns going global

Vietnamese hacking group: a rising of information-stealing campaigns going global

You definitely don’t want to CopyPaste this: FakeCaptcha ecosystem — Dmitrij Lenz & Roberto DaSilva

You definitely don’t want to CopyPaste this: FakeCaptcha ecosystem — Dmitrij Lenz & Roberto DaSilva

Deriyan alien simulation at TPS 2026

Deriyan alien simulation at TPS 2026

Prediction of future attack indicators based on the 2024 analysis of threats from malicious app...

Prediction of future attack indicators based on the 2024 analysis of threats from malicious app...

Inside Akira, ransomware's Rust experiment — Ben Herzog, Check Point

Inside Akira, ransomware's Rust experiment — Ben Herzog, Check Point

The Phantom Circuit: the Lazarus Group's evolution in supply chain compromise — Ryan Sherstobitoff

The Phantom Circuit: the Lazarus Group's evolution in supply chain compromise — Ryan Sherstobitoff

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]