Duration: (1:33) ?Subscribe5835 2025-02-26T16:48:09+00:00
Christophe Tafani Dereeper - \
(27:38)
Keep Hackers Out of Your Cluster with These 5 Simp... Christophe Tafani-Dereeper \u0026 Frederic Baguelin
(33:7)
Adversary Emulation for the Cloud with Christophe Tafani-Dereeper
(52:51)
Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper
(23:37)
BlackAlps 2018: Switzerland Has Bunkers, We Have Vault - Christophe Tafani-Dereeper
(48:54)
Changing Perspectives: A Deep Dive into the Security Posture of 600+ Real-World AWS Environments
(38:28)
Finding Malicious PyPI Packages In The Wild by Christophe Tafani-Dereeper And Vladimir De Turckheim
(35:46)
Switzerland Has Bunkers, We Have Vault Christophe Tafani Dereeper Black Alps 2019
vOPCDE #7- Automating the Provisioning of Active Directory Labs in Azure(Christophe Tafani-Dereeper)
(36:43)
Mieux vaut-il vivre avec des remords qu'avec des regrets ?
(22:24)
Charles Aznavour et Mireille Mathieu - Une vie d'amour (1981)
(5:26)
Rallye Eccica Suarella 2023 (Show \u0026 attack)
(10:17)
Hangar aux voitures anciennes
(2:15)
Team Janaud Sisters # Championnat de France de Sprintcar # Faleyras
(14:36)
AWS re:Inforce 2024 - Traffic safety: Auditing and enforcing IAM best practices (IAM303-S)
(49:44)
The Path to Zero-Touch Production - Rami McCarthy
(48:12)
Create an Active Directory Lab with Vagrant (Easy \u0026 Fast!) ft. am03bam4n
(1:33:14)
Astéréotypie - UNO (Official Video)
(4:28)
The Safe House Gold \u0026 Silver Vault in Singapore
(2:36)
Mind the Gap! Bringing Together Cloud Services and Managed K8s Environments- Tafani-Dereeper \u0026 Comas
(33:31)
vOPCDE 7 Automating the Provisioning of Active Directory Labs in Azure Christophe Tafani Dereeper
(36:44)
Forensic Lunch 10/23/20
(48:1econd)
Purple Teaming Like Sky’s the Limit – Adversary Emulation in the Cloud... Christophe Tafani-Dereeper
(23:38)
What is the Agile Methodology?
(51)
Christophe Tafani : Président du Conseil Départemental de l'Ordre des Médecins (CDOM) Loiret
(1:33)
Shifting Cloud Security Left: Scanning Infrastructure as Code for Security Issues
(1:5:59)
BlackAlps17: Down the rabbit hole: how hackers exploit weak SSH credentials to build DDos botnets
(30:7)
fwd:cloudsec Europe 2024 Highlights
(5:4)
How to Escape Clusters in a Managed Kubernetes Cluster?
(59:2)
Crossing the Bridge - A Journey Through Attack Vectors in Managed Kubernetes Services
(30:46)