Video Library
![video-1-thumbnail](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/video-1-thumbnail.webp?width=300&name=video-1-thumbnail.webp)
What does BYOS do?BYOS cloaks assets from the rest of the world and provides secure and invisible overlay communications through decentralized networks.
![02-why-byos-exists](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/02-why-byos-exists.webp?width=300&name=02-why-byos-exists.webp)
Why BYOS ExistsIn this video, Matias discusses trust in a network and explains his key ideas behind Byos and why it exists today.
![04](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/04.webp?width=300&name=04.webp)
The Tools and Techniques Used to Discover What's On Your NetworkIn this video, Matias Katz explains the tools and techniques they use. Learn how your network gets exposed once a hacker gets access to just one device inside your perimeter.
![05](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/05.webp?width=300&name=05.webp)
How Does BYOS Impact Lateral Movement Within the Kill Chain?Even with EDR/XDR/SASE, once an attacker gets in, they’ll find and look to access the other devices on your network. So how do you limit the damage?
![hackers](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/hackers.webp?width=300&name=hackers.webp)
How Hacker's Motivations Have Changed Over TimeWhat are the objectives of attacks and hackers? Listen here to understand more about how they can vary and have changed over time.
![06](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/06.webp?width=300&name=06.webp)
A White Hat Hacker's Perspective: The Kill Chain from Start to FinishHow would a world-class hacker execute an attack on your network? In this video, Matias Katz gives a full rundown of the cyber kill chain from start to finish.
![07](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/07.webp?width=300&name=07.webp)
How BYOS Stops Hackers From Spreading Across Small Business NetworksA simple click from an employee where they shouldn't can easily start an attack on a small business network. Watch this to discover how you can stop the spread across the network!
![08](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/08.webp?width=300&name=08.webp)
The Inherent Design Flaws in Internet SecurityWhat is the ultimate security flaw in the design of the internet? Watch this to find out!
![10](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/10.webp?width=300&name=10.webp)
Making Ransomware & Malware Not-Worth-The-Effort for HackersWe asked Byos' CEO and founder Matias Katz, what the ROI is for an attacker, even if they were able to get through, and have "C&C" (command and control) with TLS encryption and Byos protection in place.
![11](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/11.webp?width=300&name=11.webp)
Byos Portable Secure GatewayThe Byos Portable Secure Gateway will protect your laptops and tablets when you connect to Public Wi-Fi networks. It fully isolates you from the rest of the network, protecting you from attackers.
![12](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/12.webp?width=300&name=12.webp)
How Ransomware & Malware Spread Across a NetworkWhat is the one tactic used by all attackers to propagate a malware attack? Take a listen here as Byos CEO and Founder Matias Katz explains.
![13](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/13.webp?width=300&name=13.webp)
Operational Technology (OT) - Why Legacy Equipment Isn't UpdatedEvery organization faces a difficult reality: their legacy devices are using outdated and vulnerable protocols and operating systems, yet they can’t update them without breaking stuff.
![09](https://43714440.fs1.hubspotusercontent-na1.net/hub/43714440/hubfs/09.webp?width=300&name=09.webp)
Why VLANs Are Like DrywallThere’s no hardware isolation with a VLAN - you can’t trust it for isolating important information. Matias Katz, founder & CEO of Byos discusses implementing zero trust from the perspective of a renowned security researcher.