HELP NET SECURITY

Displaying 1-26 of 26 results

  • Webcasts // Oct 2011

    How Well Do You Know SSL?

    The presenter, talks about the research done by SSL Labs. SSL Labs is a collection of documents, tools and thoughts related to SSL. It's a non-commercial research effort to better understand how SSL is deployed, and an attempt to make it better.

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2011

    Next Generation Security as a Service

    The new UI for the QualysGuard IT Security and Compliance SaaS Suite features interactive dashboards, streamlined workflows, actionable menus and filters with improved visual feedback, making it easier for customers to utilize the comprehensive services in the QualysGuard Suite.

    Provided By HELP NET SECURITY

  • Webcasts // May 2011

    Securing the Virtual Environment

    The presenter is a Security Architect at LogLogic. In this webcast, the presenter talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM hopping and VM theft.

    Provided By HELP NET SECURITY

  • Webcasts // Apr 2011

    Application Security Vulnerabilities

    SpellingRafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only be seen through a combination of human input, static analysis, dynamic analysis and a new type of technology loosely termed run-time analysis - the type of...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    Social Media Threats and Targeted Attacks

    In the webcast, the presenter talks about the new breed of social media threats and sophisticated targeted attacks. Cosoi estimates that during this year the people will see a decrease of classical malware such as spam and file infectors.

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    How Secure is Your Browser?

    Qualys CTO, the presenter talks about research which clearly shows that browser security is alarmingly bad. Browsers and plug-ins are frequently outdated and easily attacked. The data was gathered by Browser Check, a free service which enables the end user to check the state of security of the browser.

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    Cenzic at a glance

    Cenzic is a provider of software, managed service, and cloud security products that help organizations secure their websites against hacker attacks. Cenzic focuses on Web application security, automating the process of identifying security defects at the Web application level, help customers in remediating those defects, manage risk and get compliance...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    The Fundamental Failure of Endpoint Security

    In this webcast, the presenter Research Analyst Director with Secunia, it's not the vulnerabilities in Microsoft's products they should worry about, but those in third-party software. Even though the number of discovered vulnerabilities has slightly decreased in the last two years, the worrying fact is that 84 percent of all...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    Securing the Enterprise: Insight From Qualys

    In this webcast, recorded at RSA Conference 2011 in San Francisco, the presenter talks about the myriad of innovations coming from the company: next generation SaaS platform to host the QualysGuard IT security and compliance SaaS suite of applications in the cloud.

    Provided By HELP NET SECURITY

  • Webcasts // Feb 2011

    Secunia's Role in Vulnerability Management

    In the webcast below, Secunia CSO, the presenter talks about the company and their product line. The presenter tackles the following questions: Tell one more about Secunia, and the role of vulnerability research in one organization? Secunia offers the Corporate Software Inspector for finding and fixing unpatched endpoints and applications....

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    How to Protect Your Company From Social Engineering Attacks

    The presenter is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known information security speaker. The presenter offers advice for companies on how to prepare themselves for potentially dangerous social engineering situations: basic security awareness training, the...

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    L0phtCrack 7: The Next Level of Password Auditing and Recovery

    L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn't halted since.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2010

    Today's Security Landscape: Threats, Data Breaches and Privacy

    In this webcast, recorded at the IBM Innovate 2010 conference, the presenter, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and privacy.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2010

    Malware Detection With Neptune

    In this webcast, recorded at Black Hat USA 2010, the presenter, a software architect at Qualys, talks about Neptune - a project to build an automatic malware analysis engine and deliver it as a free tool. Neptune intercepts key method invocations within Internet Explorer's Trident rendering engine and reverse engineers...

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2010

    SSL Labs: Researching the Technology That Protects the Internet

    In this webcast, recorded at Black Hat USA 2010, the presenter talks about SSL Labs - a non-commercial research effort and collection of documents and tools related to SSL. It's an attempt to better understand how SSL is deployed, and an attempt to make it better.

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2010

    BlindElephant: Open Source Web Application Fingerprinting Engine

    In this webcast recorded at Black Hat USA 2010, the presenter talks about, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine BlindElephant. BlindElephant is a tool that helps security professionals and systems administrators identify everything running on their servers, including any web applications users may...

    Provided By HELP NET SECURITY

  • Webcasts // Jul 2010

    Secure by Design

    In this webcast, recorded at the IBM Innovate 2010 conference, the presenter is the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread in a lot of innovations that enhance the quality of the people lives.

    Provided By HELP NET SECURITY

  • Webcasts // Apr 2010

    Web Application Security Issues and Solutions

    In this webcast, the presenter talks about web application security issues and solutions. The presenter focuses on the fact that most web applications are not being tested for security problems and introduces a new Cenzic cloud offering that one can use to get a quick jumpstart on one web application...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2010

    Cloud Computing Security: An Insider's View

    As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this webcast, the presenter talks about cloud computing security from an insider's point of view. The presenter illustrates what a security professional has to go through when building a...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2010

    Free Website Malware Detection Service

    Thousands of web sites are infected with malware daily, propagating the infection to visitors of their web sites at an increasing speed. To combat these threats, QualysGuard Malware Detection is a FREE service that proactively scans web sites of any size, anywhere in the world for malware infections and threats.

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2010

    Lessons Learned From RSA Conferences

    In this webcast, the presenter offers insight into the past and present of the RSA Conference. The presenter talks about how it has been growing and how it became the key information security event in the world.

    Provided By HELP NET SECURITY

  • Webcasts // Oct 2009

    ExcaliburCon

    In this webcast, recorded at BruCON, security professional and book author Jayson Street discusses the upcoming ExcaliburCon conference taking place in Wuxi, China. The conference consists of three days of active discussions, presentations, workshops and games for sharing experience around new attacks, defensive techniques and information security.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2009

    Malicious PDF Files

    In this webcast, the presenter recorded at BruCON, security researcher and expert on malicious PDF files Didier Stevens discusses how these files work and offers protection tips.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2009

    Dissecting the hack: the f0rb1dd3n network

    In this webcast, recorded last week at BruCON, Jayson Street talks about his book - "Dissecting the hack: the f0rb1dd3n network" - published by Syngress. The book aims to inform and educate executives and upper management on the importance of information security without alienating or losing them in the process.

    Provided By HELP NET SECURITY

  • Webcasts // May 2009

    SSH Solutions With CEO George Adams

    The presenter is the President and CEO of SSH Communications Security, discusses their solutions for securing and managing data in enterprise networks. This includes the new SSH Tectia Guardian product.

    Provided By HELP NET SECURITY

  • Webcasts // Nov 2008

    Lavasoft and the Antispyware Industry

    In this webcast, the speaker CEO Jason King offers a brief history of Lavasoft and its role in the antispyware industry, the growth of the company, the shift in the marketplace as well as details on the next generation of the Ad-aware product.

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    How to Protect Your Company From Social Engineering Attacks

    The presenter is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known information security speaker. The presenter offers advice for companies on how to prepare themselves for potentially dangerous social engineering situations: basic security awareness training, the...

    Provided By HELP NET SECURITY

  • Webcasts // Feb 2011

    Secunia's Role in Vulnerability Management

    In the webcast below, Secunia CSO, the presenter talks about the company and their product line. The presenter tackles the following questions: Tell one more about Secunia, and the role of vulnerability research in one organization? Secunia offers the Corporate Software Inspector for finding and fixing unpatched endpoints and applications....

    Provided By HELP NET SECURITY

  • Webcasts // Jul 2010

    Secure by Design

    In this webcast, recorded at the IBM Innovate 2010 conference, the presenter is the Director of Security Solutions at IBM Rational, talks about how software is the invisible thread in a lot of innovations that enhance the quality of the people lives.

    Provided By HELP NET SECURITY

  • Webcasts // Apr 2010

    Web Application Security Issues and Solutions

    In this webcast, the presenter talks about web application security issues and solutions. The presenter focuses on the fact that most web applications are not being tested for security problems and introduces a new Cenzic cloud offering that one can use to get a quick jumpstart on one web application...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2010

    Cloud Computing Security: An Insider's View

    As CSO of Qualys, Randy Barr is responsible for security, risk management and business continuity planning of the QualysGuard platform. In this webcast, the presenter talks about cloud computing security from an insider's point of view. The presenter illustrates what a security professional has to go through when building a...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2010

    Free Website Malware Detection Service

    Thousands of web sites are infected with malware daily, propagating the infection to visitors of their web sites at an increasing speed. To combat these threats, QualysGuard Malware Detection is a FREE service that proactively scans web sites of any size, anywhere in the world for malware infections and threats.

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2010

    Lessons Learned From RSA Conferences

    In this webcast, the presenter offers insight into the past and present of the RSA Conference. The presenter talks about how it has been growing and how it became the key information security event in the world.

    Provided By HELP NET SECURITY

  • Webcasts // Oct 2009

    ExcaliburCon

    In this webcast, recorded at BruCON, security professional and book author Jayson Street discusses the upcoming ExcaliburCon conference taking place in Wuxi, China. The conference consists of three days of active discussions, presentations, workshops and games for sharing experience around new attacks, defensive techniques and information security.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2009

    Malicious PDF Files

    In this webcast, the presenter recorded at BruCON, security researcher and expert on malicious PDF files Didier Stevens discusses how these files work and offers protection tips.

    Provided By HELP NET SECURITY

  • Webcasts // May 2009

    SSH Solutions With CEO George Adams

    The presenter is the President and CEO of SSH Communications Security, discusses their solutions for securing and managing data in enterprise networks. This includes the new SSH Tectia Guardian product.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2009

    Dissecting the hack: the f0rb1dd3n network

    In this webcast, recorded last week at BruCON, Jayson Street talks about his book - "Dissecting the hack: the f0rb1dd3n network" - published by Syngress. The book aims to inform and educate executives and upper management on the importance of information security without alienating or losing them in the process.

    Provided By HELP NET SECURITY

  • Webcasts // Nov 2008

    Lavasoft and the Antispyware Industry

    In this webcast, the speaker CEO Jason King offers a brief history of Lavasoft and its role in the antispyware industry, the growth of the company, the shift in the marketplace as well as details on the next generation of the Ad-aware product.

    Provided By HELP NET SECURITY

  • Webcasts // May 2011

    Securing the Virtual Environment

    The presenter is a Security Architect at LogLogic. In this webcast, the presenter talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM hopping and VM theft.

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2011

    Next Generation Security as a Service

    The new UI for the QualysGuard IT Security and Compliance SaaS Suite features interactive dashboards, streamlined workflows, actionable menus and filters with improved visual feedback, making it easier for customers to utilize the comprehensive services in the QualysGuard Suite.

    Provided By HELP NET SECURITY

  • Webcasts // Oct 2011

    How Well Do You Know SSL?

    The presenter, talks about the research done by SSL Labs. SSL Labs is a collection of documents, tools and thoughts related to SSL. It's a non-commercial research effort to better understand how SSL is deployed, and an attempt to make it better.

    Provided By HELP NET SECURITY

  • Webcasts // Apr 2011

    Application Security Vulnerabilities

    SpellingRafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only be seen through a combination of human input, static analysis, dynamic analysis and a new type of technology loosely termed run-time analysis - the type of...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    Securing the Enterprise: Insight From Qualys

    In this webcast, recorded at RSA Conference 2011 in San Francisco, the presenter talks about the myriad of innovations coming from the company: next generation SaaS platform to host the QualysGuard IT security and compliance SaaS suite of applications in the cloud.

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    The Fundamental Failure of Endpoint Security

    In this webcast, the presenter Research Analyst Director with Secunia, it's not the vulnerabilities in Microsoft's products they should worry about, but those in third-party software. Even though the number of discovered vulnerabilities has slightly decreased in the last two years, the worrying fact is that 84 percent of all...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    Cenzic at a glance

    Cenzic is a provider of software, managed service, and cloud security products that help organizations secure their websites against hacker attacks. Cenzic focuses on Web application security, automating the process of identifying security defects at the Web application level, help customers in remediating those defects, manage risk and get compliance...

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    How Secure is Your Browser?

    Qualys CTO, the presenter talks about research which clearly shows that browser security is alarmingly bad. Browsers and plug-ins are frequently outdated and easily attacked. The data was gathered by Browser Check, a free service which enables the end user to check the state of security of the browser.

    Provided By HELP NET SECURITY

  • Webcasts // Mar 2011

    Social Media Threats and Targeted Attacks

    In the webcast, the presenter talks about the new breed of social media threats and sophisticated targeted attacks. Cosoi estimates that during this year the people will see a decrease of classical malware such as spam and file infectors.

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2010

    BlindElephant: Open Source Web Application Fingerprinting Engine

    In this webcast recorded at Black Hat USA 2010, the presenter talks about, a vulnerability researcher at Qualys, discusses the open source web application fingerprinting engine BlindElephant. BlindElephant is a tool that helps security professionals and systems administrators identify everything running on their servers, including any web applications users may...

    Provided By HELP NET SECURITY

  • Webcasts // Aug 2010

    SSL Labs: Researching the Technology That Protects the Internet

    In this webcast, recorded at Black Hat USA 2010, the presenter talks about SSL Labs - a non-commercial research effort and collection of documents and tools related to SSL. It's an attempt to better understand how SSL is deployed, and an attempt to make it better.

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2010

    Malware Detection With Neptune

    In this webcast, recorded at Black Hat USA 2010, the presenter, a software architect at Qualys, talks about Neptune - a project to build an automatic malware analysis engine and deliver it as a free tool. Neptune intercepts key method invocations within Internet Explorer's Trident rendering engine and reverse engineers...

    Provided By HELP NET SECURITY

  • Webcasts // Sep 2010

    Today's Security Landscape: Threats, Data Breaches and Privacy

    In this webcast, recorded at the IBM Innovate 2010 conference, the presenter, the Worldwide Security Executive, IBM/Rational at IBM, talks about current threats, data breaches and privacy.

    Provided By HELP NET SECURITY

  • Webcasts // Dec 2010

    L0phtCrack 7: The Next Level of Password Auditing and Recovery

    L0phtCrack is one of the most used tools by security professionals worldwide. After years of inactivity, version 6 was released in 2009 and development hasn't halted since.

    Provided By HELP NET SECURITY