SecurityTube.net

Displaying 1-40 of 83 results

  • Podcasts // Jan 2014

    Top Ten Proactive Web Application Controls

    The OWASP proactive control is a \"Top 10 like document\" aimed to help developers build secure applications. In this podcast, the speaker will explain the fundamental controls in critical software categories such as authentication, access control, validation, encoding, query parameterization, data protection, secure requirements, secure architecture and secure design.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Running At 99% Surviging An Application DoS

    Application-level Denial-of-Service (DoS) attacks are a threat to nearly everyone hosting content on the internet. DoS attacks are simple to launch, but can be difficult to defend against. Modern websites are a diverse set of moving parts, and a malicious actor only needs to find the point at which any...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Sec. And Net. Forensics: 12 Cloud Computing

    In this podcast, the speaker provides an introduction to cluster, grid and cloud infrastructures. They also define an example of grid computing and its advantages, the usage of Amazon web services, including S3 and the EC2 cloud and outline the usage of RESTful web services.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Post Exploitation Operations with Cloud Synchronization Services

    Cloud backup solutions, such as Dropbox, provide a convenient way for users to synchronize files between user devices. These services are particularly attractive to users, who always want the most current version of critical files on every device. Many of these applications \"Install\" into the user's profile directory and the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Keep: Protect Your Secrets at Scale

    In this webcast, the presenter will explain cloud keep, an open source project sponsored by Rackspace to build a secure, cloud-ready key management solution. They hope to solve a need for their customers as well as other OpenStack projects. Additionally, they aim to provide a free and open-source system that...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Bulletproofing The Cloud: Are We Any Closer To Security?

    Cloud security has come into focus in the last few years; while many ways to break the cloud have been proposed; few solutions have been put forward. In this podcast, the speaker is primarily a conceptual discussion on how cloud providers can and should be (but probably are not) protecting...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Computing, A Weapon Of Mass Destruction?

    Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. The presenters have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service (DDoS), flooding, and packet fragmentation. In this...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Dropsmack: How Cloud Sync Services Render Your Corporate Firewall Worthless

    Cloud backup providers are marketing directly to corporate executives offering services that will \"Increase employee productivity\" or \"Provide virtual teaming opportunities.\" Offers such as these make it more likely than ever that any given corporate environment has some cloud backup solutions installed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Transcending Cloud Limitations By Obtaining Inner Piece

    With the abundance of cloud storage providers competing for the users' data, some have taken to offering services in addition to free storage. In this webcast, the presenter demonstrates the ability to gain unlimited cloud storage by abusing an overlooked feature of some of these services.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How Overlay Networks Can Make Public Clouds Your Global WAN Network

    Enterprises, organizations and governments are realizing the benefits of cloud flexibility, cost savings, scalability and connectivity. Yet the traditional approach focuses too much on the underlying infrastructure, instead of the applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    STRC: The Security Training And Research Cloud

    In this webcast, the presenter will explain how the cloud was built, what it's been used for, the potential uses in the future, and how it can be implemented in other areas. STRC is an Infrastructure-as-a-Service (IaaS) cloud focused on security research and training. The cost was kept to an...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Real World Cloud Application Security

    In this webcast, the presenter will provide how the real world organizations using the public cloud are approaching application security. The presenter will cover a variety of topics of interest to application security personnel, including: automating and integrating security into CI/CD environments, large scale vulnerability management, continuous security testing and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Training and Research Cloud (STRC)

    In this webcast, the presenter provides an overview of the cloud, what was used to build it (keeping cost as low as possible), how it is being utilized, and what the future looks like for Security Training and Research Cloud (STRC). The cloud provides numerous virtual machines for security training...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Cloud and Security Be Used in the Same Sentence?

    In this webcast, the presenter will discuss the cloud, how the user can secure it and what has changed. The enterprise is built with metal, while the cloud is built with software. What does that do to security? Where is the users' hardware appliances and how do \"Cloud\" them? The...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystifying Security in the Cloud: AWS Scout

    In this webcast, the presenter will discuss the most common mistakes that they have seen in the field and show the user how to audit them using AWS Scout. The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by enterprise...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Get Off of My Cloud: Cloud Credential Compromise and Exposure

    An Amazon Machine Image (AMI) is a virtual appliance container used to create Virtual Machines (VMs) within the Amazon Elastic Compute Cloud (EC2). EC2 instances typically interact with a variety of Amazon Web Services (AWS), and as such require access to AWS credentials and private key materials. In this podcast,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Threat Modeling Cloud Applications: What You Don't Know Will Hurt You

    Threat modeling is a critical activity for identifying such vulnerabilities early in the development process. Proper threat modeling requires the identification of application's assets, security controls and attackers. For applications based on Amazon Web Services (AWS), there are subtle differences in the security controls provided by AWS when compared to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Socially Owned in the Cloud

    In this webcast, the presenter will present a survey of the most popular cloud/web applications and their responses to a questioner regarding their data retention, data ownership, their commercial use of the data they have harvested.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Cloud - Storms on the Horizon

    At its heart, the \"Cloud\", as it's so lovingly referred to, is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of the users' IT woes, often invoking images of care-bears, marshmallows, and other such nirvanic images. But beyond the marketing pitches, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cryptohaze Cloud Cracking

    In this webcast, the presenter explain about the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze Multiforcer is an open source, GPLv2, network enabled platform for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Covering Your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS

    Cloud security is often treated as a single topic, but in practice it differs widely between SaaS (such as Google Apps), PaaS (such as Amazon's S3 storage as a service) and IaaS (such as Verizon Terramark and VMware vCloud). In this webcast, the presenter look at real-world case studies of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Managing Security within The Cloud

    Now that the users' enterprise borders have all but disolved and their data is spread around the world, the speaker must face the fact that the cloud is real. Dealing with security in the cloud requires a change in mindset and approach but isn't so different from what they are...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hack the Cloud

    Moving to the cloud means shared risk and often less insight into matters of security. There's a lot to audit, a lot to know, and a lot that's missed. Knowing where to look, the questions to ask, and how to test are key to knowing how to manage the users'...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloudy Weather - How Secure is the Cloud?

    In this webcast, the presenter explain the security features and compliance levels of Windows Azure and also give guidance on how the user can use the features available to build solutions that meet their security requirements.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Data in the Cloud: Authentication Without Leaking

    Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Being a Puppet Master: Automating Amazon EC2 with Puppet Friends

    The benefits of cloud-computing (specifically IaaS) can be quickly outweighed by the time and effort that it takes to manage the quickly scalable hosts the users' company may be putting into service. Puppet, an open-source configuration management software package, allows for a more efficient and logical way to help the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Big Data Intelligence: Harnessing Petabytes of WAF Statistics to Analyze & Improve Web Protection in the Cloud

    As web application attacks turn into massive campaigns against large corporations across the globe, web application firewall data increases exponentially, leaving security experts with a big data mess to analyze. Pinpointing real attacks in a sea of security event noise becomes an almost impossible tedious task. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hacking .NET Applications - The Black Arts

    In this webcast, the presenter will focus on attacking .NET desktop applications (EXE/DLL/Live Memory) both WhiteHat and BlackHat hacking will be shown on common security concerns such as intellectual property protection systems and licensing systems.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Attacking CAPTCHAs for Fun and Profit

    CAPTCHAs are a potent mechanism to prevent web applications against automated form submissions. To analyze the strength of CAPTHA deployments on the internet, a research spanning hundreds of high traffic websites and several CAPTCHA service providers was conducted.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    New and Improved: Hacking Oracle From Web

    In this podcast, the speaker will explain about number of attacks against Oracle database and in almost every other CPU there is a shiny new exploit which allows a malicious database user to gain DBA privileges on the back-end database.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The EU approach to Cybersecurity and Cybercrime

    The EU directive on \"Attacks against information systems\" has raised some concerns among the hacker community. The presenter will give an overview of the policies and politics behind it, but also put it in the larger context of EU attempts to enhance cybersecurity and fight cybercrime from a critical insider...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Million Browser Botnet

    Online advertising networks can be a web hacker's best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow the users' to broadly distribute arbitrary JavaScript - even malicious JavaScript. The users' are supposed to use this feature to show ads, to track users,...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OwnCloud

    The advantages of storing data in the cloud are many: ubiquitous access to data from multiple devices, social interaction and sharing with others on the web and no extra software to install. In this webcast, the presenter will give an overview of this market and on getting ownCloud running in...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    HTML5/JS Security

    In this podcast, the speaker explores the vulnerabilities behind JavaScript, including: a new class of vulnerabilities unique only to JavaScript, vulnerabilities in 3rd-party platforms which are exploited through JavaScript code and HTML5 which is considered the NG-Javascript. In turn, HTML5 introduces a new set of vulnerabilities

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    SSH Gymnastics Using Proxychains

    Proxychains is a Linux dynamically loadable library that will intercept any TCP and UDP traffic from a specific process and tunnel it over HTTP, SOCKS4 or SOCKS5 proxy. In this podcast, the speaker will explain how to Use Proxychains to pivot through SSH servers to reach internal systems.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Top Ten Proactive Web Application Controls

    The OWASP proactive control is a \"Top 10 like document\" aimed to help developers build secure applications. In this podcast, the speaker will explain the fundamental controls in critical software categories such as authentication, access control, validation, encoding, query parameterization, data protection, secure requirements, secure architecture and secure design.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Running At 99% Surviging An Application DoS

    Application-level Denial-of-Service (DoS) attacks are a threat to nearly everyone hosting content on the internet. DoS attacks are simple to launch, but can be difficult to defend against. Modern websites are a diverse set of moving parts, and a malicious actor only needs to find the point at which any...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Sec. And Net. Forensics: 12 Cloud Computing

    In this podcast, the speaker provides an introduction to cluster, grid and cloud infrastructures. They also define an example of grid computing and its advantages, the usage of Amazon web services, including S3 and the EC2 cloud and outline the usage of RESTful web services.

    Provided By SecurityTube.net

  • Podcasts // Apr 2012

    Securing The Virtualization Explosion Live Webinar

    In this podcast, the user will learn how to secure their virtual data center and cloud-based project with vGW. The user will learn: ability to enforce and validate compliance driven requirements, security, defense in depth, and separation of duties, full visibility of the virtual network traffic and automation of security...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Post Exploitation Operations with Cloud Synchronization Services

    Cloud backup solutions, such as Dropbox, provide a convenient way for users to synchronize files between user devices. These services are particularly attractive to users, who always want the most current version of critical files on every device. Many of these applications \"Install\" into the user's profile directory and the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2011

    Top Ten Risks with Cloud That Will Keep You Awake At Night

    Against the backdrop of new economic realities, one of the larger forces that is affecting businesses worldwide is cloud computing, whose benefits include agility, time to market, time to capability and reduced cost. Cloud computing is already transforming majority of the IT industry into services oriented IT organizations or simply...

    Provided By SecurityTube.net

  • Podcasts // Sep 2011

    Secure Development Considerations For Cloud/Virtual Environments

    As organizations move to cloud computing the types and management of business risks changes. Measuring and assessing these risks presents a unique set of challenges. In this webcast, the presenter will cover the basic cloud computing service models and examine some business risks the resulting measurement and assessment methods organizations...

    Provided By SecurityTube.net

  • Podcasts // Apr 2012

    Private Information Protection in Cloud Computing - Laws, Compliance &Amp; Cloud Security Misconceptions

    Cloud Computing (CC) is a distributed computing technology and thus is not new. Similar approach has been implemented in multiuser mainframe environment and in client-server architecture. What is completely new is that the technology is based on distributed legal entities' environment. Interfering computing resources and intersecting legal boundaries create completely...

    Provided By SecurityTube.net

  • Webcasts // Jul 2009

    Cloud Security in Map/Reduce

    In this webcast, the presenter explains overview of the operations principles of Map/Reduce and Hadoop with examples of typical implementation in a business environment. It points out significant security issues that now exist and others that will certainly arise. The presenter also offers suggestions for improving security in existing installations,...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Keep: Protect Your Secrets at Scale

    In this webcast, the presenter will explain cloud keep, an open source project sponsored by Rackspace to build a secure, cloud-ready key management solution. They hope to solve a need for their customers as well as other OpenStack projects. Additionally, they aim to provide a free and open-source system that...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Bulletproofing The Cloud: Are We Any Closer To Security?

    Cloud security has come into focus in the last few years; while many ways to break the cloud have been proposed; few solutions have been put forward. In this podcast, the speaker is primarily a conceptual discussion on how cloud providers can and should be (but probably are not) protecting...

    Provided By SecurityTube.net

  • Podcasts // Apr 2012

    Cloud-Based dWAF: A Real World Deployment Case Study

    In this podcast, the speaker explains the decision-making process of the customer during proof-of-concept, pilot and eventual deployment of a distributed Web App Firewall (dWAF). Post-deployment, the speaker go through the care and feeding of a dWAF protecting resources living in the public cloud, from technical hiccups and tradeoffs to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Computing, A Weapon Of Mass Destruction?

    Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. The presenters have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service (DDoS), flooding, and packet fragmentation. In this...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Dropsmack: How Cloud Sync Services Render Your Corporate Firewall Worthless

    Cloud backup providers are marketing directly to corporate executives offering services that will \"Increase employee productivity\" or \"Provide virtual teaming opportunities.\" Offers such as these make it more likely than ever that any given corporate environment has some cloud backup solutions installed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Transcending Cloud Limitations By Obtaining Inner Piece

    With the abundance of cloud storage providers competing for the users' data, some have taken to offering services in addition to free storage. In this webcast, the presenter demonstrates the ability to gain unlimited cloud storage by abusing an overlooked feature of some of these services.

    Provided By SecurityTube.net

  • Podcasts // Sep 2009

    Cloud Security And Privacy

    In this podcast, the speaker will explain the cloud computing SPI delivery model and its impact on various aspects of enterprise information security (e.g., infrastructure, data, identity and access management, security management), privacy, and compliance. Security-as-a-Service (SaaS) and the impact of cloud computing on corporate IT is also discussed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How Overlay Networks Can Make Public Clouds Your Global WAN Network

    Enterprises, organizations and governments are realizing the benefits of cloud flexibility, cost savings, scalability and connectivity. Yet the traditional approach focuses too much on the underlying infrastructure, instead of the applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    STRC: The Security Training And Research Cloud

    In this webcast, the presenter will explain how the cloud was built, what it's been used for, the potential uses in the future, and how it can be implemented in other areas. STRC is an Infrastructure-as-a-Service (IaaS) cloud focused on security research and training. The cost was kept to an...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Real World Cloud Application Security

    In this webcast, the presenter will provide how the real world organizations using the public cloud are approaching application security. The presenter will cover a variety of topics of interest to application security personnel, including: automating and integrating security into CI/CD environments, large scale vulnerability management, continuous security testing and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Training and Research Cloud (STRC)

    In this webcast, the presenter provides an overview of the cloud, what was used to build it (keeping cost as low as possible), how it is being utilized, and what the future looks like for Security Training and Research Cloud (STRC). The cloud provides numerous virtual machines for security training...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Cloud and Security Be Used in the Same Sentence?

    In this webcast, the presenter will discuss the cloud, how the user can secure it and what has changed. The enterprise is built with metal, while the cloud is built with software. What does that do to security? Where is the users' hardware appliances and how do \"Cloud\" them? The...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystifying Security in the Cloud: AWS Scout

    In this webcast, the presenter will discuss the most common mistakes that they have seen in the field and show the user how to audit them using AWS Scout. The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by enterprise...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Get Off of My Cloud: Cloud Credential Compromise and Exposure

    An Amazon Machine Image (AMI) is a virtual appliance container used to create Virtual Machines (VMs) within the Amazon Elastic Compute Cloud (EC2). EC2 instances typically interact with a variety of Amazon Web Services (AWS), and as such require access to AWS credentials and private key materials. In this podcast,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Threat Modeling Cloud Applications: What You Don't Know Will Hurt You

    Threat modeling is a critical activity for identifying such vulnerabilities early in the development process. Proper threat modeling requires the identification of application's assets, security controls and attackers. For applications based on Amazon Web Services (AWS), there are subtle differences in the security controls provided by AWS when compared to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Socially Owned in the Cloud

    In this webcast, the presenter will present a survey of the most popular cloud/web applications and their responses to a questioner regarding their data retention, data ownership, their commercial use of the data they have harvested.

    Provided By SecurityTube.net

  • Podcasts // Jan 2011

    Risk Perception and Trust in Cloud

    In this podcast, the speaker explain an introduction to the cloud and some of its advantages and disadvantages. It discusses the role of risk perception and trust in security and privacy challenges of the cloud. It also makes recommendations addressing these challenges. Many companies today are paying attention to cloud...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Cloud - Storms on the Horizon

    At its heart, the \"Cloud\", as it's so lovingly referred to, is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of the users' IT woes, often invoking images of care-bears, marshmallows, and other such nirvanic images. But beyond the marketing pitches, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cryptohaze Cloud Cracking

    In this webcast, the presenter explain about the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze Multiforcer is an open source, GPLv2, network enabled platform for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Covering Your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS

    Cloud security is often treated as a single topic, but in practice it differs widely between SaaS (such as Google Apps), PaaS (such as Amazon's S3 storage as a service) and IaaS (such as Verizon Terramark and VMware vCloud). In this webcast, the presenter look at real-world case studies of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Managing Security within The Cloud

    Now that the users' enterprise borders have all but disolved and their data is spread around the world, the speaker must face the fact that the cloud is real. Dealing with security in the cloud requires a change in mindset and approach but isn't so different from what they are...

    Provided By SecurityTube.net

  • Webcasts // Aug 2012

    The New Frontier, Welcome the Cloud Brokers

    In this webcast, the presenter explain a new concept of \"Cloud brokers\" and brokerage came to light with the recent release of the GSA cloud broker RFI. What does that mean for the cloud professionals of today (skills they need) and the cloud professionals of tomorrow (skills they are going...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hack the Cloud

    Moving to the cloud means shared risk and often less insight into matters of security. There's a lot to audit, a lot to know, and a lot that's missed. Knowing where to look, the questions to ask, and how to test are key to knowing how to manage the users'...

    Provided By SecurityTube.net

  • Webcasts // Feb 2012

    Cryptographic Protocols in the Era of Cloud Computing

    With the advent of cloud computing, their view of cryptographic protocols has changed dramatically. In this webcast, the presenter will give an overview of some of the newer challenges that they face in cloud cryptography and outline some of the techniques used to solve these problems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloudy Weather - How Secure is the Cloud?

    In this webcast, the presenter explain the security features and compliance levels of Windows Azure and also give guidance on how the user can use the features available to build solutions that meet their security requirements.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Data in the Cloud: Authentication Without Leaking

    Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Being a Puppet Master: Automating Amazon EC2 with Puppet Friends

    The benefits of cloud-computing (specifically IaaS) can be quickly outweighed by the time and effort that it takes to manage the quickly scalable hosts the users' company may be putting into service. Puppet, an open-source configuration management software package, allows for a more efficient and logical way to help the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Big Data Intelligence: Harnessing Petabytes of WAF Statistics to Analyze & Improve Web Protection in the Cloud

    As web application attacks turn into massive campaigns against large corporations across the globe, web application firewall data increases exponentially, leaving security experts with a big data mess to analyze. Pinpointing real attacks in a sea of security event noise becomes an almost impossible tedious task. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Jul 2013

    How to Build Your Own Pen Testing Lab in Amazon EC2

    In this webcast, the presenter explain the basics of Amazon's EC2 cloud infrastructure (e.g., EC2, VPC, basic network and routing, Elastic IPs, security groups, VPNs, and snapshots) and step-by-step instructions on configuring this infrastructure to build the users' own isolated test network complete with licensed victim servers or customized AMIs.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net