SecurityTube.net

Displaying 1-40 of 197 results

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Hunting Malware on Linux Production Servers: The Windigo Backstory

    Operation Windigo is a large server, side malware campaign that targets Unix systems (BSD, Linux, etc.). There are three major components: Linux/Ebury an OpenSSH backdoor and credential stealer, Linux/Cdorked a Web Server backdoor (it works with Apache, Nginx and Lighttpd) that redirects end users to exploit kits, and Perl/Calfbot a...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Internet of Insecure Things: 10 Most Wanted List

    In this webcast, the presenter explains about the history of embedded device insecurity. The presenter will also explore some real-world example of how devices are exploited (and attackers profited). The user will also learn what they can do to help fix these problems and push the industry for a much...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Threat Modeling for Realz

    In this webcast, the presenter explains about threat modeling, which is a core activity for \"Baking security in\". Understanding the threats against the user's system-how likely it is for these threats to be realized-the impact of a realized threat- and how to defend against the threat is key to building...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    High-Speed High-Security Cryptography: Encrypting and Authenticating the Whole Internet

    In this webcast, the presenter explains about different approach to high-security Internet cryptography. This approach is easy for users, easy for system administrators, and, perhaps most importantly, easy for programmers. The main reason that the approach has not been tried before is that it seems to involve very slow cryptographic...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    So You Want to Murder a Software Patent

    Software patents are a huge source of controversy and discussion in the tech world. This semi-hilarious legal story will cover the experience of the case, the details, and how the entire process went down. Hopefully some combination of entertainment, education and insight will ensue.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    A Critical Overview of 10 Years of Privacy Enhancing Technologies

    In this webcast, the presenter will provide a critical overview of \"Privacy research\" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Data Recovery Techniques

    In this webcast, the presenter explains about data recovery techniques. Salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external Hard Disk Drives...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Defense Is Not Dead - Why We Will Have More Secure Computers - Tomorrow

    In this webcast, the presenter will look into the state of the art in building secure computers, with a focus on type systems and formal verification, and hopefully an outlook on how tomorrow's computers will be more secure than what the user can buy now.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Desktop on the Linux... (and BSD, of Course)

    In this webcast, the presenter will discuss about the graphics subsystem (X11) is network transparent and provides IPC. So let's build the users own IPC system, that's not network transparent (DBus). The presenter also explains look at some of the pearls of strange API design.

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    VPN Pivoting With Cobalt Strike

    In this podcast, the speaker will discuss about VPN. It creates a network interface on the cobalt strike system and bridges this interface into the target's network. Through a covert VPN interface: the user system may sniff traffic on their target's network, act as a rogue server, or perform man-in-the-middle...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    C+11 Metaprogramming Technics Applied to Software Obduscation

    Obfuscation is the transformation of source or binary code into a form that is difficult to understand, but without affecting the functionality of the code. Goals of obfuscation are multiple: hide a secret or logic, make code harder to reverse engineer, protect intellectual property, prevent tampering, etc.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Bring Your Own Risky Apps

    Bring Your Own Device (BYOD) is a cute and harmless-sounding acronym for a trend that is in reality introducing exponentially more risk to end-users and organizations. The common refrain is to seek out and secure the user's Smartphone's and tablets from malware and other malicious software which can wreck havoc...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    A Better Way to Get Intelligent About Threats

    A recent ponemon report on exchanging cyber threat intelligence states that current threat sharing mechanisms are broken. A threat intelligence platform should achieve many things, but most importantly it should offer a singular platform to aggregate, analyze, and act on threat intelligence data as well as offer options for context,...

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network

    In this webcast, the presenter will show how to create the dropper, implant bots, master controller, and launch new payloads on the victim box through the use of Splinter the RAT, an open-source red-team collaboration framework they developed and released to the community to show the ease at which RATs...

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Podcasts // Jun 2014

    CryptoLocker - The Ransomware Trojan

    The CryptoLocker malware encrypts certain files with a private key and demands payment to regain access to the files. In this podcast, the speaker will presents deep dive into CryptoLocker and looks at the latest information around what is called one of the two most sophisticated and destructive forms of...

    Provided By SecurityTube.net

  • Podcasts // May 2014

    Digging Deeper Into the IE Vulnerability

    Web browser vulnerabilities remain a fertile ground for hackers to harvest and mount attacks. Latest vulnerabilities found in Internet Explorer (IE) and urgent response from Microsoft highlights the fact that despite end of life announcements for old and less secure products, millions of users remain exposed to threats.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Cloud - Storms on the Horizon

    At its heart, the \"Cloud\", as it's so lovingly referred to, is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of the users' IT woes, often invoking images of care-bears, marshmallows, and other such nirvanic images. But beyond the marketing pitches, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cryptohaze Cloud Cracking

    In this webcast, the presenter explain about the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze Multiforcer is an open source, GPLv2, network enabled platform for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Covering Your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS

    Cloud security is often treated as a single topic, but in practice it differs widely between SaaS (such as Google Apps), PaaS (such as Amazon's S3 storage as a service) and IaaS (such as Verizon Terramark and VMware vCloud). In this webcast, the presenter look at real-world case studies of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Managing Security within The Cloud

    Now that the users' enterprise borders have all but disolved and their data is spread around the world, the speaker must face the fact that the cloud is real. Dealing with security in the cloud requires a change in mindset and approach but isn't so different from what they are...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hack the Cloud

    Moving to the cloud means shared risk and often less insight into matters of security. There's a lot to audit, a lot to know, and a lot that's missed. Knowing where to look, the questions to ask, and how to test are key to knowing how to manage the users'...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloudy Weather - How Secure is the Cloud?

    In this webcast, the presenter explain the security features and compliance levels of Windows Azure and also give guidance on how the user can use the features available to build solutions that meet their security requirements.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Real World Cloud Application Security

    In this webcast, the presenter will provide how the real world organizations using the public cloud are approaching application security. The presenter will cover a variety of topics of interest to application security personnel, including: automating and integrating security into CI/CD environments, large scale vulnerability management, continuous security testing and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Training and Research Cloud (STRC)

    In this webcast, the presenter provides an overview of the cloud, what was used to build it (keeping cost as low as possible), how it is being utilized, and what the future looks like for Security Training and Research Cloud (STRC). The cloud provides numerous virtual machines for security training...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Cloud and Security Be Used in the Same Sentence?

    In this webcast, the presenter will discuss the cloud, how the user can secure it and what has changed. The enterprise is built with metal, while the cloud is built with software. What does that do to security? Where is the users' hardware appliances and how do \"Cloud\" them? The...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystifying Security in the Cloud: AWS Scout

    In this webcast, the presenter will discuss the most common mistakes that they have seen in the field and show the user how to audit them using AWS Scout. The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by enterprise...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Cloud - Storms on the Horizon

    At its heart, the \"Cloud\", as it's so lovingly referred to, is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of the users' IT woes, often invoking images of care-bears, marshmallows, and other such nirvanic images. But beyond the marketing pitches, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cryptohaze Cloud Cracking

    In this webcast, the presenter explain about the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze Multiforcer is an open source, GPLv2, network enabled platform for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Covering Your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS

    Cloud security is often treated as a single topic, but in practice it differs widely between SaaS (such as Google Apps), PaaS (such as Amazon's S3 storage as a service) and IaaS (such as Verizon Terramark and VMware vCloud). In this webcast, the presenter look at real-world case studies of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Managing Security within The Cloud

    Now that the users' enterprise borders have all but disolved and their data is spread around the world, the speaker must face the fact that the cloud is real. Dealing with security in the cloud requires a change in mindset and approach but isn't so different from what they are...

    Provided By SecurityTube.net

  • Webcasts // Aug 2012

    The New Frontier, Welcome the Cloud Brokers

    In this webcast, the presenter explain a new concept of \"Cloud brokers\" and brokerage came to light with the recent release of the GSA cloud broker RFI. What does that mean for the cloud professionals of today (skills they need) and the cloud professionals of tomorrow (skills they are going...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hack the Cloud

    Moving to the cloud means shared risk and often less insight into matters of security. There's a lot to audit, a lot to know, and a lot that's missed. Knowing where to look, the questions to ask, and how to test are key to knowing how to manage the users'...

    Provided By SecurityTube.net

  • Webcasts // Feb 2012

    Cryptographic Protocols in the Era of Cloud Computing

    With the advent of cloud computing, their view of cryptographic protocols has changed dramatically. In this webcast, the presenter will give an overview of some of the newer challenges that they face in cloud cryptography and outline some of the techniques used to solve these problems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloudy Weather - How Secure is the Cloud?

    In this webcast, the presenter explain the security features and compliance levels of Windows Azure and also give guidance on how the user can use the features available to build solutions that meet their security requirements.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Real World Cloud Application Security

    In this webcast, the presenter will provide how the real world organizations using the public cloud are approaching application security. The presenter will cover a variety of topics of interest to application security personnel, including: automating and integrating security into CI/CD environments, large scale vulnerability management, continuous security testing and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Training and Research Cloud (STRC)

    In this webcast, the presenter provides an overview of the cloud, what was used to build it (keeping cost as low as possible), how it is being utilized, and what the future looks like for Security Training and Research Cloud (STRC). The cloud provides numerous virtual machines for security training...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Cloud and Security Be Used in the Same Sentence?

    In this webcast, the presenter will discuss the cloud, how the user can secure it and what has changed. The enterprise is built with metal, while the cloud is built with software. What does that do to security? Where is the users' hardware appliances and how do \"Cloud\" them? The...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystifying Security in the Cloud: AWS Scout

    In this webcast, the presenter will discuss the most common mistakes that they have seen in the field and show the user how to audit them using AWS Scout. The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by enterprise...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Get Off of My Cloud: Cloud Credential Compromise and Exposure

    An Amazon Machine Image (AMI) is a virtual appliance container used to create Virtual Machines (VMs) within the Amazon Elastic Compute Cloud (EC2). EC2 instances typically interact with a variety of Amazon Web Services (AWS), and as such require access to AWS credentials and private key materials. In this podcast,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Threat Modeling Cloud Applications: What You Don't Know Will Hurt You

    Threat modeling is a critical activity for identifying such vulnerabilities early in the development process. Proper threat modeling requires the identification of application's assets, security controls and attackers. For applications based on Amazon Web Services (AWS), there are subtle differences in the security controls provided by AWS when compared to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Socially Owned in the Cloud

    In this webcast, the presenter will present a survey of the most popular cloud/web applications and their responses to a questioner regarding their data retention, data ownership, their commercial use of the data they have harvested.

    Provided By SecurityTube.net

  • Podcasts // Jan 2011

    Risk Perception and Trust in Cloud

    In this podcast, the speaker explain an introduction to the cloud and some of its advantages and disadvantages. It discusses the role of risk perception and trust in security and privacy challenges of the cloud. It also makes recommendations addressing these challenges. Many companies today are paying attention to cloud...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Battery Firmware Hacking

    In this podcast, the speaker will demonstrate how the embedded controller works. The speaker will reverse engineer the firmware and the firmware flashing process for a particular smart battery controller. In particular, the speaker will show how to completely reprogram the smart battery by modifying the firmware on it.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Scan Web Servers for Vulnerabilities with Vega

    Vega is a very simple web server vulnerability scanner that ships with Kali Linux and is available under Windows and Mac. In this podcast, the speaker will be using the open source application Vega to scan web servers for vulnerabilities.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How to Use SQLNINJA to Takeover MS-SQL Database Servers

    In this podcast, the user will learn how to exploit MS-SQL. The speaker will explore advanced MS-SQL Database. For Exploiting a MS-SQL Database Hoody is using a tool called SQLNINJA. SQLNINJA is a very powerful SQLI exploitation tool.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Using Web Proxy Servers for Hacking

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Being a Puppet Master: Automating Amazon EC2 with Puppet Friends

    The benefits of cloud-computing (specifically IaaS) can be quickly outweighed by the time and effort that it takes to manage the quickly scalable hosts the users' company may be putting into service. Puppet, an open-source configuration management software package, allows for a more efficient and logical way to help the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Data in the Cloud: Authentication Without Leaking

    Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

    Provided By SecurityTube.net

  • Webcasts // Jul 2013

    How to Build Your Own Pen Testing Lab in Amazon EC2

    In this webcast, the presenter explain the basics of Amazon's EC2 cloud infrastructure (e.g., EC2, VPC, basic network and routing, Elastic IPs, security groups, VPNs, and snapshots) and step-by-step instructions on configuring this infrastructure to build the users' own isolated test network complete with licensed victim servers or customized AMIs.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Big Data Intelligence: Harnessing Petabytes of WAF Statistics to Analyze & Improve Web Protection in the Cloud

    As web application attacks turn into massive campaigns against large corporations across the globe, web application firewall data increases exponentially, leaving security experts with a big data mess to analyze. Pinpointing real attacks in a sea of security event noise becomes an almost impossible tedious task. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Dropsmack: How Cloud Sync Services Render Your Corporate Firewall Worthless

    Cloud backup providers are marketing directly to corporate executives offering services that will \"Increase employee productivity\" or \"Provide virtual teaming opportunities.\" Offers such as these make it more likely than ever that any given corporate environment has some cloud backup solutions installed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Computing, A Weapon Of Mass Destruction?

    Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. The presenters have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service (DDoS), flooding, and packet fragmentation. In this...

    Provided By SecurityTube.net

  • Podcasts // Apr 2012

    Cloud-Based dWAF: A Real World Deployment Case Study

    In this podcast, the speaker explains the decision-making process of the customer during proof-of-concept, pilot and eventual deployment of a distributed Web App Firewall (dWAF). Post-deployment, the speaker go through the care and feeding of a dWAF protecting resources living in the public cloud, from technical hiccups and tradeoffs to...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Bulletproofing The Cloud: Are We Any Closer To Security?

    Cloud security has come into focus in the last few years; while many ways to break the cloud have been proposed; few solutions have been put forward. In this podcast, the speaker is primarily a conceptual discussion on how cloud providers can and should be (but probably are not) protecting...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    STRC: The Security Training And Research Cloud

    In this webcast, the presenter will explain how the cloud was built, what it's been used for, the potential uses in the future, and how it can be implemented in other areas. STRC is an Infrastructure-as-a-Service (IaaS) cloud focused on security research and training. The cost was kept to an...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How Overlay Networks Can Make Public Clouds Your Global WAN Network

    Enterprises, organizations and governments are realizing the benefits of cloud flexibility, cost savings, scalability and connectivity. Yet the traditional approach focuses too much on the underlying infrastructure, instead of the applications.

    Provided By SecurityTube.net

  • Podcasts // Sep 2009

    Cloud Security And Privacy

    In this podcast, the speaker will explain the cloud computing SPI delivery model and its impact on various aspects of enterprise information security (e.g., infrastructure, data, identity and access management, security management), privacy, and compliance. Security-as-a-Service (SaaS) and the impact of cloud computing on corporate IT is also discussed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Transcending Cloud Limitations By Obtaining Inner Piece

    With the abundance of cloud storage providers competing for the users' data, some have taken to offering services in addition to free storage. In this webcast, the presenter demonstrates the ability to gain unlimited cloud storage by abusing an overlooked feature of some of these services.

    Provided By SecurityTube.net