SecurityTube.net

Displaying 1-40 of 167 results

  • Webcasts // Aug 2014

    Bring Your Own Risky Apps

    Bring Your Own Device (BYOD) is a cute and harmless-sounding acronym for a trend that is in reality introducing exponentially more risk to end-users and organizations. The common refrain is to seek out and secure the user's Smartphone's and tablets from malware and other malicious software which can wreck havoc...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    A Better Way to Get Intelligent About Threats

    A recent ponemon report on exchanging cyber threat intelligence states that current threat sharing mechanisms are broken. A threat intelligence platform should achieve many things, but most importantly it should offer a singular platform to aggregate, analyze, and act on threat intelligence data as well as offer options for context,...

    Provided By SecurityTube.net

  • Podcasts // Jun 2014

    CryptoLocker - The Ransomware Trojan

    The CryptoLocker malware encrypts certain files with a private key and demands payment to regain access to the files. In this podcast, the speaker will presents deep dive into CryptoLocker and looks at the latest information around what is called one of the two most sophisticated and destructive forms of...

    Provided By SecurityTube.net

  • Podcasts // May 2014

    Digging Deeper Into the IE Vulnerability

    Web browser vulnerabilities remain a fertile ground for hackers to harvest and mount attacks. Latest vulnerabilities found in Internet Explorer (IE) and urgent response from Microsoft highlights the fact that despite end of life announcements for old and less secure products, millions of users remain exposed to threats.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Cloud - Storms on the Horizon

    At its heart, the \"Cloud\", as it's so lovingly referred to, is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of the users' IT woes, often invoking images of care-bears, marshmallows, and other such nirvanic images. But beyond the marketing pitches, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cryptohaze Cloud Cracking

    In this webcast, the presenter explain about the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze Multiforcer is an open source, GPLv2, network enabled platform for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Covering Your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS

    Cloud security is often treated as a single topic, but in practice it differs widely between SaaS (such as Google Apps), PaaS (such as Amazon's S3 storage as a service) and IaaS (such as Verizon Terramark and VMware vCloud). In this webcast, the presenter look at real-world case studies of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Managing Security within The Cloud

    Now that the users' enterprise borders have all but disolved and their data is spread around the world, the speaker must face the fact that the cloud is real. Dealing with security in the cloud requires a change in mindset and approach but isn't so different from what they are...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hack the Cloud

    Moving to the cloud means shared risk and often less insight into matters of security. There's a lot to audit, a lot to know, and a lot that's missed. Knowing where to look, the questions to ask, and how to test are key to knowing how to manage the users'...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloudy Weather - How Secure is the Cloud?

    In this webcast, the presenter explain the security features and compliance levels of Windows Azure and also give guidance on how the user can use the features available to build solutions that meet their security requirements.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Real World Cloud Application Security

    In this webcast, the presenter will provide how the real world organizations using the public cloud are approaching application security. The presenter will cover a variety of topics of interest to application security personnel, including: automating and integrating security into CI/CD environments, large scale vulnerability management, continuous security testing and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Training and Research Cloud (STRC)

    In this webcast, the presenter provides an overview of the cloud, what was used to build it (keeping cost as low as possible), how it is being utilized, and what the future looks like for Security Training and Research Cloud (STRC). The cloud provides numerous virtual machines for security training...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Cloud and Security Be Used in the Same Sentence?

    In this webcast, the presenter will discuss the cloud, how the user can secure it and what has changed. The enterprise is built with metal, while the cloud is built with software. What does that do to security? Where is the users' hardware appliances and how do \"Cloud\" them? The...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystifying Security in the Cloud: AWS Scout

    In this webcast, the presenter will discuss the most common mistakes that they have seen in the field and show the user how to audit them using AWS Scout. The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by enterprise...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Get Off of My Cloud: Cloud Credential Compromise and Exposure

    An Amazon Machine Image (AMI) is a virtual appliance container used to create Virtual Machines (VMs) within the Amazon Elastic Compute Cloud (EC2). EC2 instances typically interact with a variety of Amazon Web Services (AWS), and as such require access to AWS credentials and private key materials. In this podcast,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Threat Modeling Cloud Applications: What You Don't Know Will Hurt You

    Threat modeling is a critical activity for identifying such vulnerabilities early in the development process. Proper threat modeling requires the identification of application's assets, security controls and attackers. For applications based on Amazon Web Services (AWS), there are subtle differences in the security controls provided by AWS when compared to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Socially Owned in the Cloud

    In this webcast, the presenter will present a survey of the most popular cloud/web applications and their responses to a questioner regarding their data retention, data ownership, their commercial use of the data they have harvested.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Battery Firmware Hacking

    In this podcast, the speaker will demonstrate how the embedded controller works. The speaker will reverse engineer the firmware and the firmware flashing process for a particular smart battery controller. In particular, the speaker will show how to completely reprogram the smart battery by modifying the firmware on it.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Scan Web Servers for Vulnerabilities with Vega

    Vega is a very simple web server vulnerability scanner that ships with Kali Linux and is available under Windows and Mac. In this podcast, the speaker will be using the open source application Vega to scan web servers for vulnerabilities.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How to Use SQLNINJA to Takeover MS-SQL Database Servers

    In this podcast, the user will learn how to exploit MS-SQL. The speaker will explore advanced MS-SQL Database. For Exploiting a MS-SQL Database Hoody is using a tool called SQLNINJA. SQLNINJA is a very powerful SQLI exploitation tool.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Using Web Proxy Servers for Hacking

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Being a Puppet Master: Automating Amazon EC2 with Puppet Friends

    The benefits of cloud-computing (specifically IaaS) can be quickly outweighed by the time and effort that it takes to manage the quickly scalable hosts the users' company may be putting into service. Puppet, an open-source configuration management software package, allows for a more efficient and logical way to help the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Data in the Cloud: Authentication Without Leaking

    Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Big Data Intelligence: Harnessing Petabytes of WAF Statistics to Analyze & Improve Web Protection in the Cloud

    As web application attacks turn into massive campaigns against large corporations across the globe, web application firewall data increases exponentially, leaving security experts with a big data mess to analyze. Pinpointing real attacks in a sea of security event noise becomes an almost impossible tedious task. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Dropsmack: How Cloud Sync Services Render Your Corporate Firewall Worthless

    Cloud backup providers are marketing directly to corporate executives offering services that will \"Increase employee productivity\" or \"Provide virtual teaming opportunities.\" Offers such as these make it more likely than ever that any given corporate environment has some cloud backup solutions installed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Computing, A Weapon Of Mass Destruction?

    Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. The presenters have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service (DDoS), flooding, and packet fragmentation. In this...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Bulletproofing The Cloud: Are We Any Closer To Security?

    Cloud security has come into focus in the last few years; while many ways to break the cloud have been proposed; few solutions have been put forward. In this podcast, the speaker is primarily a conceptual discussion on how cloud providers can and should be (but probably are not) protecting...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    STRC: The Security Training And Research Cloud

    In this webcast, the presenter will explain how the cloud was built, what it's been used for, the potential uses in the future, and how it can be implemented in other areas. STRC is an Infrastructure-as-a-Service (IaaS) cloud focused on security research and training. The cost was kept to an...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How Overlay Networks Can Make Public Clouds Your Global WAN Network

    Enterprises, organizations and governments are realizing the benefits of cloud flexibility, cost savings, scalability and connectivity. Yet the traditional approach focuses too much on the underlying infrastructure, instead of the applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Transcending Cloud Limitations By Obtaining Inner Piece

    With the abundance of cloud storage providers competing for the users' data, some have taken to offering services in addition to free storage. In this webcast, the presenter demonstrates the ability to gain unlimited cloud storage by abusing an overlooked feature of some of these services.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Post Exploitation Operations with Cloud Synchronization Services

    Cloud backup solutions, such as Dropbox, provide a convenient way for users to synchronize files between user devices. These services are particularly attractive to users, who always want the most current version of critical files on every device. Many of these applications \"Install\" into the user's profile directory and the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Sec. And Net. Forensics: 12 Cloud Computing

    In this podcast, the speaker provides an introduction to cluster, grid and cloud infrastructures. They also define an example of grid computing and its advantages, the usage of Amazon web services, including S3 and the EC2 cloud and outline the usage of RESTful web services.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Cloud - Storms on the Horizon

    At its heart, the \"Cloud\", as it's so lovingly referred to, is really just shorthand for shared resources. The cloud is regularly touted as the answer to all of the users' IT woes, often invoking images of care-bears, marshmallows, and other such nirvanic images. But beyond the marketing pitches, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cryptohaze Cloud Cracking

    In this webcast, the presenter explain about the latest developments in the Cryptohaze GPU based password cracking suite. WebTables is a new rainbow table technology that eliminates the need to download rainbow tables before using them, and the new Cryptohaze Multiforcer is an open source, GPLv2, network enabled platform for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Covering Your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS

    Cloud security is often treated as a single topic, but in practice it differs widely between SaaS (such as Google Apps), PaaS (such as Amazon's S3 storage as a service) and IaaS (such as Verizon Terramark and VMware vCloud). In this webcast, the presenter look at real-world case studies of...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Managing Security within The Cloud

    Now that the users' enterprise borders have all but disolved and their data is spread around the world, the speaker must face the fact that the cloud is real. Dealing with security in the cloud requires a change in mindset and approach but isn't so different from what they are...

    Provided By SecurityTube.net

  • Webcasts // Aug 2012

    The New Frontier, Welcome the Cloud Brokers

    In this webcast, the presenter explain a new concept of \"Cloud brokers\" and brokerage came to light with the recent release of the GSA cloud broker RFI. What does that mean for the cloud professionals of today (skills they need) and the cloud professionals of tomorrow (skills they are going...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hack the Cloud

    Moving to the cloud means shared risk and often less insight into matters of security. There's a lot to audit, a lot to know, and a lot that's missed. Knowing where to look, the questions to ask, and how to test are key to knowing how to manage the users'...

    Provided By SecurityTube.net

  • Webcasts // Feb 2012

    Cryptographic Protocols in the Era of Cloud Computing

    With the advent of cloud computing, their view of cryptographic protocols has changed dramatically. In this webcast, the presenter will give an overview of some of the newer challenges that they face in cloud cryptography and outline some of the techniques used to solve these problems.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloudy Weather - How Secure is the Cloud?

    In this webcast, the presenter explain the security features and compliance levels of Windows Azure and also give guidance on how the user can use the features available to build solutions that meet their security requirements.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Real World Cloud Application Security

    In this webcast, the presenter will provide how the real world organizations using the public cloud are approaching application security. The presenter will cover a variety of topics of interest to application security personnel, including: automating and integrating security into CI/CD environments, large scale vulnerability management, continuous security testing and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Training and Research Cloud (STRC)

    In this webcast, the presenter provides an overview of the cloud, what was used to build it (keeping cost as low as possible), how it is being utilized, and what the future looks like for Security Training and Research Cloud (STRC). The cloud provides numerous virtual machines for security training...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Cloud and Security Be Used in the Same Sentence?

    In this webcast, the presenter will discuss the cloud, how the user can secure it and what has changed. The enterprise is built with metal, while the cloud is built with software. What does that do to security? Where is the users' hardware appliances and how do \"Cloud\" them? The...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystifying Security in the Cloud: AWS Scout

    In this webcast, the presenter will discuss the most common mistakes that they have seen in the field and show the user how to audit them using AWS Scout. The scale and variety of Amazon Web Servers (AWS) has created a constantly changing landscape. What was previously managed by enterprise...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Get Off of My Cloud: Cloud Credential Compromise and Exposure

    An Amazon Machine Image (AMI) is a virtual appliance container used to create Virtual Machines (VMs) within the Amazon Elastic Compute Cloud (EC2). EC2 instances typically interact with a variety of Amazon Web Services (AWS), and as such require access to AWS credentials and private key materials. In this podcast,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Threat Modeling Cloud Applications: What You Don't Know Will Hurt You

    Threat modeling is a critical activity for identifying such vulnerabilities early in the development process. Proper threat modeling requires the identification of application's assets, security controls and attackers. For applications based on Amazon Web Services (AWS), there are subtle differences in the security controls provided by AWS when compared to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Socially Owned in the Cloud

    In this webcast, the presenter will present a survey of the most popular cloud/web applications and their responses to a questioner regarding their data retention, data ownership, their commercial use of the data they have harvested.

    Provided By SecurityTube.net

  • Podcasts // Jan 2011

    Risk Perception and Trust in Cloud

    In this podcast, the speaker explain an introduction to the cloud and some of its advantages and disadvantages. It discusses the role of risk perception and trust in security and privacy challenges of the cloud. It also makes recommendations addressing these challenges. Many companies today are paying attention to cloud...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Battery Firmware Hacking

    In this podcast, the speaker will demonstrate how the embedded controller works. The speaker will reverse engineer the firmware and the firmware flashing process for a particular smart battery controller. In particular, the speaker will show how to completely reprogram the smart battery by modifying the firmware on it.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Scan Web Servers for Vulnerabilities with Vega

    Vega is a very simple web server vulnerability scanner that ships with Kali Linux and is available under Windows and Mac. In this podcast, the speaker will be using the open source application Vega to scan web servers for vulnerabilities.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How to Use SQLNINJA to Takeover MS-SQL Database Servers

    In this podcast, the user will learn how to exploit MS-SQL. The speaker will explore advanced MS-SQL Database. For Exploiting a MS-SQL Database Hoody is using a tool called SQLNINJA. SQLNINJA is a very powerful SQLI exploitation tool.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Using Web Proxy Servers for Hacking

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Being a Puppet Master: Automating Amazon EC2 with Puppet Friends

    The benefits of cloud-computing (specifically IaaS) can be quickly outweighed by the time and effort that it takes to manage the quickly scalable hosts the users' company may be putting into service. Puppet, an open-source configuration management software package, allows for a more efficient and logical way to help the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Data in the Cloud: Authentication Without Leaking

    Assurance of authenticity as well as confidentiality of data is an important problem, in cloud computing and in third-party data distribution environments. Existing data authentication schemes for structured and semi-structured data such as trees and graphs leak information, leading to privacy and confidentiality breaches.

    Provided By SecurityTube.net

  • Webcasts // Jul 2013

    How to Build Your Own Pen Testing Lab in Amazon EC2

    In this webcast, the presenter explain the basics of Amazon's EC2 cloud infrastructure (e.g., EC2, VPC, basic network and routing, Elastic IPs, security groups, VPNs, and snapshots) and step-by-step instructions on configuring this infrastructure to build the users' own isolated test network complete with licensed victim servers or customized AMIs.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Big Data Intelligence: Harnessing Petabytes of WAF Statistics to Analyze & Improve Web Protection in the Cloud

    As web application attacks turn into massive campaigns against large corporations across the globe, web application firewall data increases exponentially, leaving security experts with a big data mess to analyze. Pinpointing real attacks in a sea of security event noise becomes an almost impossible tedious task. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Dropsmack: How Cloud Sync Services Render Your Corporate Firewall Worthless

    Cloud backup providers are marketing directly to corporate executives offering services that will \"Increase employee productivity\" or \"Provide virtual teaming opportunities.\" Offers such as these make it more likely than ever that any given corporate environment has some cloud backup solutions installed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud Computing, A Weapon Of Mass Destruction?

    Using cloud computing to attack systems allows for the testing of a company's incident response and recovery program. The presenters have been using the cloud computing environment to test real world scenarios for different types of attacks, such as Distributed Denial of Service (DDoS), flooding, and packet fragmentation. In this...

    Provided By SecurityTube.net

  • Podcasts // Apr 2012

    Cloud-Based dWAF: A Real World Deployment Case Study

    In this podcast, the speaker explains the decision-making process of the customer during proof-of-concept, pilot and eventual deployment of a distributed Web App Firewall (dWAF). Post-deployment, the speaker go through the care and feeding of a dWAF protecting resources living in the public cloud, from technical hiccups and tradeoffs to...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Bulletproofing The Cloud: Are We Any Closer To Security?

    Cloud security has come into focus in the last few years; while many ways to break the cloud have been proposed; few solutions have been put forward. In this podcast, the speaker is primarily a conceptual discussion on how cloud providers can and should be (but probably are not) protecting...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    STRC: The Security Training And Research Cloud

    In this webcast, the presenter will explain how the cloud was built, what it's been used for, the potential uses in the future, and how it can be implemented in other areas. STRC is an Infrastructure-as-a-Service (IaaS) cloud focused on security research and training. The cost was kept to an...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    How Overlay Networks Can Make Public Clouds Your Global WAN Network

    Enterprises, organizations and governments are realizing the benefits of cloud flexibility, cost savings, scalability and connectivity. Yet the traditional approach focuses too much on the underlying infrastructure, instead of the applications.

    Provided By SecurityTube.net

  • Podcasts // Sep 2009

    Cloud Security And Privacy

    In this podcast, the speaker will explain the cloud computing SPI delivery model and its impact on various aspects of enterprise information security (e.g., infrastructure, data, identity and access management, security management), privacy, and compliance. Security-as-a-Service (SaaS) and the impact of cloud computing on corporate IT is also discussed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Transcending Cloud Limitations By Obtaining Inner Piece

    With the abundance of cloud storage providers competing for the users' data, some have taken to offering services in addition to free storage. In this webcast, the presenter demonstrates the ability to gain unlimited cloud storage by abusing an overlooked feature of some of these services.

    Provided By SecurityTube.net