Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • Webcasts // Apr 2015

    Spam, Phish and Other Things Good to Eat

    In this webcast, the presenter will demo and release the source code for FeelingPhishy, a PHP tool the presenter created after getting several complaints from people in the industry that existing open source spam campaign solutions were too difficult to setup, had incomplete instructions or didn't work effectively.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Compliance Vs. Security - How to Build a Secure Compliance Program

    In this webcast, the presenter will overview of the issues with achieving and maintaining regulatory compliance, overview of 2014 data breaches and the common failure points, client case studies of PCI DSS and HIPAA security problems and recommendations on meeting regulatory compliance and maintaining a secure environment.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Applied Detection and Analysis Using Flow Data

    While network flow data isn't a new concept, it is easily one of the most powerful data types the users can have in their arsenal as a network defender. It is incredibly low overhead, easy to setup and maintain, and provides tremendously flexible capabilities for Network Security Monitoring (NSM) detection...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Five Practical Things You Aren't Doing to Secure Your Information, But Could Be

    In this webcast, the presenter will present five things that each audience member could be doing, right now, to protect the information assets of the organization they work for. Not user education. Not theoretical policies. Not magic hand waving.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Privacy Notions for Data Publishing and Analysis

    Data collected by organizations and agencies are a key resource in today's information age. The use of sophisticated data mining techniques makes it possible to extract relevant knowledge that can then be used for a variety of purposes, such as research, developing innovative technologies and services, intelligence and counterterrorism operations...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    New Insights for Driving Cloud Strategy

    You don’t know what you don’t know! New insights for driving cloud strategy through analysing existing behavior. You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Apr 2015

    Hadoop Security: Seven Ways to Kill an Elephant

    Many companies are getting Hadoopy often with little or no consideration of security because big data is on their list of cool projects. Infosec is in this game but big data is moving at a pace faster than the controls are being considered.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Crypto in the Cloud

    Although cloud services become more and more popular, security concerns of the customers prevent a stronger adoption. Customers are mainly afraid of data leakage and loss of data. In this webcast, several cryptographic mechanisms are explained that may help to protect the user against these aforementioned risks.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Defining an Abstract Architecture for Managing Unstructured Data Using MongoDB - Use Case of VDrive

    Knowledge access and knowledge sharing is essential in contemporary classrooms. Building an university-level digital storage is important for empowering knowledge access. It is a way to improve efficient knowledge distribution and collaboration among students. Considering the importance of the knowledge sharing, it is important that its foundation is solid, efficient...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Data Categorization and Classification

    With both the move to mobile and to the cloud, the challenge of protecting sensitive data as it flows from point can be daunting. The first step is to classify the data, as required by the state administrative manual, and that can be a difficult step to take.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Don't Get Caught on Cloud 9

    Cloud solutions require that public and private entities release physical control over their systems and data. This webcast will provide attendees with a presentation of how to plan and secure data running on cloud solutions to avoid service and data risks while maintaining control at improved performance and cost.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Risk Analysis, Big Data, and the Butterfly Effect

    Continuous assessment and analysis of risk means selecting an approach or risk framework, gathering the structured and unstructured data the user need from across the agency from security sensors, and viewing the data in the context of IT operations and applications data - all this while analyzing the data in...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    The Internet of Things: Data Access Policy

    Typically, organizations do not have policy structures based on dated data access archetypes, and this policy structure is lagging behind the rate of innovation, as well as the inherent security challenges that have resulted from an increasingly mobile workforce and constituency.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Who Has My Data and How Did They Get It?

    The need for increased visibility and controls over who has access to application data and unstructured data is becoming increasingly important to prevent breaches. And when there is a breach, how do the users expedite decisions to resolve the breach? Data breaches underwent explosive growth in 2013: 740 million records...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Security with Privacy - A Research Agenda

    Cloud computing is a key technology for storing, managing and analyzing big data. However, such large, complex, and growing data, typically collected from various data sources, such as sensors and social media, can often contain Personally Identifiable Information (PII) and thus the organization collecting the big data may want to...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Cloud-Based Data Validation Patterns: We Need a New Approach

    Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

    Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Give Me Your Data!: Pilfering Data Without Breaking In

    The people hear new stories daily about a malicious hacker compromising the sensitive data of corporations, governments and individuals. But that is only half of the story. The genesis of this webcast is from the idea that even today, data is still not stored securely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    A Virtual Scada Laboratory for Cybersecurity Pedagogy and Research

    In this webcast, the presenter will describe a virtual Supervisory Control And Data Acquisition (SCADA) laboratory. This virtual laboratory was built using virtual devices that simulate industrial processes, emulate control system ladder logic functionality, and utilize control system communication protocols.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds

    In this webcast, the presenter will discuss Crypsis, a system that allows execution of MapReduce-style data analysis jobs directly on encrypted data. Crypsis transforms data analysis scripts written in Pig Latin so that they can be executed on encrypted data.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Learning From InfoSec Maturity: A Textual Analysis

    The Building Security In Maturity Model V (BSIMM-V) is an industry-driven maturity model dedicated to software security, which specifies a set of activities designed to foster an improved security posture within the organization. This webcast explores the firm characteristics and approaches to information risk of the participating BSIMM-V firms, primarily...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    On-demand Webcast: Don't Drown in Your Data Lake. Improve Productivity and Decisions with a Well Governed Data Reservoir

    Many organizations are updating their data architectures to include one or more data lakes -- large pools of unstructured data that are available for multiple, unpredictable queries and uses. When you draw data from the lake, how confident are you that it’s not only relevant but also timely and clean?...

    Provided By IBM

  • Webcasts // Jan 2015

    The Automobile as Massive Data Gathering Source and the Consequences for Individual Privacy

    In this webcast, the presenter will report about a LOAD e. V. study regarding data collection of cars, future developments of this technology field, how this data is accessed and secured and what the stakeholders (car manufacturers, car owners and users) positions are on this data gathering. In a summary,...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    NetApp Virtual Insight ASEAN

    Navigate into The New IT Landscape Join us for this LIVE event! Tuesday, 27 January at 10am Singapore Time Insight is about innovation. This virtual event is devoted to the technology-curious storage and data management professional, including system engineers, professional services consultants, channel partners, and...

    Provided By NetApp

  • Webcasts // Dec 2014

    Oracle Data Redaction Is Broken

    The Oracle data redaction service is a new feature introduced with Oracle 12c. It allows sensitive data, such as PII, to be redacted or masked to prevent it being exposed to attackers. On paper this sounds like a great idea but in practice, Oracle's implementation is vulnerable to multiple attacks...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Stolen Data Markets an Economic and Organizational Assessment

    The substantial loss of customer data and resulting fraud have seemingly become more common, including the announcement of the target and Neiman Marcus compromises in 2013. As a result, the social and technical sciences are increasingly examining the market for data resale which is driven in part by these data...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Data Transforming Your Sewage Into Signatures

    What happens when the users collect a bunch of good data, under good pretences only to realize that the findings that they were expecting are completely wrong? Before they quit infosec and retreat to a farm, allow the presenter to tell them about how the presenter's data transformed data sewage...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Babar-Ians at the Gate: Data Protection at Massive Scale

    In this webcast, the presenter will explain how best to handle the looming big data risk in any environment. Better predictions and more intelligent decisions are expected from biggest data sets, yet do the users really trust systems they secure the least? And do they really know why "Learning" machines...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Stay Out of the Kitchen a DLP Security Bake-Off

    Despite a plethora of data security and protection standards and certifications, companies and their systems are still leaking information like a sieve. Data Loss Prevention (DLP) solutions have often been touted as the \"Silver bullet\" that will keep corporations from becoming the next headline.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring

    In this webcast, the presenter will describe the different techniques available for data analysis and machine learning for information security, and discuss their strengths and caveats. The ghost of marketing past will also show how similar the unfulfilled promises of deterministic and exploratory analysis were, and how to avoid making...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Provided By ObserveIT

  • Webcasts // Oct 2014

    Adopting a Risk-Based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data

    Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, perimeter and infrastructure-based security programs no longer serve the dynamic security needs of organizations. A risk-based threat model can enable the user to regain control of their critical data regardless of where it resides, and empower their...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    On-demand Webcast: Centrify and Dropbox for secure collaboration

    Dropbox for Business lets organizations better access and control company data, with admin features that make it easy to deploy, provision, and manage effectively. Centrify offers an easy-to-deploy cloud service that delivers the industry's most comprehensive solution for Active Directory-based single sign-on, access control, and mobile device management for thousands...

    Provided By Centrify

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Oct 2014

    Blended Web and Database Attacks: Real-Time, In-Memory Platforms

    It is well known there is a race going on in the "Big data" arena (take a drink for even thinking about the "Internet of things"). One of the stronger competitors in the "Big data" market is real-time, in-memory platforms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    A Critical Overview of 10 Years of Privacy Enhancing Technologies

    In this webcast, the presenter will provide a critical overview of \"Privacy research\" within computer science. The mechanisms proposed in the last ten year include mechanisms for anonymous communications, censorship resistance, selective disclosure credentials (and their integration in identity management systems), as well as privacy in databases.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Data Recovery Techniques

    In this webcast, the presenter explains about data recovery techniques. Salvaging and handling the data through the data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external Hard Disk Drives...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    AppSec Survey 2.0: Fine-Tuning an AppSec Training Program Based on Data

    Measuring the effectiveness of any security activity is widely discussed - security leaders debate the topic with a religious fervor rivaling that of any other hot button issue. Virtually every organization has some sort of application security training effort, but data on training effectiveness remains scarce.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Provided By EMC