Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • Webcasts // Aug 2015

    On-demand Webroot webinar: How to fight modern malware with the power of collective threat intelligence

    Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm. According to Webroot, over 20 billion new internet-connected devices are expected to come online in the next few...

    Sponsored By Webroot

  • Webcasts // Jul 2015

    On-Demand Webcast: Language of Support Pages Webinar

    You try to be modern. You try to build cool products. You try to use the latest tech. So why are you OK using outdated and irrelevant language when speaking to customers? Language is the easiest thing to change in customer support, and it’s quite possibly the most important...

    Sponsored By Citrix Online

  • Webcasts // Jun 2015

    Live Webcast: Captivating the Crowd: How to Create Compelling Presentations That Attract and Engage Clients, Customers and Colleagues

    Learn how to captivate any crowd. Join us for this LIVE Event on Date: Thursday, June 25 Time: 11 AM (PDT) / 2 PM (EDT) Speaker: Michael Parrish DuDell, bestselling author and award-winning keynote speaker Join us for this webinar to learn: 3 tweaks that will improve...

    Sponsored By Citrix

  • Webcasts // Apr 2015

    Webinar: Top 5 Benefits of Contract Lifecycle Management

    The market for contract lifecycle management (CLM) solutions is taking off, with revenues expected to grow 12% in 2015. As paper-based processes become more expensive and less efficient by the day, CLM lets organizations create, negotiate, manage, and enforce their contracts uniformly and quickly, enhancing agility and compliance. In this...

    Sponsored By Open Text

  • Webcasts // Apr 2015

    On-Demand Webcast: Under the Hood - How to Fire Up Your Employee Culture for Maximum Performance

    Based on thought leader Stan Slap's much anticipated second book, Stan delivers a story filled, high content presentation on how employee cultures work and how to work it. If your job success involves achieving results through others and those others work for you - understanding the true motivation of an...

    Sponsored By Citrix

  • Webcasts // Jul 2015

    10 Reasons Your Security Education Program Sucks

    There's no patch for human stupidity-"Training users is a waste of time and resources". Comments like these are not uncommon in the information security community. To that the presenter says, "Seriously guys, it doesn't have to be this hard". In this webcast, the presenter will go through the top ten...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Cymon: New Cyber Monitoring Tool

    It is the largest tracker of open-source security reports on malware, botnets, phishing and other malicious activities. Cymon ingests over 50K events and 15K unique IP's per day from almost 200 sources across the Internet to build a threat profile and timeline for IP's, domains and URLs.

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    That's Not My RJ45 Jack! IRL Networking for Humans PT. 1

    In this webcast, the presenter will discuss the specifics behind building up the soft skills necessary to effectively socialize and network with other human beings. This webcast will go beyond the obvious "Do this; don't do that" information and focus heavily on how, where and what to practice in order...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Intelligence-Led Penetration Testing

    As cyber-attacks become have become sophisticated and prevalent, it is key that penetration testing evolves accordingly to continue to add value to the organizations that use it as a key security control. Utilizing threat intelligence and OSINT as the scoping tools to make a penetration test bespoke, relevant and realistic...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Adventures in Communication: Taming the C-Suite and Board

    Organizational concern over information security issues continues to rise in nearly all industries. This concern is providing security professionals unprecedented visibility at the executive and board level, yet many of the users are ill prepared for the opportunity. This webcast will share communications principles, success stories and lessons learned over...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Gray Hat PowerShell

    People are beginning to realize that there is more to PowerShell than another scripting language. With the adoption come more tools and resources for both the offensive and defensive sides of security. This webcast is designed to give a first-hand look of using PowerShell in both an offensive attacking scenario...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Secret Pentesting Techniques

    It seems that businesses are truly struggling with how to handle the threats the people face as organizations when it comes to information security. From breach to breach, the techniques seem similar yet they completely rip through everything they have tried to protect against. As an industry, they are fighting...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Hacker-NG: Farming the Future It Crowd

    In this webcast, hear the perception of a basement hacker turned IT professional about learning how to learn, the challenges of growing up in "The underground", and bridging the gap into the professional arena; and members of the Reynoldsburg High School Cyber Patriot team who are forging their skills and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Real Experiences: Transforming Application Delivery for Continuous Innovation

    Key Takeaways: Learn from real experiences in transforming large organizations for increased speed and quality using a DevOps approach. Explore the characteristics and behavior of fast-moving companies, based on hundreds of assessments, interviews and implementations. Begin a self-assessment designed to give you a better understanding of your organization's readiness and...

    Provided By IBM

  • Webcasts // Feb 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Application Security Verification Standard

    The OWASP Application Security Verification Standard (ASVS) project provides a basis for testing web application technical security controls. Bill will take the users through the ins and outs of the four verification levels and the thirteen verification standard. When the users leave, they'll have a free, comprehensive test plan to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hacking WPS with Reaver to Crack WPA WPA2 Passwords

    In this webcast, the presenter will teach the users how to get WPA and WPA2 password by exploiting the weakness in WPS. This is an easy verbal step by step guide to follow. Enjoy! If the users are using VMware, Virtual box, or any Virtual application they will need to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Too Many Cooks - Exploiting the Internet-of-TR-069-Things

    In this webcast, the presenter will begin by describing their previous efforts presented this summer (DEF CON 22 & more), where their group revealed critically vulnerable TR-069 server deployments and discussed the incomprehensible asymmetry between the trust instated in this protocol and the measures taken to protect it (or lack...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abusing Software Defined Networks

    Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Attacking the Internet of Things (Using Time)

    Internet of Things (IoT) devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. The presenter will discuss how timing attacks work, how...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    You're Leaking Trade Secrets

    Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While the people hear a lot about personal privacy, little is said in regard to organizational privacy.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Bypass Firewalls and Application White Lists and Secure Remote Desktops Under 20 Seconds

    In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is, imagine a scenario, where the person have deployed a malware on a user's workstation, but the target information is on a secure server accessed via two-factor...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Combating Next-Generation Malware with Fast Forward-Secure Logging

    Security analytics is a catchall term for vulnerability assessment and intrusion detection leveraging security logs from a wide array of Security Analytics Sources (SASs), which include firewalls, VPNs, and endpoint instrumentation. Today, nearly all security analytics systems suffer from a lack of even basic data protections. An adversary can eavesdrop...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Run Away if You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices in Dense Networks

    Wireless Local Area Networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    On Emulation-Based Network Intrusion Detection Systems

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity. Emulation-based network intrusion detection systems are regarded as a...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Investigating Powershell Attacks

    Over the past two years, the presenters have seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If the user's organization is running Windows 7 or Server 2008 R2, they've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!).

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net