Networking

SDN, NFV, and a host of other cutting-edge technologies are hitting your network faster than you can say Ethernet Fabric. But which are truly critical?

  • Webcasts // Aug 2015

    On-demand Webroot Webinar: How to fight modern malware with the power of collective threat intelligence

    Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm. According to Webroot, over 20 billion new internet-connected devices are expected to come online in the next few...

    Sponsored By Webroot

  • Webcasts // Jul 2015

    On-Demand Webcast: Language of Support Pages Webinar

    You try to be modern. You try to build cool products. You try to use the latest tech. So why are you OK using outdated and irrelevant language when speaking to customers? Language is the easiest thing to change in customer support, and it’s quite possibly the most important...

    Sponsored By Citrix Online

  • Webcasts // Jun 2015

    Live Webcast: Captivating the Crowd: How to Create Compelling Presentations That Attract and Engage Clients, Customers and Colleagues

    Learn how to captivate any crowd. Join us for this LIVE Event on Date: Thursday, June 25 Time: 11 AM (PDT) / 2 PM (EDT) Speaker: Michael Parrish DuDell, bestselling author and award-winning keynote speaker Join us for this webinar to learn: 3 tweaks that will improve...

    Sponsored By Citrix

  • Webcasts // Apr 2015

    Webinar: Top 5 Benefits of Contract Lifecycle Management

    The market for contract lifecycle management (CLM) solutions is taking off, with revenues expected to grow 12% in 2015. As paper-based processes become more expensive and less efficient by the day, CLM lets organizations create, negotiate, manage, and enforce their contracts uniformly and quickly, enhancing agility and compliance. In this...

    Sponsored By Open Text

  • Webcasts // Apr 2015

    On-Demand Webcast: Under the Hood - How to Fire Up Your Employee Culture for Maximum Performance

    Based on thought leader Stan Slap's much anticipated second book, Stan delivers a story filled, high content presentation on how employee cultures work and how to work it. If your job success involves achieving results through others and those others work for you - understanding the true motivation of an...

    Sponsored By Citrix

  • Webcasts // Aug 2015

    Advancing Internet Security Research With Big Data and Graph Databases

    The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS. The webcast will give a...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Analogue Network Security

    Today, it is the inter-infrastructural foundation of civilization. The internet of things is adding so-called intelligence to some 50+ billion endpoints. Where's the security? Or privacy? Massive new projects using next generation, smarter, faster ways of doing the same old stuff all over again is the ultimate deja vu epic...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Approaching Secure Code

    In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected software are occurring every day. Developers must learn to code in a secure fashion to have any chance of providing...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Changing Network Detection Using Distributed Computing Concepts

    In this webcast, the presenter will focus on new network detection methodologies by leveraging Bro to send data to a backend or cloud. Here they can process the data where resources are not as limited. Sensors may also be treated as expendable resources that can easily be swapped out. The...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Proprietary Network Protocols - Risky Business on the Wire

    When speed and latency counts, there is no place for standard HTTP/SSL stack and a wise head comes up with a proprietary network protocol. How to deal with embedded software or thick clients using protocols with no documentation at all? Binary TCP connections, unlike anything, impossible to be adapted by...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Information Security Reconciliation: The Scene and the Profession

    Whether people want to admit it or not, there's a strong, concerning segmentation that's more obvious than ever within information security. On this 5th anniversary of security B-Sides Detroit, this presenter will provide an unapologetic perspective of what the presenter have seen, what the presenter am seeing and what the...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    10 Reasons Your Security Education Program Sucks

    There's no patch for human stupidity-"Training users is a waste of time and resources". Comments like these are not uncommon in the information security community. To that the presenter says, "Seriously guys, it doesn't have to be this hard". In this webcast, the presenter will go through the top ten...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Cymon: New Cyber Monitoring Tool

    It is the largest tracker of open-source security reports on malware, botnets, phishing and other malicious activities. Cymon ingests over 50K events and 15K unique IP's per day from almost 200 sources across the Internet to build a threat profile and timeline for IP's, domains and URLs.

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    That's Not My RJ45 Jack! IRL Networking for Humans PT. 1

    In this webcast, the presenter will discuss the specifics behind building up the soft skills necessary to effectively socialize and network with other human beings. This webcast will go beyond the obvious "Do this; don't do that" information and focus heavily on how, where and what to practice in order...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Intelligence-Led Penetration Testing

    As cyber-attacks become have become sophisticated and prevalent, it is key that penetration testing evolves accordingly to continue to add value to the organizations that use it as a key security control. Utilizing threat intelligence and OSINT as the scoping tools to make a penetration test bespoke, relevant and realistic...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Adventures in Communication: Taming the C-Suite and Board

    Organizational concern over information security issues continues to rise in nearly all industries. This concern is providing security professionals unprecedented visibility at the executive and board level, yet many of the users are ill prepared for the opportunity. This webcast will share communications principles, success stories and lessons learned over...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Gray Hat PowerShell

    People are beginning to realize that there is more to PowerShell than another scripting language. With the adoption come more tools and resources for both the offensive and defensive sides of security. This webcast is designed to give a first-hand look of using PowerShell in both an offensive attacking scenario...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Secret Pentesting Techniques

    It seems that businesses are truly struggling with how to handle the threats the people face as organizations when it comes to information security. From breach to breach, the techniques seem similar yet they completely rip through everything they have tried to protect against. As an industry, they are fighting...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Hacker-NG: Farming the Future It Crowd

    In this webcast, hear the perception of a basement hacker turned IT professional about learning how to learn, the challenges of growing up in "The underground", and bridging the gap into the professional arena; and members of the Reynoldsburg High School Cyber Patriot team who are forging their skills and...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Why the Foundation of Security Is Broken

    Explain a high level approach to a low level concept. Explain how the CPU views the memory. Go over the fact everything the users use is written in C. Exploits in C programming (buffer overflow/dangling pointer). Then explain methods to help prevent those attacks (ALSR, stack canaries and DEP)/(EMET, PAX/GRsecruity...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Surfing the Sea and Drowning in Tabs: An Introduction to Cross-Site Request Forgery

    With more web applications using persistent logins and users keeping more applications open in browser tabs, Cross-Site Request Forgery (CSRF) is an attractive vulnerability for malicious actors to exploit. CSRF is one of the OWASP Top 10, and rightfully so. This webcast will describe the vulnerability, show some examples (maybe...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Deploying Honeypots to Gather Actionable Threat Intelligence

    Threat intelligence seems to be all the rage. There are tons of security vendors selling threat intelligence and products to support data collection and analysis, but what about localized actionable intelligence? This analysis will revisit the implementation of high-interaction honeypots in a production setting and how (if properly deployed) this...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Real Experiences: Transforming Application Delivery for Continuous Innovation

    Key Takeaways: Learn from real experiences in transforming large organizations for increased speed and quality using a DevOps approach. Explore the characteristics and behavior of fast-moving companies, based on hundreds of assessments, interviews and implementations. Begin a self-assessment designed to give you a better understanding of your organization's readiness and...

    Provided By IBM

  • Webcasts // Feb 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Application Security Verification Standard

    The OWASP Application Security Verification Standard (ASVS) project provides a basis for testing web application technical security controls. Bill will take the users through the ins and outs of the four verification levels and the thirteen verification standard. When the users leave, they'll have a free, comprehensive test plan to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hacking WPS with Reaver to Crack WPA WPA2 Passwords

    In this webcast, the presenter will teach the users how to get WPA and WPA2 password by exploiting the weakness in WPS. This is an easy verbal step by step guide to follow. Enjoy! If the users are using VMware, Virtual box, or any Virtual application they will need to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Too Many Cooks - Exploiting the Internet-of-TR-069-Things

    In this webcast, the presenter will begin by describing their previous efforts presented this summer (DEF CON 22 & more), where their group revealed critically vulnerable TR-069 server deployments and discussed the incomprehensible asymmetry between the trust instated in this protocol and the measures taken to protect it (or lack...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net