Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Podcasts // Jun 2014

    CryptoLocker - The Ransomware Trojan

    The CryptoLocker malware encrypts certain files with a private key and demands payment to regain access to the files. In this podcast, the speaker will presents deep dive into CryptoLocker and looks at the latest information around what is called one of the two most sophisticated and destructive forms of...

    Provided By SecurityTube.net

  • Podcasts // May 2014

    Digging Deeper Into the IE Vulnerability

    Web browser vulnerabilities remain a fertile ground for hackers to harvest and mount attacks. Latest vulnerabilities found in Internet Explorer (IE) and urgent response from Microsoft highlights the fact that despite end of life announcements for old and less secure products, millions of users remain exposed to threats.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Virtual Event: Test without writing a single line of code…really

    Testing business-critical packaged applications is a high priority for many organizations. These applications must meet the same aggressive project time frames and operations benchmarks as internally-developed software. In this session, you will learn how Turnkey Solutions is helping Iron Mountain increase the speed and effectiveness of its packaged apps testing...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    McKesson Cloud Automation Podcast

    Download the podcast on how McKesson accomplished a multi-year, pan-IT management transformation. Learn how McKesson's performance journey, from 2005 to the present, has enabled it to better leverage an agile, hybrid cloud model. How McKesson gained a standardized services orientation to achieve agility in deploying its many active applications is...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    IBM SmartCloud Entry for Power Systems

    The IBM SmartCloud™ Entry on Power Systems™ solution provides a cost-competitive, entry-level private cloud solution that helps speed time to value of your service deployments on your IBM Power Systems servers.

    Provided By IBM

  • Podcasts // Jan 2014

    Messaging Architects: Upgrading to GroupWise 8, 'TOP' Grading to Compliance

    Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. In this podcast, the presenter explains about how to utilize Messaging Architects products with GroupWise 8.

    Provided By Novell

  • Podcasts // Jan 2014

    GWAVA: Disaster Recovery for GroupWise

    In this podcast, the speaker explains about disaster recovery for GroupWise which includes a demonstration of reload getting a GroupWise system back up and running at the click of a button.

    Provided By Novell

  • Podcasts // Jan 2014

    Network World: Productivity Software - The Next Generation

    In this podcast, the speaker explains about the network world productivity software. The speaker also explains about the new batch of wikis, blogs, and other collaborative software that helps companies become more productive and deliver value.

    Provided By Novell

  • Podcasts // Jan 2014

    High Availability and Disaster Recovery Options for Novell Open Enterprise Server and GroupWise

    In this podcast, the speaker will discuss options for high availability and disaster recovery for open enterprise server and GroupWise. The speaker will also includes Novell cluster services, business continuity clustering (along with exciting pricing changes) and platespin forge and protect.

    Provided By Novell

  • Podcasts // Jan 2014

    The Ins and Outs of File Systems

    With Open Enterprise Server 2 and the flexibility of Linux, a new question comes to mind: which file system will serve the users' best? In this podcast, learn from the team that has worked with Novell Storage Services for decades, but what they have to say may surprise the users'.

    Provided By Novell

  • Podcasts // Jan 2014

    NetBackup 7.5 for VMware

    In this podcast, the speaker will explain about NetBackup 7.5 for VMware. Get a deep dive look into how the NetBackup Platform provides a superior solution for protecting virtual servers which includes a technology overview.

    Provided By SYMA S.C.

  • Podcasts // Jan 2014

    Attaining Enterprise Wide Compliance with an SAP Certified Solution

    The SAP-certified Novell Compliance Management Platform extension for SAP environments provides a real-time, holistic view of all provisioning, access and security events across both SAP and enterprise IT infrastructure. Get added value from the users' SAP investments while enhancing organizational efficiency, compliance and security.

    Provided By Novell

  • Podcasts // Jan 2014

    Novell Compliance Management Platform: Integrated Identity, Access and Security Management

    The compliance management platform combines identity, access and security management technologies. This combination automates the process of granting users access to resources, while providing a real-time, holistic view of all network events enterprise wide.

    Provided By Novell

  • Podcasts // Jan 2014

    Enhance Security and Compliance Across Your SAP Infrastructure

    Compliance and security management principal for Novell, describes the certified and integrated technologies that Novell and SAP deliver to help the users' mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.

    Provided By Novell

  • Podcasts // Jan 2014

    Novell Storage Manager: Cross Empire Data Migration

    Server platform migrations can be costly and negatively affect user productivity. What's needed is way to migrate file and folder structures while protecting the integrity of security rights and other metadata.

    Provided By Novell

  • Podcasts // Jan 2014

    Files Matter Turn Challenges into Opportunities - Novell File Management Suite

    Data growth is making file management more and more difficult, but the users' can turn file challenges into opportunities to help their business grow. In this podcast, learn how Novell file management suite helps solve their issues and enables a truly mobile workforce.

    Provided By Novell

  • Podcasts // Jan 2014

    Managing Unstructured File Space using Novell File Management Suite

    In this podcast, learn how to describe to a customer how to manage unstructured file space - on a whiteboard, a napkin, or the back of an envelope using simple diagrams.

    Provided By Novell

  • Podcasts // Jan 2014

    Running At 99% Surviging An Application DoS

    Application-level Denial-of-Service (DoS) attacks are a threat to nearly everyone hosting content on the internet. DoS attacks are simple to launch, but can be difficult to defend against. Modern websites are a diverse set of moving parts, and a malicious actor only needs to find the point at which any...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Top Ten Proactive Web Application Controls

    The OWASP proactive control is a \"Top 10 like document\" aimed to help developers build secure applications. In this podcast, the speaker will explain the fundamental controls in critical software categories such as authentication, access control, validation, encoding, query parameterization, data protection, secure requirements, secure architecture and secure design.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    HTML5/JS Security

    In this podcast, the speaker explores the vulnerabilities behind JavaScript, including: a new class of vulnerabilities unique only to JavaScript, vulnerabilities in 3rd-party platforms which are exploited through JavaScript code and HTML5 which is considered the NG-Javascript. In turn, HTML5 introduces a new set of vulnerabilities

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Million Browser Botnet

    Online advertising networks can be a web hacker's best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow the users' to broadly distribute arbitrary JavaScript - even malicious JavaScript. The users' are supposed to use this feature to show ads, to track users,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    New and Improved: Hacking Oracle From Web

    In this podcast, the speaker will explain about number of attacks against Oracle database and in almost every other CPU there is a shiny new exploit which allows a malicious database user to gain DBA privileges on the back-end database.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Attacking CAPTCHAs for Fun and Profit

    CAPTCHAs are a potent mechanism to prevent web applications against automated form submissions. To analyze the strength of CAPTHA deployments on the internet, a research spanning hundreds of high traffic websites and several CAPTCHA service providers was conducted.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    OWASP PHP Security

    OWASP PHP security project is an effort by a group of PHP developers in securing PHP web applications, using a collection of decoupled flexible secure PHP libraries, as well as a collection of PHP tools.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Hacking with Python 3 - Zip Password Cracker

    In this podcast, the speaker explains about how to crack ZIP password using python script. This speaker also teaches the user how to create their own tool using python programming language.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Kippo-SSH Honeypot and Kippo-Graphs

    In this podcast, the speaker shows how to set up and enable an SSH honeypot on the default port of 22 and move the actual SSH service to a different port. Also they set an IP tables rule to redirect incoming traffic on port 22 to the honeypot which is...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Panic! Hysteria! No Malware Required!

    Security is no longer something the user's organization can have complete control over. In this podcast, the speaker will demonstrate how most large corporations can be compromised in moments, even without phishing. The speaker also discusses how many attackers are moving away from exploits and malware.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Sick Anti Forensics Mechanisms in the Wild

    In this podcast, the speaker explains about malware analysis. The extraction of runtime behavior of malicious code to understand: how it works, how to identify it, how to defeat or eliminate it. The value is supply signatures (IOCs) to detect systems and provide evidence for recovery and cleanup.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    AirSnare - Intrusion Detection Software for Windows

    In this podcast, the speaker explains about the AirSnare. It helps the user will learn about how to use AirSnare tool for Intrusion Detection System (IDS) setup. AirSnare is a very powerful and very useful for network IDS.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Use Cobalt Strike's Payloads with Veil's Evasion

    The Veil framework is a collection of red team tools, focused on evading detection. In this podcast, the speaker shows how to use Veil Evasion to generate an anti-virus safe payload that delivers Cobalt Strike's Beacon payload. The method allows Veil to take advantage of Cobalt Strike's custom shellcode to...

    Provided By SecurityTube.net

  • Podcasts // Nov 2013

    Private clouds have come of age

    With CIOs and IT managers increasingly challenged to do more with less, they really need to be selective about their investments. Many are turning to private clouds.

    Provided By IBM

  • Podcasts // Nov 2013

    Enabling the journey to IT-as-a-Service

    Watch video to see how Citrix is helping customers enable their journey towards IT-as-a-Service with Citrix CloudPortal Business Manager and Citrix CloudPlatform.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Mature and proven cloud orchestration

    Citrix CloudPlatform is a mature and proven cloud orchestration platform, trusted to power the world’s leading public and private clouds, run mission critical application workloads and recognized as a market leader by industry experts. Watch video and learn more!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • Podcasts // Oct 2013

    IBM business analytics: One solution that covers the entire analysis spectrum

    In this online demo, learn how IBM Business Analytics software includes capabilities that meet a broad range of analysis needs - from analytical reporting to predictive analytics.

    Provided By IBM

  • Podcasts // Oct 2013

    Companies Grow More with Oracle Sales Cloud

    Animated Video: Oracle Sales Cloud is Smarter SFA that helps Companies Grow More. Maximize revenue and optimize sales performance. Know what to sell your customers. And get more help from your marketers and partners.

    Provided By Oracle

  • Podcasts // Oct 2013

    Managers Know More with Oracle Sales Cloud

    Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.

    Provided By Oracle