Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jun 2015

    Live Webcast: 10 questions to ask to determine how well your business is protected from cyber-attacks

    How confident are you about your company's network security? Today, knowing your security position may be as important as knowing your cash flow. Many organizations have a small IT staff or an outside resource that handles network security. If you know the answers to these important questions, you could...

    Sponsored By Dell

  • Webcasts // Apr 2015

    On-demand Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    Live Webcast: Be Your Own Forensics Expert

    Know WHO, WHEN, WHERE, and HOW malicious software invaded your endpoints. Once a breach occurs, it’s imperative that organizations accelerate their threat investigation and discover the true point of origin of an attack. Viewfinity flags suspect behavior by monitoring all applications installing and running in your environment. Its monitoring...

    Sponsored By Viewfinity

  • Webcasts // Mar 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    White Is the New Black: Why White Data Really Matters

    The presenter have already brought their malicious data collection skills to an art level, but in order to get good verdicts (most importantly - low FP rate) their benign (or white) data must enjoy the same level of confidence as the malicious (or black) data.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Where the Wild Things Are: Encryption, Police Access and the User

    The government, frightened by companies' move to enable encryption by default and/or make encryption easier to use, sparked discussion about the use of a \"Golden key\" or implementation of backdoor access for law enforcement to decrypt an electronic device when the user refuses to do so.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Get Off My Lawn: Examining Change Through the Eyes of the Old Guard

    In this webcast, the presenter will examine personal privacy, contemporary threats, and the user's role in security, and other issues neatly written on Shmooballs and thrown at panelists. The panel is constructed of individuals who have been involved in information security for decades and may have developed a jaded, pessimistic,...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Rethinking Security's Role in Computer Science Education

    The role of security in computer science education needs to be reconsidered. There is little to no applied security content for the majority of undergraduate computer science students. Given that security is an afterthought in education, it should be no surprise that it ends up being an afterthought when those...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Building an Open Source Threat Intelligence Program

    This high-level overview centers on building a threat intelligence program and includes topics ranging from the threat intelligence lifecycle to specific tasks, in addition to lessons learned and what to keep in mind when developing the users own threat intelligence program.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Stored Password Security: The Adobe Guide to Keyless Decryption

    In this webcast, the presenter going to explain briefly about password storage techniques, popular implementations, their problems, and how to fix them, leveraging Recon-ng to demonstrate the risk associated with using each technique. Specifically address the fundamental flaws in Adobe's approach to password encryption and dive into the techniques the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Malware Development as the Evolution of Parasites

    In this webcast, the presenter will discuss how the evolution of parasites maps to the growth and development of malware. From the theoretical ground already explored in biology they can explain many of the trends in malware development and make predictions on how malware will evolve in the future.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Application Security Verification Standard

    The OWASP Application Security Verification Standard (ASVS) project provides a basis for testing web application technical security controls. Bill will take the users through the ins and outs of the four verification levels and the thirteen verification standard. When the users leave, they'll have a free, comprehensive test plan to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Mobile Top Ten - Why They Matter and What We Can Do

    In this webcast, the presenter will examine the current OWASP mobile top ten security risks. They will briefly examine each one, and provide tangible reasons why they would be a concern for the users or their organization, as well as how to best secure against them.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Common Sense Security Framework

    Killing small businesses with over-regulation in the name of security while turning a blind eye to the fact that the cost of over-regulation is doing more harm than good. Distracting business owners from realistically focusing on the risks that apply to their companies, it's time to have an open, honest...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Threat Intelligence and Big Data Is It for Real, or Is It Hokum?

    An analysis of the current FUD surrounding the cyber threat intelligence industry. This webcast will explore how the users get to call themselves one and illustrate how a lot of folks are making a lot of money \"Guessing\" about the bad guys. This webcast will illustrate how cyber threat intelligence...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Detecting Malicious Activity and Malware on a Large Network

    In this webcast, the presenter will discuss the sorts of data sources available to network operators and big companies running their network, and how to sort through that data to find abuse, malicious activity, and malware. The bulk of the focus of this webcast will be on detecting botnet Command...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hacking WPS with Reaver to Crack WPA WPA2 Passwords

    In this webcast, the presenter will teach the users how to get WPA and WPA2 password by exploiting the weakness in WPS. This is an easy verbal step by step guide to follow. Enjoy! If the users are using VMware, Virtual box, or any Virtual application they will need to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cryptocurrencies and Security

    Over the last 5 years of Bitcoin's explosive growth, adopters of the technology have witnessed giant leaps forward in security as well as giant breaches that have caused the destruction of large companies such as Bitcoinica, MTGOX, and others. These security breaches have harmed not only the employees and shareholders...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Honeydocs and Offensive Countermeasures

    Microsoft Office documents are ubiquitous in the corporate environment. The presenter have found that being able to track the spread of Microsoft Office documents has proven to have great value for security practitioners and managers - diverse uses including creating a \"Honey document\" for tracking email scammers, stocking a honeypot...

    Provided By SecurityTube.net