Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    White Is the New Black: Why White Data Really Matters

    The presenter have already brought their malicious data collection skills to an art level, but in order to get good verdicts (most importantly - low FP rate) their benign (or white) data must enjoy the same level of confidence as the malicious (or black) data.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Where the Wild Things Are: Encryption, Police Access and the User

    The government, frightened by companies' move to enable encryption by default and/or make encryption easier to use, sparked discussion about the use of a \"Golden key\" or implementation of backdoor access for law enforcement to decrypt an electronic device when the user refuses to do so.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Get Off My Lawn: Examining Change Through the Eyes of the Old Guard

    In this webcast, the presenter will examine personal privacy, contemporary threats, and the user's role in security, and other issues neatly written on Shmooballs and thrown at panelists. The panel is constructed of individuals who have been involved in information security for decades and may have developed a jaded, pessimistic,...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Rethinking Security's Role in Computer Science Education

    The role of security in computer science education needs to be reconsidered. There is little to no applied security content for the majority of undergraduate computer science students. Given that security is an afterthought in education, it should be no surprise that it ends up being an afterthought when those...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Building an Open Source Threat Intelligence Program

    This high-level overview centers on building a threat intelligence program and includes topics ranging from the threat intelligence lifecycle to specific tasks, in addition to lessons learned and what to keep in mind when developing the users own threat intelligence program.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Stored Password Security: The Adobe Guide to Keyless Decryption

    In this webcast, the presenter going to explain briefly about password storage techniques, popular implementations, their problems, and how to fix them, leveraging Recon-ng to demonstrate the risk associated with using each technique. Specifically address the fundamental flaws in Adobe's approach to password encryption and dive into the techniques the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Malware Development as the Evolution of Parasites

    In this webcast, the presenter will discuss how the evolution of parasites maps to the growth and development of malware. From the theoretical ground already explored in biology they can explain many of the trends in malware development and make predictions on how malware will evolve in the future.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Common Sense Security Framework

    Killing small businesses with over-regulation in the name of security while turning a blind eye to the fact that the cost of over-regulation is doing more harm than good. Distracting business owners from realistically focusing on the risks that apply to their companies, it's time to have an open, honest...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    Live Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // May 2009

    Webcast: Top Tips To Keep Data Under Your Control

    You already know the growth and changes in government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. Join this live TechRepublic Webcast to learn about how you might simplify the task. Hosted by Moderator James Hilliard and featuring Compliance and Security...

    Provided By Sophos

  • Webcasts // Aug 2011

    Rethinking the Corporate Network

    Today's corporate networks face unprecedented levels of stress as they try to handle new devices, applications, and technologies. New demands, such as smartphones, tablets, cloud-based services, and virtualization have dramatically changed the way corporate networks need to be designed to deliver a high-quality user experience. But these changes...

    Provided By Alcatel-Lucent Enterprise

  • Webcasts // Jun 2013

    Preparing for eDiscovery

    This Webinar will look at the challenges that enterprises face when given an eDiscovery request and the ways in which they can reduce the burden. This Webinar will explore: What is the IT department’s job when it comes to eDiscovery? What are the penalties for not complying with eDiscovery requirements?...

    Provided By Open Text

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Oct 2009

    Stop wasting time on spam. Learn how with hosted email security

    Spam got you down? Learn why people are making the switch to hosted email security. Michael Osterman of Osterman Research Group describes why people are quickly adopting hosted email security and what you should look for in a vendor. Hosted email security is a great addition to any anti-malware portfolio....

    Provided By Trend Micro

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    BYOD : The Privacy and Compilance Risks From Bringing Your Own Mobile Device to Work

    In this webcast, the presenter discuss about BYOD. BYOD is a disaster. It is a privacy fiasco. It will cause massive data breaches and privacy violations. PLUS -n BYOD is more expensive than running two separate devices.

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    DBI Frameworks Applied to Computer Security

    In this webcast, the presenter will show how Dynamic Binary Instrumentation (DBI) works, and what for it can be applied in computer security. As proof of concepts, it will be shown how DBI can be useful for detecting vulnerabilities (e.g., buffer overflow or taint analysis) in Windows executables.

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    Malware Vs Virtualization

    In this webcast, the presenter discuss about virtualization, it plays cat and mouse. Malware are studied into virtual environments, thus modifying their behavior to mimic inoffensive programs and avoid detection. They discover more accurately their execution environment.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    Analysis of a Windows Kernel Vulnerability

    In this webcast, the presenter explains the technical details of this exploit. It is not about \"Duqu\" nor Russian exploit kits. The vulnerability itself only allows the attacker to perform an \"OR\" operation on a value of their choice, at a memory location of their choice.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network

    In this webcast, the presenter will show how to create the dropper, implant bots, master controller, and launch new payloads on the victim box through the use of Splinter the RAT, an open-source red-team collaboration framework they developed and released to the community to show the ease at which RATs...

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Webcasts // Oct 2012

    Cisco and Citrix: Mobile Workstyles and BYOD Solutions

    In this webcast, the presenter explains about how Cisco and Citrix intend to develop \"Mobile workstyle and BYOD\" solutions that give mobile users a unified way to securely access business apps, data, voice and collaboration services from any device, anywhere.

    Provided By Citrix Systems

  • Webcasts // Jun 2012

    Executive Mobility Solutions Overview

    For executives, work is not a place. It's what they do wherever and whenever business needs to be done, and now they want to do it all from the coolest devices. In this webcast, the presenter explains about how Citrix executive mobility solutions enable executives to increase their productivity, improve...

    Provided By Citrix Systems

  • Webcasts // Sep 2014

    Threat Modeling for Realz

    In this webcast, the presenter explains about threat modeling, which is a core activity for \"Baking security in\". Understanding the threats against the user's system-how likely it is for these threats to be realized-the impact of a realized threat- and how to defend against the threat is key to building...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    High-Speed High-Security Cryptography: Encrypting and Authenticating the Whole Internet

    In this webcast, the presenter explains about different approach to high-security Internet cryptography. This approach is easy for users, easy for system administrators, and, perhaps most importantly, easy for programmers. The main reason that the approach has not been tried before is that it seems to involve very slow cryptographic...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Hunting Malware on Linux Production Servers: The Windigo Backstory

    Operation Windigo is a large server, side malware campaign that targets Unix systems (BSD, Linux, etc.). There are three major components: Linux/Ebury an OpenSSH backdoor and credential stealer, Linux/Cdorked a Web Server backdoor (it works with Apache, Nginx and Lighttpd) that redirects end users to exploit kits, and Perl/Calfbot a...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net