Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // Jan 2015

    Too Many Cooks - Exploiting the Internet-of-TR-069-Things

    In this webcast, the presenter will begin by describing their previous efforts presented this summer (DEF CON 22 & more), where their group revealed critically vulnerable TR-069 server deployments and discussed the incomprehensible asymmetry between the trust instated in this protocol and the measures taken to protect it (or lack...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Attacks on UEFI Security, Inspired by Darth Venamis's Misery and Speed Racer

    On modern Intel based computers there exist two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    ECCHacks - A Gentle Introduction to Elliptic-Curve Cryptography

    In this webcast, the presenter will explain how to work with elliptic curves constructively to obtain secure and efficient implementations, and will highlight pitfalls that must be avoided when implementing Elliptic-Curve Crypto (ECC). The webcast will also explain what the entire buzz in curve choices for TLS is about. This...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Finding the Weak Crypto Needle in a Byte Haystack

    Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Crypto Tales From the Trenches

    Cryptography and privacy-enhancing technologies are increasingly part of a modern journalist's spycraft. But what does it look like when a reporter actually tries to protect herself and her sources with the best tools that the hacker/academic/activist/cipherpunk/technologist communities have produced? Disaster, chaos, crashes, and UI-sponsored opsec fails.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Practical EMV PIN Interception and Fraud Detection

    In this webcast, the presenter will follow their previous EMV research uncovering new findings as well as a detailed analysis of chip & PIN fraud markers in order to benefit cardholders, as well as issuing banks, in preventing wrongful liability for fraudulent charges.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Karsten Nohl: Mobile Self-Defense

    The people know that mobile networks can - and do - attack them on many fronts. As this webcast will show, even 3G is attackable. It's high time that they upgrade from complaining to self-defense. Modern phones include all components necessary to block - or at least make visible -...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    SCADA StrangeLove: Too Smart Grid in da Cloud

    For two years SCADA StrangeLove speaks about industrial control systems and nuclear plants. This year the presenters want to discuss green energy. Their hackers' vision of green energy, SmartGrids and cloud IoT technology. They will also speak about the security problems of traditional \"Heavy\" industrial solutions, about the things that...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively

    In this webcast, the presenter will promote the adoption of better practices in the publication and demonstration of malware analyses. For various reasons, many popular analyses of malware do not contain information required for a peer analyst to replicate the research and verify results.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Is This Your Pipe? Hijacking the Build Pipeline

    As developers of the web, the presenters rely on tools to automate building code, run tests, and even deploy services. What happens when they're too trusting of CI/CD pipelines? Credentials get exposed, hijacked, and re-purposed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Saving the Internet (for the Future)

    It has always been easier to attack than to defend on the Internet, even back to 1979 when it was written that \"Few if any security controls can stop a dedicated\" red team. The presenters accept this as true but the community rarely ever looks at the longer term implications...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Summary of Attacks Against BIOS and Secure Boot

    A variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the pre-boot and firmware components of the platform such as secure boot, OS loaders, and SMM. Windows 8 secure boot provides an important protection against bootkits by enforcing a signature check on each boot component.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    The Only Way to Tell the Truth Is Through Fiction: The Dynamics of Life in the National Security State

    In this webcast, the presenter will illuminate the mobius strip on which all of the people walk as they make their way through the labyrinth of security and intelligence worlds they inhabit of necessity, all of the people some of the time and some of them all of the time.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Secure Random by Default

    As a general rule in security, the presenter has learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs - insecure and default, and secure but...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    NSA Playset GSM Sniffing

    A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world. Introducing TWILIGHTVEGETABLE, the presenters' attempt to pull together the past decade of GSM attacks into a single, coherent toolset, and finally make real, practical, GSM...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    The Cloud Conspiracy 2008-2014

    There is a widespread misconception that somehow the new GDPR privacy regulation will curb foreign spying, when in fact it is designed to widen loopholes into floodgates. This webcast is multidisciplinary and will cover national and international surveillance and privacy law, five eyes SIGINT policy, technical security and economics.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abuse of Blind Automation in Security Tools

    It is impossibly overwhelming for security personnel to manually analyze all of the data that comes to them in a meaningful way. Intelligent scripting and automation is key. This webcast aims to be a humorous reminder of why the word \"Intelligent\" really matters; the user's security devices might start doing...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    You're Leaking Trade Secrets

    Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While the people hear a lot about personal privacy, little is said in regard to organizational privacy.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Attacking the Internet of Things (Using Time)

    Internet of Things (IoT) devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. The presenter will discuss how timing attacks work, how...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Android Hacker Protection Level 0

    Have no fear, after drinking all the cheap wine two Android hackers has attacked all the protectors currently available for everyone's enjoyment! Whether the user have never reversed Android before or are a hardened veteran there will be something for the user, along with all the glorious PoC tools and...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Cyber-hijacking Airplanes: Truth or Fiction?

    There have been several people making bold claims about the ability to remotely hack into aircraft and hijack them from afar. This webcast will take a systematic look at the mechanisms others are claiming would permit such cyber-hijacking. Each of the most popular techniques will be examined mythbuster style. Along...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Client Side HTTP Cookie Security Attack and Defense

    HTTP cookies are an important part of trust on the web. Users often trade their login credentials for a cookie, which is then used to authenticate subsequent requests. Cookies are valuable to attackers: passwords can be fortified by two-factor authentication and \"New login location detected\" emails, but session cookies typically...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Bypass Firewalls and Application White Lists and Secure Remote Desktops Under 20 Seconds

    In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is, imagine a scenario, where the person have deployed a malware on a user's workstation, but the target information is on a secure server accessed via two-factor...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Don't DDoS Me Bro Practical DDoS Defense

    Layer 7 DDoS attacks have been on the rise since at least 2010, especially attacks that take down websites via resource exhaustion. Using various tools and techniques - it is possible to defend against these attacks on even a shoestring budget. This webcast will analyze and discuss the tools, techniques,...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Diversity in Information Security

    Discussion from the point of view of a diverse panel of leading representatives currently in or thinking of becoming part of the information security industry. This webcast will give the users insight to the evolutionary landscape of diversity in the hacking community.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Formal Analysis of Security Procedures in LTE

    The only part of the Long Term Evolution (LTE) security standard that has been formally analyzed is the Authentication and Key Agreement (AKA) procedure. It is not clear how well existing security related verification tools can handle other types of procedures. In this webcast, the presenter will use ProVerif to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Sponsored By ObserveIT

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Sponsored By Hewlett Packard

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Sponsored By EMC

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Spotlight

    Employees are clamoring for BYOD; regulators and industry groups are clamoring for tighter security and stronger data protection measures. There is a way to balance these seemingly divergent demands: integrated access control and mobile device management. Samsung Knox and Centrify have partnered to deliver secure container environments inside mobile...

    Sponsored By Centrify

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Sponsored By Alert Logic

  • Webcasts // Nov 2013

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Oct 2009

    Stop wasting time on spam. Learn how with hosted email security

    Spam got you down? Learn why people are making the switch to hosted email security. Michael Osterman of Osterman Research Group describes why people are quickly adopting hosted email security and what you should look for in a vendor. Hosted email security is a great addition to any anti-malware portfolio....

    Provided By TrendMicro

  • Webcasts // Aug 2008

    Keep Your Auditors Happy With PowerTech Compliance Monitor

    This webcast covers use of PowerTech Compliance Monitor to prepare a system for a SOX, PCI, COBIT or ISO audit.

    Provided By PowerTech Group

  • Webcasts // Nov 2009

    Securing and Controlling Your Powerful Users

    One of the greatest challenges that an organization faces when securing an IBM i environment is protecting the system from the very people who are also charged with its care: programmers, administrators, and security officers. While these power users often need access to restricted objects and commands, they rarely need...

    Provided By PowerTech Group

  • Webcasts // Jun 2009

    The State of System i (AS/400) Security 2009

    The presenter will review a summary of the latest State of System i Security Study findings. The attendee will learn what steps the organization should take to address commonly overlooked and dangerous security exposures.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Ambush Hackers With Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired'', an increasing number of people need to understand the basics of security in a networked world. This webcast shows how to ambush hackers with network security.

    Provided By PowerTech Group

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Hacking Exposed Webinar

    The presenter of this webcast outlines the state of hacking as it exists today. He also profiled three contemporary hacks with associated countermeasures. The hacks profiled include hacking the web: Cross-Site Request Forgery, Hacking SSL: SSLstripe, Hacking the Phone: What happens when the root access "feature".

    Provided By McAfee

  • Webcasts // May 2009

    Selecting the Right Protection

    McAfee understands that in these economic times companies are feeling the pressure to seek out solutions to protect their most vital information assets. And whether at rest, in motion, or in use - these solutions need to provide increased protection and efficiency while decreasing costs. The presenter of this webcast...

    Provided By McAfee

  • Webcasts // May 2009

    Are Your Web Applications Secure?

    The threat of hackers and breaches in application security is a fact of life for security professionals; and though finding vulnerabilities fast and adapting to increase government regulations is the name of the game, just keeping up can leave one behind. The presenter will show how to manage application vulnerabilities...

    Provided By Cenzic

  • Webcasts // Apr 2014

    Snapshot Management – Ask the Educator Series

    Want a first-hand look at how easy it is to enhance and simplify snapshot backup? For a detailed technical tour and demonstration of Simpana IntelliSnap Technology, view this Ask the Educator session from CommVault Technical Instructor, Eric Mars.

    Provided By CommVault Systems

  • Webcasts // Oct 2010

    Building a Better Bunker: Securing Energy Control Systems Against Terrorists and Cyberwarriors

    In this webcast, the presenters say about power is the basis for almost every critical service known to society. Yet, as energy providers move to more open, public-facing Smart Grid technologies, the integrated fabric of their most critical infrastructure is already falling under attack.

    Provided By NitroSecurity

  • Webcasts // Sep 2010

    Keys to Selecting SIEM & Log Management

    In this webcast, the presenters say about today's securing networks and meeting compliance requirements are dual challenges faced by every IT team. Bad things are happening much faster, as new exploits are discovered, 'Weaponized', and distributed to the world within hours.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Emergence of Content Aware SIEM

    In this webcast, the presenters say about content aware SIEM is a new generation of Security Information and Event Management (SIEM) solutions that now have visibility into network flows, database sessions and application layer data and can combat insider threats, data loss, fraud and advanced persistent threats.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Detecting Dangerous PDFs and Application Layer Threats

    In this webcast, the presenters say about malware making use of PDF files is one of many complex threats that are "Moving up the stack" to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Automating Compliance and Security With SIEM at the Bank of China

    In this webcast, the presenters speak about increasing compliance requirements and relentless cyber threats and attacks, the Bank of China in New York needed to automate network security to make its IT staff more effective and efficient.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Making Log Data Actionable Through SIEM Integration

    In this webcast, the presenters say about log data collected to meet compliance requirements can be used to increase security as well. If effectively combined with event, activity and flow data, logs contribute to effective threat detection and incident response. A deeply integrated, high performance SIEM and log management solution...

    Provided By NitroSecurity

  • Webcasts // Apr 2010

    Automating Security & Compliance With SIEM at Dallas-Fort Worth Hospital Council

    In this webcast, the presenters say about relentless cyber-threats and increasing compliance requirements can overwhelm the existing processes used by hospital IT staffs. New Security Information and Event Management (SIEM) solutions automate threat detection, enable rapid incident response and simplify compliance reporting.

    Provided By NitroSecurity

  • Webcasts // Mar 2010

    State Privacy Laws, National Reach How to Avoid Becoming a Case Study for Non-Compliance

    In this webcast, the presenters say about more adoption of privacy laws to protect their residents' personal information, the scope of these laws is evolving in significant ways. No longer just data breach notification requirements, today's laws mandate that companies take preventative measures to secure sensitive data.

    Provided By NitroSecurity

  • Webcasts // Nov 2011

    Critical Control System Vulnerabilities Demonstrated - And What to Do About Them

    Control systems are embedded in most industries to automate the production, delivery and safe storage of the food and drinks the people consume, the transportation people take, the chemicals people process, and the energy people utilize. These systems, some of which are being connected directly to the Internet, are increasingly...

    Provided By NitroSecurity

  • Webcasts // Oct 2011

    Monitoring and Securing SCADA Networks

    SCADA networks are just different. Compared to enterprise IT networks, they have different security objectives, most of the endpoint actors are machines rather than people, their incidents can have immediate physical consequences, and they are more likely to be targeted by hostile actors such as terrorists. Moreover, SCADA networks must...

    Provided By NitroSecurity

  • Webcasts // Sep 2011

    Security Management 2.0: Time to Replace Your SIEM?

    In this webcast, the presenters say about the reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results. Most security teams need to start asking themselves some key questions: Is it time? Any one waving the white flag?...

    Provided By NitroSecurity

  • Webcasts // Jul 2011

    Actionable Intelligence From Advanced SIEM Systems

    In this webcast, the presenters say about to make better, faster security decisions for one organization, one need better information faster. Capturing the existing network event, log and flow data already provided by one infrastructure with a Security Information and Event Monitoring (SIEM) solution is the first key step to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Database Monitoring & SIEM - Beyond Compliance to Data Breach and Fraud Detection

    In this webcast, the presenters say about the database activity monitoring is a key requirement of many compliance mandates - monitoring and logging all database activity to ensure that sensitive data is being access appropriately, and by the right people. But when DAM and SIEM are integrated, the combination provides...

    Provided By NitroSecurity