Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Apr 2015

    Live Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    Live Webcast: Be Your Own Forensics Expert

    Know WHO, WHEN, WHERE, and HOW malicious software invaded your endpoints. Once a breach occurs, it’s imperative that organizations accelerate their threat investigation and discover the true point of origin of an attack. Viewfinity flags suspect behavior by monitoring all applications installing and running in your environment. Its monitoring...

    Sponsored By Viewfinity

  • Webcasts // Apr 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Apr 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • Webcasts // Apr 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    White Is the New Black: Why White Data Really Matters

    The presenter have already brought their malicious data collection skills to an art level, but in order to get good verdicts (most importantly - low FP rate) their benign (or white) data must enjoy the same level of confidence as the malicious (or black) data.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Where the Wild Things Are: Encryption, Police Access and the User

    The government, frightened by companies' move to enable encryption by default and/or make encryption easier to use, sparked discussion about the use of a \"Golden key\" or implementation of backdoor access for law enforcement to decrypt an electronic device when the user refuses to do so.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Knock Knock: A Survey of iOS Authentication Methods

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Get Off My Lawn: Examining Change Through the Eyes of the Old Guard

    In this webcast, the presenter will examine personal privacy, contemporary threats, and the user's role in security, and other issues neatly written on Shmooballs and thrown at panelists. The panel is constructed of individuals who have been involved in information security for decades and may have developed a jaded, pessimistic,...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Rethinking Security's Role in Computer Science Education

    The role of security in computer science education needs to be reconsidered. There is little to no applied security content for the majority of undergraduate computer science students. Given that security is an afterthought in education, it should be no surprise that it ends up being an afterthought when those...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    There's Waldo! Tracking Users Via Mobile Apps

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Five Not-Totally-Crazy Ways to Build for Usability

    As security becomes an increasingly mainstream concern, the presenters are challenged with making their products easier to use. The presenter, CTO of the secure photo sharing app Glimpse, will share several highly effective (including some unconventional) ways technologists can make their products more user-friendly.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Marco Cova: Combative Evasive Software

    In this webcast, the presenter research interests include most areas of systems security, with an emphasis on web-based malware analysis and detection, botnets, and vulnerability analysis. The presenter also led the design and development of Wepawet, a publicly-available service for the analysis of malicious web pages.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Building an Open Source Threat Intelligence Program

    This high-level overview centers on building a threat intelligence program and includes topics ranging from the threat intelligence lifecycle to specific tasks, in addition to lessons learned and what to keep in mind when developing the users own threat intelligence program.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Stored Password Security: The Adobe Guide to Keyless Decryption

    In this webcast, the presenter going to explain briefly about password storage techniques, popular implementations, their problems, and how to fix them, leveraging Recon-ng to demonstrate the risk associated with using each technique. Specifically address the fundamental flaws in Adobe's approach to password encryption and dive into the techniques the...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Malware Development as the Evolution of Parasites

    In this webcast, the presenter will discuss how the evolution of parasites maps to the growth and development of malware. From the theoretical ground already explored in biology they can explain many of the trends in malware development and make predictions on how malware will evolve in the future.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    OWASP Application Security Verification Standard

    The OWASP Application Security Verification Standard (ASVS) project provides a basis for testing web application technical security controls. Bill will take the users through the ins and outs of the four verification levels and the thirteen verification standard. When the users leave, they'll have a free, comprehensive test plan to...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    OWASP Mobile Top Ten - Why They Matter and What We Can Do

    In this webcast, the presenter will examine the current OWASP mobile top ten security risks. They will briefly examine each one, and provide tangible reasons why they would be a concern for the users or their organization, as well as how to best secure against them.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Common Sense Security Framework

    Killing small businesses with over-regulation in the name of security while turning a blind eye to the fact that the cost of over-regulation is doing more harm than good. Distracting business owners from realistically focusing on the risks that apply to their companies, it's time to have an open, honest...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Cyber Threat Intelligence and Big Data Is It for Real, or Is It Hokum?

    An analysis of the current FUD surrounding the cyber threat intelligence industry. This webcast will explore how the users get to call themselves one and illustrate how a lot of folks are making a lot of money \"Guessing\" about the bad guys. This webcast will illustrate how cyber threat intelligence...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Detecting Malicious Activity and Malware on a Large Network

    In this webcast, the presenter will discuss the sorts of data sources available to network operators and big companies running their network, and how to sort through that data to find abuse, malicious activity, and malware. The bulk of the focus of this webcast will be on detecting botnet Command...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hacking WPS with Reaver to Crack WPA WPA2 Passwords

    In this webcast, the presenter will teach the users how to get WPA and WPA2 password by exploiting the weakness in WPS. This is an easy verbal step by step guide to follow. Enjoy! If the users are using VMware, Virtual box, or any Virtual application they will need to...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Cryptocurrencies and Security

    Over the last 5 years of Bitcoin's explosive growth, adopters of the technology have witnessed giant leaps forward in security as well as giant breaches that have caused the destruction of large companies such as Bitcoinica, MTGOX, and others. These security breaches have harmed not only the employees and shareholders...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Honeydocs and Offensive Countermeasures

    Microsoft Office documents are ubiquitous in the corporate environment. The presenter have found that being able to track the spread of Microsoft Office documents has proven to have great value for security practitioners and managers - diverse uses including creating a \"Honey document\" for tracking email scammers, stocking a honeypot...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    How Random Is Your RNG

    Cryptographic primitives need random numbers to protect the user's data. Random numbers are used for generating secret keys, nonce's, random paddings, initialization vectors, salts etc. Deterministic pseudorandom number generators are useful, but they still need truly random seeds generated by entropy sources in order to produce random numbers.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Apr 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • Webcasts // Apr 2015

    Live Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    Live Webcast: Be Your Own Forensics Expert

    Know WHO, WHEN, WHERE, and HOW malicious software invaded your endpoints. Once a breach occurs, it’s imperative that organizations accelerate their threat investigation and discover the true point of origin of an attack. Viewfinity flags suspect behavior by monitoring all applications installing and running in your environment. Its monitoring...

    Sponsored By Viewfinity

  • Webcasts // Apr 2015

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Provided By Alert Logic

  • Webcasts // Apr 2015

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Apr 2015

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Provided By ObserveIT

  • Webcasts // Apr 2015

    Practical EMV PIN Interception and Fraud Detection

    In this webcast, the presenter will follow their previous EMV research uncovering new findings as well as a detailed analysis of chip & PIN fraud markers in order to benefit cardholders, as well as issuing banks, in preventing wrongful liability for fraudulent charges.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • Webcasts // Apr 2015

    Snapshot Management – Ask the Educator Series

    Want a first-hand look at how easy it is to enhance and simplify snapshot backup? For a detailed technical tour and demonstration of Simpana IntelliSnap Technology, view this Ask the Educator session from CommVault Technical Instructor, Eric Mars.

    Provided By CommVault Systems

  • Webcasts // Apr 2015

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Apr 2015

    On-demand Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Adoption of the cloud is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy, and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station....

    Provided By EVault

  • Webcasts // Apr 2015

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // Apr 2015

    Make the Hybrid Cloud work for you

    Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics...

    Provided By IBM

  • Webcasts // Apr 2015

    Breakthrough "big data" storage solutions: IBM System x GPFS Storage Server

    This webcast short spotlights breakthrough “big data” storage solutions using IBM System x GPFS Storage Server -- a ground breaking, modular solution that can be optimized to balance client needs in terms of performance, capacity, cost and scale. This webcast short also shares capabilities in the broader IBM technical computing...

    Provided By IBM

  • Webcasts // Apr 2015

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Provided By Workday

  • Webcasts // Apr 2015

    On-demand Webcast: UK Threat Landscape..

    There have been multiple high profile worldwide data breaches so far in 2014. Do you wonder what's happening on the UK Threat Landscape? Join Rackspace and Alert Logic to hear more about malicious cybercrime, the evolution of hackers, how the underground economy works and how it affects the corporate IT...

    Provided By Alert Logic

  • Webcasts // Apr 2015

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software

  • Webcasts // Apr 2015

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Provided By Druva Software

  • Webcasts // Apr 2015

    Video: Cognizant delivers reliable, scalable knowledge management support

    This leading provider of IT consulting and business processes achieves an 80 percent reduction in client ticket volumes and a 40 percent improvement in mean-time-to-resolution rates with IBM SmartCloud Control Desk software.

    Provided By IBM

  • Webcasts // Apr 2015

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // Apr 2015

    Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

    Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Place to Hang Our Hats: Security Community and Culture

    Contrary to popular belief and media depictions, hacking is a social endeavor. In this webcast, the presenter explores the security and hacking culture from an historical context can tell the user about modern security issues.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Demystiphying and Fingerprinting the 802.15.4/Zigbee PHY

    In this webcast, the presenter explains about the methods of producing such IEEE 802.15.4 frames with commodity digital radio chips widely used in building inexpensive 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they fingerprint; however, their methods don't require a...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Security Management without the Suck

    In this webcast, the presenter discuss about the real world techniques for implementing and optimizing a security program that they call RADIO (Recon, Analyze, Develop, Implement, Optimize). Conventional wisdom has historically presented guidance that works well in textbook scenarios or for very large companies but often does not integrate well...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Evading Code Emulation: Writing Ridiculously Obvious Malware that Evades AV

    Code emulation, a technology capable of detecting malware for which no signature exists. It's a powerful step in the right direction for client security, but it's a long way from mature. In this webcast, the presenter demonstrates how the code emulation engine in Anti-Virus Guard (AVG) can be reverse engineered...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Attacking Drupal: Hacking and Securing Drupal Web Applications

    Drupal is a very popular content management system that has been widely adopted by government agencies, major businesses, social networks, and more - underscoring why understanding how Drupal works and properly securing these applications is of the utmost importance.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Securing Sensitive Data: A Strange Game

    Information security compliance regulations like PCI, HIPAA, SB1386 have been around for many years now, but the users continue to suffer large data breaches. In this webcast, the presenter will discuss why even the best efforts at compliance fail to prevent breaches, provide examples from the field of what goes...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    The Savage Curtain

    In this webcast, the presenter explore strange of new apps, seek out new mobile SSL bugs and new SSL implementation flaws, to boldly go where no man has gone before. The presenter will also explain trek across the mobile landscape showing numerous mobile failures, related to encryption.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Third Party Security Testing for Advanced Metering Infrastructure Projects

    Advanced Metering Infrastructure (AMI) program requires the introduction of many new devices and applications into a utility's infrastructure. Some of these devices and software may have never been deployed before anywhere in the world. Many are field deployed, outside of the utility's physical and cyber security perimeters.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Invasive Roots Of Anti-Cheat Software

    Some of the most sophisticated rootkit behaviors are implemented by today's anti-cheat gaming software, in a constantly evolving game of cat and mouse. Game hackers often look for flaws in a system or program's logic, seeking to exploit them for their own performance gains.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Bring Your Own Risky Apps

    Bring Your Own Device (BYOD) is a cute and harmless-sounding acronym for a trend that is in reality introducing exponentially more risk to end-users and organizations. The common refrain is to seek out and secure the user's Smartphone's and tablets from malware and other malicious software which can wreck havoc...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Better Way to Get Intelligent About Threats

    A recent ponemon report on exchanging cyber threat intelligence states that current threat sharing mechanisms are broken. A threat intelligence platform should achieve many things, but most importantly it should offer a singular platform to aggregate, analyze, and act on threat intelligence data as well as offer options for context,...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Anatomy of a Credit Card Stealing, RAM Scraping, POS Malware

    Credit card stealing RAM scraper malware is running amok compromising Point-Of-Sale (POS) systems. Recent breaches have shown that exposure to such attacks is high and there is a lot at risk. In this webcast, the presenter shows how the attack is carried out by looking at the nuts-and-bolts of a...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    What's New in REMnux V4 for Malware Analysis?

    REMnux is a lightweight Linux distribution for assisting malware analysts with reverse-engineering malicious software. Release v4 of this popular distro came out in April 2013. It incorporates several new tools useful for analyzing malware in this Ubuntu-based environment.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    USB Write Blocking with USBProxy

    USB mass storage devices are some of the most common peripherals in use today. They number in the billions and have become the de-facto standard for offline data transfer. A USB write blocker may help to prevent some of these issues and allow researchers to examine the content of the...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Run-Time Tools to Aid Application Security Assessments

    In this webcast, the presenter explains about the common tracing tools and their use in day-to-day application security assessments. The presenter also explains the run-time tracing concepts and their practical applications in real world testing scenarios.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Introducing Opabinia

    Checking for SSL issues form part of most infrastructure and web application assessments. However, these checks often are not detailed enough and can miss important issues. In this webcast, the presenter will introduce SSLAuditor4/Opabinia, a tool have automated SSL checks, making the task easier for the tester, while improving the...

    Provided By SecurityTube.net