Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Podcasts // Jan 2014

    Million Browser Botnet

    Online advertising networks can be a web hacker's best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow the users' to broadly distribute arbitrary JavaScript - even malicious JavaScript. The users' are supposed to use this feature to show ads, to track users,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    New and Improved: Hacking Oracle From Web

    In this podcast, the speaker will explain about number of attacks against Oracle database and in almost every other CPU there is a shiny new exploit which allows a malicious database user to gain DBA privileges on the back-end database.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Attacking CAPTCHAs for Fun and Profit

    CAPTCHAs are a potent mechanism to prevent web applications against automated form submissions. To analyze the strength of CAPTHA deployments on the internet, a research spanning hundreds of high traffic websites and several CAPTCHA service providers was conducted.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    OWASP PHP Security

    OWASP PHP security project is an effort by a group of PHP developers in securing PHP web applications, using a collection of decoupled flexible secure PHP libraries, as well as a collection of PHP tools.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Hacking with Python 3 - Zip Password Cracker

    In this podcast, the speaker explains about how to crack ZIP password using python script. This speaker also teaches the user how to create their own tool using python programming language.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Kippo-SSH Honeypot and Kippo-Graphs

    In this podcast, the speaker shows how to set up and enable an SSH honeypot on the default port of 22 and move the actual SSH service to a different port. Also they set an IP tables rule to redirect incoming traffic on port 22 to the honeypot which is...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Panic! Hysteria! No Malware Required!

    Security is no longer something the user's organization can have complete control over. In this podcast, the speaker will demonstrate how most large corporations can be compromised in moments, even without phishing. The speaker also discusses how many attackers are moving away from exploits and malware.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Sick Anti Forensics Mechanisms in the Wild

    In this podcast, the speaker explains about malware analysis. The extraction of runtime behavior of malicious code to understand: how it works, how to identify it, how to defeat or eliminate it. The value is supply signatures (IOCs) to detect systems and provide evidence for recovery and cleanup.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    AirSnare - Intrusion Detection Software for Windows

    In this podcast, the speaker explains about the AirSnare. It helps the user will learn about how to use AirSnare tool for Intrusion Detection System (IDS) setup. AirSnare is a very powerful and very useful for network IDS.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Use Cobalt Strike's Payloads with Veil's Evasion

    The Veil framework is a collection of red team tools, focused on evading detection. In this podcast, the speaker shows how to use Veil Evasion to generate an anti-virus safe payload that delivers Cobalt Strike's Beacon payload. The method allows Veil to take advantage of Cobalt Strike's custom shellcode to...

    Provided By SecurityTube.net

  • Podcasts // Nov 2013

    Private clouds have come of age

    With CIOs and IT managers increasingly challenged to do more with less, they really need to be selective about their investments. Many are turning to private clouds.

    Provided By IBM

  • Podcasts // Nov 2013

    Enabling the journey to IT-as-a-Service

    Watch video to see how Citrix is helping customers enable their journey towards IT-as-a-Service with Citrix CloudPortal Business Manager and Citrix CloudPlatform.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Mature and proven cloud orchestration

    Citrix CloudPlatform is a mature and proven cloud orchestration platform, trusted to power the world’s leading public and private clouds, run mission critical application workloads and recognized as a market leader by industry experts. Watch video and learn more!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • Podcasts // Oct 2013

    IBM business analytics: One solution that covers the entire analysis spectrum

    In this online demo, learn how IBM Business Analytics software includes capabilities that meet a broad range of analysis needs - from analytical reporting to predictive analytics.

    Provided By IBM

  • Podcasts // Oct 2013

    Companies Grow More with Oracle Sales Cloud

    Animated Video: Oracle Sales Cloud is Smarter SFA that helps Companies Grow More. Maximize revenue and optimize sales performance. Know what to sell your customers. And get more help from your marketers and partners.

    Provided By Oracle

  • Podcasts // Oct 2013

    Managers Know More with Oracle Sales Cloud

    Oracle Sales Cloud is Smarter SFA that helps Managers know more. Hit your target with no surprises. Act on opportunities and threats faster. Manage more effectively anywhere, using any device.

    Provided By Oracle

  • Podcasts // Oct 2013

    Simple, turn-key cloud orchestration

    Citrix CloudPlatform is a proven, turn-key cloud orchestration solution that makes it easy to build, manage and deliver highly scalable private, public and hybrid clouds. Enterprises and service providers can quickly and efficiently launch brand new production clouds at scale using their existing infrastructure. Watch video now!

    Provided By Citrix Online

  • Podcasts // Oct 2013

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By Wind River

  • Podcasts // Sep 2013

    Step Up to the IT Security Challenge

    Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on. A deeper understanding of how to manage your IT...

    Provided By Kaspersky Lab

  • Podcasts // Sep 2013

    Drive Your Transformation

    Drive your transformation to cloud computing.

    Provided By Technologent

  • Podcasts // Jul 2013

    Cape Cod Academy meets the BYOD challenge with HP Networking solutions

    How did the Cape Cod Academy triple wireless bandwidth, expand coverage by 20% and personalize the education experience among its students, faculty and staff? This case study outlines how they met their BYOD challenge during the mobile device boom with HP Networking Solutions.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Unified wired-WLAN solution for enterprises

    This fact sheet outlines the features and benefits of HP’s new unified wired and wireless enterprise solution that delivers industry-leading scalability, reliability and throughput for large enterprise campuses.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: HP Networking Value Proposition

    Craig Hinkley, Vice President and General Manager of HP Networking Americas, shares why HP Networking offers a simplified network solution for better performance, scalability and reliability—and lower TCO.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: HP Virtual Application Networks

    In this brief video, see how businesses can use HP Virtual Application Networks to focus on connecting users to business applications and on the quality of experience—rather than on the details of configuring the network, device by device.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: Underwriters Laboratories future-proofs their network

    See how HP helped Underwriters Laboratories future-proof their network with solutions to fulfill their goals with a reliable, centrally managed network built on modular, scalable HP technologies that support their projected growth over the next ten years.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jun 2013

    vSphere Snapshot Overview

    Joe Desmond, VMware Certified Instructor, provides an overview of the vSphere Snapshot tool to support guest O/S administrators. Snapshots allow safe change to virtual machines without the worry of failed implementation.

    Provided By VMware

  • Podcasts // Jun 2013

    HP AppSystems for SAP HANA Use Case: Utilities

    See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy efficiency benchmarks and achieve energy savings and emission targets. Sponsored by HP and Intel® Xeon® Processors

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2013

    My Patch Compliance Rates are WHAT

    Are you alarmed by patch compliance rates that aren’t anywhere near 100 percent? Do you wonder why it takes so long to apply required patches to all of your systems? Many organizations struggle to effectively patch all of their systems, especially when they have a mix of Microsoft Windows,...

    Provided By IBM

  • Podcasts // Mar 2013

    Time Tracking Product Preview

    With Workday Time Tracking, organizations can reduce labor costs, minimize compliance risks, and increase worker productivity.

    Provided By Workday

  • Podcasts // Feb 2013

    Big Data, Analytics and Expert Integrated Systems

    On February 20th at 1:00 pm Eastern time, Redmonk analyst James Governor will lead a video chat with a variety of panelists to discuss big data, analytics and expert integrated systems. This video chat - sponsored by IBM PureSystems - continues a video series on the subject of "Opinionated Infrastructure."

    Provided By IBM

  • Podcasts // Jan 2013

    Enabling the Mobile Workforce with BI

    See how to get the targeted, interactive and personalized information you need to make informed decisions while you are away from the office.

    Provided By IBM

  • Podcasts // Jan 2013

    NetIQ

    In this podcast, the speaker explains how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate the users' security across the enterprise and public cloud access, and increase executive visibility by providing their management...

    Provided By Novell

  • Podcasts // Jan 2013

    Accelerate to the Cloud With Novell Cloud Manager

    In this podcast, learn how the users' can build and manage a secure and compliant private cloud with Novell cloud manager. And not just how they can do it, but why they would want to.

    Provided By Novell

  • Podcasts // Jan 2013

    Solving Cloud Security: Your Nightmare, a Hackers Dream

    In this podcast, the speakers examine the security vulnerabilities of cloud computing. The speaker will also explores the emerging trends in cloud security, examining the benefits and limitations of current tools and methods.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Management: Challenges and Observations

    This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The...

    Provided By Novell

  • Podcasts // Jan 2013

    Tips for Managing and Securing Endpoints in the Enterprise

    In today's economy, organizations are becoming more complex everyday and devices are exploding in the enterprise. This growth creates IT challenges. In this podcast, the speakers offer tips to help organizations manage, optimize and secure their endpoints.

    Provided By Novell

  • Podcasts // Jan 2013

    Novell Cloud Security

    Most enterprises focus their security strategies. In this podcast, the speakers will examine how Novell Cloud security can help the users' to manage their applications and functions and secure multiple SaaS applications.

    Provided By Novell