Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Jan 2015

    Too Many Cooks - Exploiting the Internet-of-TR-069-Things

    In this webcast, the presenter will begin by describing their previous efforts presented this summer (DEF CON 22 & more), where their group revealed critically vulnerable TR-069 server deployments and discussed the incomprehensible asymmetry between the trust instated in this protocol and the measures taken to protect it (or lack...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Attacks on UEFI Security, Inspired by Darth Venamis's Misery and Speed Racer

    On modern Intel based computers there exist two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Finding the Weak Crypto Needle in a Byte Haystack

    Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    ECCHacks - A Gentle Introduction to Elliptic-Curve Cryptography

    In this webcast, the presenter will explain how to work with elliptic curves constructively to obtain secure and efficient implementations, and will highlight pitfalls that must be avoided when implementing Elliptic-Curve Crypto (ECC). The webcast will also explain what the entire buzz in curve choices for TLS is about. This...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Crypto Tales From the Trenches

    Cryptography and privacy-enhancing technologies are increasingly part of a modern journalist's spycraft. But what does it look like when a reporter actually tries to protect herself and her sources with the best tools that the hacker/academic/activist/cipherpunk/technologist communities have produced? Disaster, chaos, crashes, and UI-sponsored opsec fails.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Practical EMV PIN Interception and Fraud Detection

    In this webcast, the presenter will follow their previous EMV research uncovering new findings as well as a detailed analysis of chip & PIN fraud markers in order to benefit cardholders, as well as issuing banks, in preventing wrongful liability for fraudulent charges.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Karsten Nohl: Mobile Self-Defense

    The people know that mobile networks can - and do - attack them on many fronts. As this webcast will show, even 3G is attackable. It's high time that they upgrade from complaining to self-defense. Modern phones include all components necessary to block - or at least make visible -...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    SCADA StrangeLove: Too Smart Grid in da Cloud

    For two years SCADA StrangeLove speaks about industrial control systems and nuclear plants. This year the presenters want to discuss green energy. Their hackers' vision of green energy, SmartGrids and cloud IoT technology. They will also speak about the security problems of traditional \"Heavy\" industrial solutions, about the things that...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively

    In this webcast, the presenter will promote the adoption of better practices in the publication and demonstration of malware analyses. For various reasons, many popular analyses of malware do not contain information required for a peer analyst to replicate the research and verify results.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Is This Your Pipe? Hijacking the Build Pipeline

    As developers of the web, the presenters rely on tools to automate building code, run tests, and even deploy services. What happens when they're too trusting of CI/CD pipelines? Credentials get exposed, hijacked, and re-purposed.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Saving the Internet (for the Future)

    It has always been easier to attack than to defend on the Internet, even back to 1979 when it was written that \"Few if any security controls can stop a dedicated\" red team. The presenters accept this as true but the community rarely ever looks at the longer term implications...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Secure Random by Default

    As a general rule in security, the presenter has learned that the best way to achieve security is to enable it by default. However, across operating systems and languages, random number generation is always exposed via two separate and most assuredly unequal APIs - insecure and default, and secure but...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    NSA Playset GSM Sniffing

    A5/1, as implemented in GSM, was broken wide open in 2003, yet GSM is still the most widely used mobile communications protocol in the world. Introducing TWILIGHTVEGETABLE, the presenters' attempt to pull together the past decade of GSM attacks into a single, coherent toolset, and finally make real, practical, GSM...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Summary of Attacks Against BIOS and Secure Boot

    A variety of attacks targeting platform firmware have been discussed publicly, drawing attention to the pre-boot and firmware components of the platform such as secure boot, OS loaders, and SMM. Windows 8 secure boot provides an important protection against bootkits by enforcing a signature check on each boot component.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    The Only Way to Tell the Truth Is Through Fiction: The Dynamics of Life in the National Security State

    In this webcast, the presenter will illuminate the mobius strip on which all of the people walk as they make their way through the labyrinth of security and intelligence worlds they inhabit of necessity, all of the people some of the time and some of them all of the time.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    The Cloud Conspiracy 2008-2014

    There is a widespread misconception that somehow the new GDPR privacy regulation will curb foreign spying, when in fact it is designed to widen loopholes into floodgates. This webcast is multidisciplinary and will cover national and international surveillance and privacy law, five eyes SIGINT policy, technical security and economics.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abuse of Blind Automation in Security Tools

    It is impossibly overwhelming for security personnel to manually analyze all of the data that comes to them in a meaningful way. Intelligent scripting and automation is key. This webcast aims to be a humorous reminder of why the word \"Intelligent\" really matters; the user's security devices might start doing...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Android Hacker Protection Level 0

    Have no fear, after drinking all the cheap wine two Android hackers has attacked all the protectors currently available for everyone's enjoyment! Whether the user have never reversed Android before or are a hardened veteran there will be something for the user, along with all the glorious PoC tools and...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Attacking the Internet of Things (Using Time)

    Internet of Things (IoT) devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. The presenter will discuss how timing attacks work, how...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    You're Leaking Trade Secrets

    Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While the people hear a lot about personal privacy, little is said in regard to organizational privacy.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Bypass Firewalls and Application White Lists and Secure Remote Desktops Under 20 Seconds

    In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is, imagine a scenario, where the person have deployed a malware on a user's workstation, but the target information is on a secure server accessed via two-factor...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Client Side HTTP Cookie Security Attack and Defense

    HTTP cookies are an important part of trust on the web. Users often trade their login credentials for a cookie, which is then used to authenticate subsequent requests. Cookies are valuable to attackers: passwords can be fortified by two-factor authentication and \"New login location detected\" emails, but session cookies typically...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Cyber-hijacking Airplanes: Truth or Fiction?

    There have been several people making bold claims about the ability to remotely hack into aircraft and hijack them from afar. This webcast will take a systematic look at the mechanisms others are claiming would permit such cyber-hijacking. Each of the most popular techniques will be examined mythbuster style. Along...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Diversity in Information Security

    Discussion from the point of view of a diverse panel of leading representatives currently in or thinking of becoming part of the information security industry. This webcast will give the users insight to the evolutionary landscape of diversity in the hacking community.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Don't DDoS Me Bro Practical DDoS Defense

    Layer 7 DDoS attacks have been on the rise since at least 2010, especially attacks that take down websites via resource exhaustion. Using various tools and techniques - it is possible to defend against these attacks on even a shoestring budget. This webcast will analyze and discuss the tools, techniques,...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Formal Analysis of Security Procedures in LTE

    The only part of the Long Term Evolution (LTE) security standard that has been formally analyzed is the Authentication and Key Agreement (AKA) procedure. It is not clear how well existing security related verification tools can handle other types of procedures. In this webcast, the presenter will use ProVerif to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Combating Next-Generation Malware with Fast Forward-Secure Logging

    Security analytics is a catchall term for vulnerability assessment and intrusion detection leveraging security logs from a wide array of Security Analytics Sources (SASs), which include firewalls, VPNs, and endpoint instrumentation. Today, nearly all security analytics systems suffer from a lack of even basic data protections. An adversary can eavesdrop...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Some Vulnerabilities are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild

    The security of deployed and actively used systems is a moving target, influenced by factors not captured in the existing security metrics. For example, the count and severity of vulnerabilities in source code, as well as the corresponding attack surface, are commonly used as measures of a software product's security....

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Run Away if You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices in Dense Networks

    Wireless Local Area Networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    A Lightweight Formal Approach for Analyzing Security of Web Protocols

    Existing model checking tools for cryptographic protocol analysis have two drawbacks, when applied to present day web based protocols. Firstly, they require expertise in specialized formalisms which limits their use to a small fragment of scientific community. Secondly, they do not support common web constructs and attacks making the analysis...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    On Emulation-Based Network Intrusion Detection Systems

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity. Emulation-based network intrusion detection systems are regarded as a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    On-demand Webcast: DATA SECURITY: 2014 in Review, and What to Expect in 2015

    The Target data breach was the first of many major retail point-of-sale (POS) system breaches in 2014, with a string of other retailers like Jimmy John’s, P.F. Chang's, Kmart, and The Home Depot falling victim in the ensuing months. However, retail is not the only industry to be targeted and...

    Provided By Alert Logic

  • Webcasts // Dec 2014

    What Dungeons and Dragons Taught Me About Infosec - Lostknowledge

    What can anyone possible learn about working in the information security world from a library of fantasy books, stacks of paper character sheets and handfuls of plastic polyhedrons? Surprisingly quite a bit. In this webcast, the presenter will dive into some of the core background behind Dungeons and Dragons (and...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Test Driven Security Testing

    As more and more businesses are moving to rapid application development frameworks, and methodologies. The presenter find that testing within these constructs to become more difficult due to shorter cycles, incomplete applications, limited staff and resources. How do they test within these frameworks leveraging existing people, and infrastructure to provide...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Statistically Effective Protection Against APT Attacks

    There are a lot of different hardening and best practice guides available which tell how operating system and applications should be hardened against attacks. However, as anyone who has worked with corporate security knows, implementing hardening at corporate level is a rather expensive operation - and thus there is significant...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Watch ObserveIT Webinar on Managing Risky User Activity!

    The single biggest security risk in 2015 will be your users with 69% of reported incidents involve a trusted insider. In this recorded webinar, learn helpful tips on how to make your organization more secure from the fastest growing security threat: User Based Risks.

    Provided By ObserveIT

  • Webcasts // Nov 2014

    Investigating Powershell Attacks

    Over the past two years, the presenters have seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If the user's organization is running Windows 7 or Server 2008 R2, they've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!).

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Model Bedfellows

    The penetration test finds a bug in the code that was coded four months ago and could have been prevented a year ago during requirements gathering. The vendor says they will fix it shortly after the software launches - if a change order is issued and they're paid for their...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Attacking Mobile Broadband Modems Like a Criminal Would

    While there has certainly been some interesting research into the security of mobile broadband modems, or \"Dongles\", in the past, it has almost exclusively focused on novel attacks such as buffer overflows over text message, attacks on the device's file system, and other advanced approaches. The level of skill and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2011

    Enterprise Mobility Trends of 2011 published by Sybase

    Discussion on the latest trends in enterprise mobility with the expert authors of the Enterprise Mobility Guide 2011. Topics covered include the latest trends in mobile device management and app development?platforms such as iOS, RIM and Android and hardware such as smartphones and tablets.

    Provided By Sybase Inc.

  • Webcasts // May 2011

    Client Virtualization. Solved.

    Hear how CDW helped one customer create a virtual desktop infrastructure to centrally manage desktops, reduce costs and maintenance time and improve recovery time.

    Provided By CDW & VMware

  • Webcasts // May 2011

    Best Practices for Information Quality Management

    To achieve your business goals and objectives, you must first optimize the information that supports all of your business processes. Implementing an Information Quality Management practice and applying Trillium Software's proven best practices will help you maximize the value you get from your information. Apply our Information Quality Maturity...

    Provided By Trillium Software

  • Webcasts // May 2011

    VIPRE Antivirus Business

    Until now antivirus has been slow and hard to manage - but there is a fast and easy solution, VIPRE Antivirus Business! VIPRE Business offers Fast endpoint protection Easy deployment and manageability Reliable detection and remediation - all at an affordable price!

    Provided By GFI Software

  • Webcasts // May 2011

    Non-Compliance Costs: Should Your Organization Invest in GRC Tools?

    Compliance regulations are increasing in quantity and complexity. Many organizations are staying on-top of compliance requirements by leveraging an integrated governance, risk and compliance (GRC) framework. Although (GRC) best practices are being adopted as the solution for non-compliance by many, how do you decide whether your organization needs a GRC...

    Provided By ANXeBusiness Corp

  • Webcasts // May 2011

    Operational Data Quality - Data Governance

    Poor data in your business applications often originates from data quality problems in upstream operational systems. That's why it's critical to establish a Data Governance initiative to set standards, improve quality, and monitor how data supports business processes moving forward. Learn how Digital River successfully implemented Data Governance across their...

    Provided By Trillium Software

  • Webcasts // Dec 2010

    On demand webcast: Harnessing Oracle GRC to Control Your E-Business Suite 12.1 Upgrade

    Oracle E-Business Suite (EBS) 12.1 offers new capabilities for customers across the application suite, aligning with business objectives in every department, while lowering overall cost of ownership. Making the upgrade requires managing change by balancing risk and control with speed and performance. Implementation is recommended using a "design-in" approach to...

    Provided By Oracle

  • Webcasts // Nov 2009

    CA & Red Hat Present: Who Securing Your JBoss Applications?

    Single-sign on, strong user authentication, and centralized security policy management are keys to securing any mission critical infrastructure. In this Red Hat and CA webinar, Red Hat's JBoss Application Platform Product Line Director and, Principal Product Manager, Identity and Access Management at CA to learn how Red Hat customers are...

    Provided By Red Hat

  • Webcasts // Jan 2010

    David Parsley On Big Macs And The World Economy

    Professor Parsley's current research focuses on exchange rates and the integration of goods and services markets, financial markets, and labor markets. He is also working on measuring the effects of political connections on the quality of accounting information, and on the financial performance of politically connected firms.

    Provided By Vanderbilt University (Owen)

  • Webcasts // Nov 2010

    Taming the Information Explosion with IBM System Storage

    Today's IT departments are being asked to meet tomorrow's storage challenges with yesterday's solutions. In this special announcement webcast, an IBM storage executive and a recognized storage analyst will discuss a host of new offerings in our storage portfolio. You'll learn about innovative technologies that are fully integrated and...

    Provided By IBM

  • Webcasts // Nov 2010

    Orchestrate Digital Initiatives to Better the Customer Experience

    An increasing share of business' customer interactions take place online, and in response, businesses are shifting investments to digital venues. But these efforts don't always result in a compelling customer experience. How does a business supercharge its digital strategy and deliver a great experience to their clients? Attend this...

    Provided By IBM

  • Webcasts // Apr 2010

    Safe & Secure: An Overview of Security Features in JBoss Application Platforms

    Is the Java environment secure? Have the locked down the applications? Are the exposed to the latest security issues? Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users...

    Provided By Red Hat

  • Webcasts // Mar 2010

    Discount Tire Accelerates e-Commerce With Red Hat Network Satellite

    Discount Tire, the world's largest independent tire and wheel retailer, needed to support its rapidly growing e-commerce business while keeping costs contained and complying with strict PCI security standards. The firm ran its entire e-commerce operation on Red Hat Enterprise Linux, as well as numerous internal applications including its Lotus...

    Provided By Red Hat

  • Webcasts // May 2010

    Unlock the Value of Cloud Computing: Turn Your IT Infrastructure Into an Agile, Strategic Asset Today

    In today's challenging and competitive economic climate, financial services companies are driven to raise infrastructure ROI, while decreasing cost and optimizing the use of existing IT resources. The cloud computing model is uniquely suited to help organizations meet current and future, often unpredictable business requirements. Many industry analysts have stated...

    Provided By Red Hat

  • Webcasts // May 2010

    Creating a Strong Security Infrastructure for Exposing JBoss Services

    As SOA services become successful inside an organization, the organization is often confronted with the challenge of making those services available to external partners in a secure and affordable way. As services are exposed externally, new security and governance requirements must be considered such as SOAP or REST message level...

    Provided By Red Hat

  • Webcasts // May 2010

    Managing the Enterprise With RHN Satellite

    As a customer of Red Hat Network Satellite, this webcast shows where one will show best practices for managing a growing Linux environment. Sr. Solutions Architect will provide guidance on how to manage the expanding systems which can allow for increased costs and complexities. This webcast will show the power...

    Provided By Red Hat

  • Webcasts // Nov 2010

    CA & Red Hat Present: Who's Securing Your JBoss Applications?

    Single-sign on, strong user authentication, and centralized security policy management are keys to securing any mission critical infrastructure. After this webcast, the will, gain a better understanding of how CA and Red Hat collaborate together Learn how and why customers use identity and access management tools in their mission critical...

    Provided By Red Hat

  • Webcasts // Jan 2010

    Where's My Data? Tips & Tricks for Designing a Strong DQ/DI Strategy

    Challenged by a tough economy and a huge increase in the amount of valuable data, the hospitality and gaming industries are at a critical juncture and require new and unique solutions to their data management issues. This Webcast focusing on how SAS can help one effectively attain, integrate and manage...

    Provided By SAS Institute

  • Webcasts // Oct 2010

    MSDN Webcast: Security Talk Series: Fixing Application Security Issues the Right Way (Level 300)

    This Webcast show Fixing Application Security Issues the Right Way. What is security? It's about protecting assets: Tangible assets, such as a webpage or customer database, and fewer tangible assets, such as the company's reputation. A threat is a potential event that can adversely affect an asset, whereas a successful...

    Provided By Microsoft

  • Webcasts // Oct 2010

    Protecting Sensitive Data in an Enterprise With No Boundaries

    Email was once a nice-to-have application, as was running a corporate website. Now both are critical to enterprises, with millions at stake if they experience an outage. With this in mind, it's impossible to ignore the rapid adoption of mobile devices, social networks, IM, texting and other alternate communications, and...

    Provided By Unisys

  • Webcasts // Jan 2010

    Security and the Importance of Integration: You Are Only as Strong as Your Weakest Link

    One can stay only as secure as the weakest link and getting security right has become increasingly complex. This webinar explores the issues of how getting security right will deliver the real business benefits, be it through increased trust delivering more client/citizen engagement, reducing costs, or having the freedom to...

    Provided By Unisys

  • Webcasts // Nov 2010

    What the Unisys Security Index Means for You

    National security, identity theft and credit card fraud are the top security concerns of the American public. These findings are the latest results of the, a biannual survey of America's sense of financial, national, Internet and personal security. So what do these results mean? What steps are Americans taking to...

    Provided By Unisys

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Controlling Malware With Security Analytics

    In today's business world, partners, customers, networks, applications, computers and mobile devices must all be connected through many points of access, making enterprises vulnerable to hackers. The presenter of this webcast talks about how system breaches can damage clients' businesses and cost them money, and advanced security analytics that give...

    Provided By Unisys

  • Webcasts // Nov 2010

    Unisys ClearPath MCP 13.0 Security Overview

    The Unisys ClearPath MCP 13.0 Release includes many important security features, such as Secure Telnet, 2-tier secure WebEnabler, and secure TCPIPNATIVESERVICE port files, a new Role-Based Access Control subsystem for applications, Locum Real-time Monitor for real-time security monitoring, and many other incremental features. This technical webcast gives an overview of...

    Provided By Unisys

  • Webcasts // Nov 2010

    Unisys ClearPath OS 2200 Encryption Insights

    Encrypting sensitive data is an essential part of a strategy for protecting business assets and complying with governmental and industry regulations. This technical webcast includes insights gained from the use of Cipher API, the ClearPath OS 2200 product that uses to encrypt the stored data. After a brief overview, this...

    Provided By Unisys

  • Webcasts // Nov 2010

    7 Tips and 2 Models: Find a MSSP that Fits Your Business

    Tune in with John Ramsey and hear about 2 models for handling network security and 7 tips on choosing a managed security services provider. You'll learn the benefits of working with an MSSP, and how important a provider's industry knowledge is to their business. Part 2 of a 4 part...

    Provided By Megapath

  • Webcasts // Nov 2010

    Hosted VoIP: What about Service Quality?

    Listen to this podcast and Learn the basics on how hosted voice services work. Join Joel Thomas and get insight into small business advantages for adopting hosted voice, types of businesses that benefit most from hosted VoIP, and quality indicators for evaluating service providers.

    Provided By Megapath

  • Webcasts // Dec 2010

    Secure Data Management and Processing: Leveraging the Web for Secure Data Processing

    Kane County's Circuit Court Clerks office is leveraging the web to transform how orders of protection are accessed, completed, submitted, reviewed, and approved. The more integrated, automated processes translate into better protection for victims of domestic violence.

    Provided By Adobe Systems

  • Webcasts // May 2011

    Becoming a Social Business - videos

    Social Business videos: See how organizations are transitioning to a social business. Empower people with social networks, engage with experts and clients, and cultivate trust.

    Provided By IBM

  • Webcasts // May 2011

    How It Works: Smarter Commerce

    The 'how' and 'why' of smarter commerce - told through hand-drawn illustrations and simple narration.

    Provided By IBM

  • Webcasts // Mar 2011

    Symantec Study: SMBs Not Prepared For Disasters, Don't Act Until It's Too Late

    Symantec's 2011 SMB Disaster Preparedness Survey found that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also revealed that disaster-related downtime costs a typical SMB $12,500 per day. Learn more about the survey findings...

    Provided By Symantec

  • Webcasts // Apr 2011

    Defeating the Cyber Mutants: Protecting Your Business from Modern Malware

    Modern malware rarely strikes the same way twice. Today's malicious code rapidly mutates, bypassing traditional defences. This webcast will examine these threats and the new technology that organizations from small businesses to large enterprises can use to protect their physical and virtual environments. Attend this webcast to learn: Why traditional...

    Provided By Symantec

  • Webcasts // Jul 2009

    President Obamas First Six Months In Office; Kurdish Elections In Iraq

    In this webcast, Brookings experts release a composite index of national and global trends for the first six months of President Obama's term, lining them up against the same point in the five prior presidencies; the presenter discusses the significance to the American people of the Kurdish vote in Iraq;...

    Provided By Brookings Institution

  • Webcasts // Jun 2009

    Iran; Cash For Clunkers; The Federal Deficit

    Brookings scholars ponder the developments in Iran as the government cracks down on protests over the presidential election; the public weighs in on the "Cash for clunkers" legislation; and vice president and director of Economic Studies, advises controlling the federal deficit sooner rather than later.

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    The Politics And Perils Of Guant?namo

    Opposition to trying alleged 9/11 mastermind Khalid Sheik Mohammed in civilian court has led the Obama administration to consider a military tribunal instead. Meanwhile, controversy continues over when, where and how to try terrorism suspects, and what to do with some 220 detainees who remain at Guant?namo Bay a year...

    Provided By Brookings Institution