Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jun 2012

    Bring-Your-Own-Device Solutions Overview

    In this webcast, the presenter explains about how Citrix Bring-Your-Own-Device (BYOD) solutions enable IT to embrace consumerization, empower employees and simplify IT. Find out how Citrix BYOD solutions free people to access their desktops, applications and files from their own personal laptops, tablets and Smartphone's, while IT is able to...

    Provided By Citrix Systems

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Oct 2012

    Cisco and Citrix: Mobile Workstyles and BYOD Solutions

    In this webcast, the presenter explains about how Cisco and Citrix intend to develop \"Mobile workstyle and BYOD\" solutions that give mobile users a unified way to securely access business apps, data, voice and collaboration services from any device, anywhere.

    Provided By Citrix Systems

  • Webcasts // Jun 2012

    Executive Mobility Solutions Overview

    For executives, work is not a place. It's what they do wherever and whenever business needs to be done, and now they want to do it all from the coolest devices. In this webcast, the presenter explains about how Citrix executive mobility solutions enable executives to increase their productivity, improve...

    Provided By Citrix Systems

  • Webcasts // Sep 2014

    Threat Modeling for Realz

    In this webcast, the presenter explains about threat modeling, which is a core activity for \"Baking security in\". Understanding the threats against the user's system-how likely it is for these threats to be realized-the impact of a realized threat- and how to defend against the threat is key to building...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    High-Speed High-Security Cryptography: Encrypting and Authenticating the Whole Internet

    In this webcast, the presenter explains about different approach to high-security Internet cryptography. This approach is easy for users, easy for system administrators, and, perhaps most importantly, easy for programmers. The main reason that the approach has not been tried before is that it seems to involve very slow cryptographic...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Hunting Malware on Linux Production Servers: The Windigo Backstory

    Operation Windigo is a large server, side malware campaign that targets Unix systems (BSD, Linux, etc.). There are three major components: Linux/Ebury an OpenSSH backdoor and credential stealer, Linux/Cdorked a Web Server backdoor (it works with Apache, Nginx and Lighttpd) that redirects end users to exploit kits, and Perl/Calfbot a...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Internet of Insecure Things: 10 Most Wanted List

    In this webcast, the presenter explains about the history of embedded device insecurity. The presenter will also explore some real-world example of how devices are exploited (and attackers profited). The user will also learn what they can do to help fix these problems and push the industry for a much...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secure Communications Below the Hearing Threshold

    In this webcast, the presenter will focus on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in real-time. A framework has been developed to meet these requirements, providing interfaces for robust steganographic algorithms.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Defense Is Not Dead - Why We Will Have More Secure Computers - Tomorrow

    In this webcast, the presenter will look into the state of the art in building secure computers, with a focus on type systems and formal verification, and hopefully an outlook on how tomorrow's computers will be more secure than what the user can buy now.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Wideband GSM Sniffing

    GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should be considered unprotected.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Hacking Smart Phones

    In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with...

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    BYOD : The Privacy and Compilance Risks From Bringing Your Own Mobile Device to Work

    In this webcast, the presenter discuss about BYOD. BYOD is a disaster. It is a privacy fiasco. It will cause massive data breaches and privacy violations. PLUS -n BYOD is more expensive than running two separate devices.

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    DBI Frameworks Applied to Computer Security

    In this webcast, the presenter will show how Dynamic Binary Instrumentation (DBI) works, and what for it can be applied in computer security. As proof of concepts, it will be shown how DBI can be useful for detecting vulnerabilities (e.g., buffer overflow or taint analysis) in Windows executables.

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    Malware Vs Virtualization

    In this webcast, the presenter discuss about virtualization, it plays cat and mouse. Malware are studied into virtual environments, thus modifying their behavior to mimic inoffensive programs and avoid detection. They discover more accurately their execution environment.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Security of MDM (Mobile Device Management) Systems

    More and more corporate are deploying mobile devices like Smartphone's and pads. To manage these devices, several solutions are available like MobileIron, good technology, Symantec and several others. In this webcast, the presenter installed and studied two of these solutions from a security point of view. More precisely, if it...

    Provided By SecurityTube.net

  • Webcasts // Jun 2013

    Analysis of a Windows Kernel Vulnerability

    In this webcast, the presenter explains the technical details of this exploit. It is not about \"Duqu\" nor Russian exploit kits. The vulnerability itself only allows the attacker to perform an \"OR\" operation on a value of their choice, at a memory location of their choice.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network

    In this webcast, the presenter will show how to create the dropper, implant bots, master controller, and launch new payloads on the victim box through the use of Splinter the RAT, an open-source red-team collaboration framework they developed and released to the community to show the ease at which RATs...

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Breaking Through the Bottleneck : Mobile Malware Is Outbreak Spreading Like Wildfire

    In this webcast, the presenter explains about various advanced evasion techniques used by mobile malware to break the bottleneck of spreading. The presenter led both TrustGo security labs and security team for Chinese android app stores. They have seen plenty of mobile malware and malware technologies.

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Provided By Druva Software

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Provided By Centrify

  • Webcasts // Jan 2010

    Centrify Security Solutions for PCI Compliance

    The attendee of this webcast will learn how Centrify helps corporate IT security managers address the key provisions of Sections 7, 8 and 10 of the PCI Data Security Standard for their UNIX and Linux systems.

    Provided By Centrify

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Provided By Centrify

  • Webcasts // Aug 2014

    Data-Only Pwning Microsoft Windows Kernel: Exploitation of Kernel Pool Overflows on Microsoft Windows 8.1

    Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms - kernel land vulnerabilities are getting more and more valuable these days. For example, the easy way to escape from a sandbox is by using kernel vulnerability. That's why Microsoft struggles to enhance security of Windows...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Dynamic Flash Instrumentation for Fun and Profit

    Many of the latest flash exploits seen in the wild (CVE-2013-5329, CVE-2013-5330, CVE-2014-0497, etc.) are protected with commercial tools like DoSWF and secureSWF. Malicious flash redirectors are also utilizing the same tools.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Extreme Privilege Escalation on Windows 8UEFI Systems

    The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined \"Runtime services\" interface between the operating system and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

    Return-Oriented Programming (ROP) is a powerful exploitation technique used in nearly every exploit today. It maliciously combines short code snippets (gadgets) residing in shared libraries and the executable to bypass Data Execution Prevention (DEP). As a consequence, several new Control-Flow Integrity (CFI) mechanisms and tools have been recently proposed to...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    My Google Glass Sees Your Passwords

    In this webcast, the presenter will introduce a novel computer vision based attack that automatically discloses inputs on a touch enabled device. The presenter's spying camera, including Google Glass, can take a video of the victim tapping on the touch screen and automatically recognize more than 90% of the tapped...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Write Once, Pwn Anywhere

    Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP has been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topics in the security community.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

    Attacking the modern browser and its plugins is becoming harder. Vendors are employing numerous mitigation technologies to increase the cost of exploit development. An attacker is now forced to uncover multiple vulnerabilities to gain privileged-level code execution on their targets.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    GRR Find All the Badness, Collect All the Things

    In this webcast, the presenter will introduce GRR capabilities with some use cases and discuss the difficulties of running the tool across different environments. The presenter will explain and demonstrate GRR artifact collection as well as talk about some of the aspects that make artifacts powerful but challenging to implement.

    Provided By SecurityTube.net