Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Podcasts // Jan 2013

    Symantec Sealed Program

    Is the user a mobile app developer? Wrap their app with enterprise-grade security policies from the security leader, Symantec. In this podcast, learn how Symantec Sealed App enables enterprise with mobile productivity.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec File Share Encryption

    Learn how Symantec File Share Encryption encrypts files and folders based on policy and enables end users to continue normal business operations with zero disruptions. All while contributing to a more secure and effective work environment.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec Drive Encryption - High Leve

    Privacy is the ever increasing trend in the modern business world. In this podcast, the speaker going to give a brief introduction to Symantec's Drive Encryption product, find out more.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec Drive Encryption - Deep Dive

    In this podcast, the speaker going to explain about Symantec Drive Encryption and how it works including setup, passphrase recovery, and user experience. The speaker will also explain about the how encryptions are handled and whether is it compatible with all the systems.

    Provided By Symantec Corp.

  • Podcasts // Dec 2012

    OnDemand: Faster VMs Guaranteed – No Hardware Required

    Learn how optimizing I/O at the source on virtual machines provides up to 50% or more application performance at a fraction of the cost of hardware. By eliminating unnecessary I/O traffic at the guest level, there is far less traffic pushed into the server, network, and storage. This OnDemand...

    Provided By Condusiv Technologies

  • Podcasts // Oct 2012

    Social Clienteling - Nurturing VIP Connections In-store and Beyond

    Join us to learn how leading retailers are re-imagining the guest and associate experience to better serve their best customers through the use of Social Clienteling, a 21st century approach to an age-old process.

    Provided By Salesforce.com

  • Podcasts // Oct 2012

    Oracle and Cloudera working together on Big Data

    Recent years have seen growing interest in various approaches to clouds and server virtualisation. So far, most cloud use cases focus on application servers. Yet, there are many reasons user organisations also need a "database cloud" for database management systems, data driven applications such as business intelligence and data warehousing...

    Provided By Oracle

  • Podcasts // Aug 2012

    Security for Virtualization Movie

    As the move to virtualization gathers momentum, many companies find themselves doing business in a diversified environment - one that includes traditional physical servers, cloud-based solutions and virtual machines. While the driving forces for virtualization are greater efficiency and lower costs, security needs to retain significant mind share. From day...

    Provided By Kaspersky Lab

  • Podcasts // Aug 2012

    McAfee Deep Defender video

    An in-depth look of how McAfee Deep Defender and DeepSAFE works with the Intel hardware features to run beyond the operating system to detect covert stealth attacks in real-time.

    Provided By Intel Corporation

  • Podcasts // Jul 2012

    Railscasts #366: Sidekiq

    In this podcast, the speaker explains about Sidekiq which allows one to move jobs into the background for asynchronous processing. It uses threads instead of forks so it is much more efficient with memory compared to Resque.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2012

    Achieve the Five 9s of High Availability

    Achieve the Five 9's of Oracle Database High Availability If you think it sounds impossible to ensure just 6.05 seconds of downtime per week, you've got to check out this on-demand webcast. In it, a top expert on Oracle database replication reveals cool techniques that keep systems up and...

    Provided By Dell Software

  • Podcasts // Jun 2012

    What is a ClickAppStore?

    Are you looking to empower the people in your organization working outside of the office to do a great job and make sure that the customers get the best service in the industry? ClickSoftware's mobility solution gives you the freedom of seamless mobility to drive your enterprise forward. ClickMobile is...

    Provided By ClickSoftware

  • Podcasts // Jun 2012

    Set It & Forget It - Apple Devices in the Enterprise

    Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.

    Provided By Absolute Software

  • Podcasts // Jun 2012

    Railscasts #358: Brakeman

    In this podcast, the speaker will explain about the Brakeman. The Brakeman is an opensource vulnerability scanner gem which will scan the Ruby code of a Rails application and alert the user to common security vulnerabilities.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2012

    It's the Putting Right That Counts

    In this Podcast, the speaker discusses about Flame malware. Flame malware involves mathematical breakthroughs, MPAA does not appose returning legitimate Mega-upload files to users. The speaker also discusses about flame malware disadvantages of Flame malware.

    Provided By RawVoice

  • Podcasts // Jun 2012

    Chesapeake Bay Foundation rescues the bay with NetApp's affordable and efficient solution for mission-enabling IT

    Learn how Chesapeake Bay Foundation optimized their data center infrastructure by creating a technology foundation that meets the challenges of the coming years. They were able to unify their server and storage architecture and implement best practices, rearchitect VMware? environment to gain greater virtualization efficiency; as well as upgrade and...

    Provided By NetApp

  • Podcasts // Jun 2012

    Raven Industries Elevates Corporate Services with Improved Uptime on NetApp - Video

    For Raven Systems, 24/7 systems availability is critical. With NetApp, Raven Systems was able to deliver superior uptime, allowing the Corporate Services division to enhance its service and the business to focus on remaining competitive. Challenges they overcame: performance issues with firmware upgrade cycles, improve storage efficiency and scalability to...

    Provided By NetApp

  • Podcasts // May 2012

    Railscasts #352: Securing an API

    There are many approaches to locking down an API. In this podcast, the speaker will start off with HTTP Basic authentication then move on to generating a unique token which can be passed through a URL parameter or HTTP header.

    Provided By Oleksiy Kovyrin

  • Podcasts // Apr 2012

    Customers Discuss Oracle Database Security

    Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.

    Provided By Oracle

  • Podcasts // Apr 2012

    Manually Removing Viruses and Malware from Windows 7

    Getting a virus on the users' computer is a pain and they are becoming ever more difficult to remove. In this podcast, the speaker explains manually and safely removing viruses and malware from the users' computer without damaging their files or windows itself.

    Provided By O'Reilly

  • Podcasts // Mar 2012

    Tommy Hilfiger Customer Video

    Discover how this premium lifestyle brand is using a new iPad app to present its upcoming collections to retailers. Tommy Hilfiger is keeping its sensitive data theft-proof, and is able to remotely wipe a stolen device in seconds - with our mobile device management and security software.

    Provided By SAP

  • Podcasts // Feb 2012

    Cookie-Gate, Laptop Security Advice, Stratfor Malicious Emails and Facebook Hacker Advice

    In this podcast, the speakers started out discussing a topic that the speaker have been quite passionate about, the "Cookie-gate" incident involving Google and other advertising companies placing cookies on people's computers who surf the web using Safari by exploiting a security flaw in Safari's privacy settings.

    Provided By Sophos

  • Podcasts // Feb 2012

    Patch Tuesday, Apple App Privacy and RSA

    In this podcast, the speakers discussion with Patch Tuesday and the fixes released by Microsoft, Adobe and Oracle. The speaker provided some clarity for Mac users on the confusing mix of Java versions and availability, depending on which version of OS X one may be using.

    Provided By Sophos

  • Podcasts // Feb 2012

    Why is a 14-Month-Old Patched Microsoft Vulnerability Still Being Exploited?

    In this podcast, the speaker focuses on a specific Microsoft patch, namely MS10-087, released to address the vulnerability CVE-2010-3333 (RTF Stack Buffer Overflow Vulnerability). The patch was released way back in November 2010, and his paper tracks the constantly evolving exploits that have been hammering away at unpatched systems.

    Provided By Sophos

  • Podcasts // Feb 2012

    Down the Rabbithole - Episode 10 - "The Real Gene Kim" on DevOps, KPIs & High Performance IT

    In this podcast, the speaker talks about his current project(s) [The DevOps Cookbook, and When IT Fails: A Novel], and his book Visible Ops and how this can all be applied to security in today's tough business climate. Gene and the speaker discusses what in the DNA of well-performing (or...

    Provided By Wh1t3 Rabbit

  • Podcasts // Feb 2012

    Sophos Security Threat Report, DMARC and Mobile Phone Number Leaks

    In this podcast, the speakers discussion about the Sophos Security Threat Report 2012. They talked about a few of the highlights like the commonality of exploit kits like Black Hole, the latest trends in mobile malware and the current state of security regarding the cloud.

    Provided By Sophos

  • Podcasts // Jan 2012

    NCSA and Data Privacy Day

    In this podcast, the speaker explains the history of Data Privacy Day and the importance of understanding privacy on the modern internet. They chatted a bit about the role businesses play in consumer privacy, including his favorite phrase. Another important message shared by the speaker is that privacy online isn't...

    Provided By Sophos

  • Podcasts // Jan 2012

    Mobile Security Podcast With Vanja Svajcer

    In this podcast, the speakers discussed the risk to businesses versus consumers and the impact of the Bring Your Own Device (BYOD) trend that took off in 2011. The speaker also shared some tips with their listeners on some best practices for safer usage of their smartphones.

    Provided By Sophos

  • Podcasts // Jan 2012

    Smart Meter Privacy Concerns, WiFi Insecurity Due to WPS and Password Hashes Explained

    In this podcast, the speakers discussing the privacy implications of smart meters after the recent presentation at the Chaos Computing Congress. Another story, they covered this week was the attempt at making security easy in WiFi routers which results in total insecurity.

    Provided By Sophos

  • Podcasts // Jan 2012

    Innovate 2012: Transform Your IT Processes With Collaborative Development and Operations

    Are you missing windows of opportunity for adopting new and innovative business solutions? Does a lack of collaboration and poor visibility across one IT organizations keep they from achieving their business objectives? The Collaborative Development and Operations track details best practices for aligning development and operations, including: collaboration and communication...

    Provided By IBM

  • Podcasts // Jan 2012

    5 Best Practices to Develop 5 Star Mobile Applications, Part 1

    In this podcast, the speakers will discuss the best practices and comprehensive set of capabilities for enterprise mobile application development and lifecycle management using an agile methodology. This tightly integrated solution - which leverages their open standards-based mobile application platform and ALM capabilities - delivers capabilities targeted at key mobile...

    Provided By IBM

  • Podcasts // Jan 2012

    SIEM Is Dead

    In this podcast, the speaker going discusses about the SIEM where organizations have relied on point products such as log management and SIEM to monitor event-based information. But, that method could miss critical data, creating gaps that could lead to loss of customer and business data.

    Provided By CompuCom Systems

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 1: Overview

    In this podcast, the speakers explain about how VMware vSphere helps IT cut capital and operational costs by over 50% for all applications while improving control over application service levels and preserving customer choice to use any hardware, OS, or application.

    Provided By VMW Games

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 7: Control of Application Security

    In this podcast, the speakers explain how VMware vSphere gives a better control over application security levels than possible in the physical world. The speakers also explain the new features of VMware vSphere.

    Provided By VMW Games

  • Podcasts // Jan 2012

    What's New With VMware View

    The latest release of VMware View, the next generation of the VMware VDI solution, enables one to streamline virtual desktop and application management, reduce costs and improve data security. This podcast features VMware product management and professional services discussing the technology advancements in the solution.

    Provided By VMW Games

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 5: Operational Efficiency and Network Management

    In this podcast, the speakers explain about the new networking features in VMware vSphere, including VMware vNetwork Distributed Switch (vDS), and their impact on network management, security, and operational efficiency. The vDS also enables third party distributed switches such as Cisco Nexus 1000v to seamlessly plug into vSphere environments, enabling...

    Provided By VMware

  • Podcasts // Jan 2012

    Information Security Strategies

    In this podcast, the speaker talks about Security management. The speaker explains the corporate security technology strategy across the RSA and EMC product lines. The speaker also offers a seasoned perspective on information security.

    Provided By EMC

  • Podcasts // Jan 2012

    Application Security Survey Results - An Interview With Jeremiah Grossman

    In this podcast, the speaker discusses the latest application security survey conducted by the Ponemon Institute. The speaker gives his perspectives on the survey results and details the why and how of the survey's findings.

    Provided By Imperva

  • Podcasts // Jan 2012

    Application Security Survey Results - An interview with Dr. Larry Ponemon

    In this podcast, the speaker discusses why this survey is so timely given the state of application security. He goes on to discuss some of the statistical findings as well as well as his interpretation of the results. Finally, the speaker outlines what companies that are getting application security done...

    Provided By Imperva

  • Podcasts // Jan 2012

    Perspectives on Data Security in Asia - An interview with Terry Ray

    In this podcast, the speaker discusses how different regions approach application and database security, current events such as the recent Google attacks in China, and how the Asian community is applying countermeasures to protect their sensitive applications and databases.

    Provided By Imperva

  • Podcasts // Apr 2010

    Windows 7 and Small Business Server Demo Series: (Part 5 of 7) How-To Improve Security

    This podcast is the fifth part of Windows 7 and Small Business Server Demo Series which speakes about the security improvements in Windows Small Business Server 2008 and Windows 7 Professional, including BitLocker, new BitLocker to Go, Encrypting File System, and a 125-day trial of Forefront Security for Exchange.

    Provided By Microsoft

  • Podcasts // Feb 2010

    Security Talk: Protecting Your Data Using Encryption in SQL Server

    An increased focus is being given to ensuring the protection of confidential and sensitive data. As a result, encryption has become more important in databases, and government regulations and industry standards, such as the Payment Card Industry Data Security Standard (PCI DSS), explicitly demand the use of cryptography. In this...

    Provided By Microsoft

  • Podcasts // May 2011

    Export a Group Policy Object From the Microsoft Security Compliance Manager (SCM)

    In this podcast the speaker will show how to export the security baselines one makes in the Microsoft Security Compliance Manager (SCM) to a Group Policy Object (GPO). One will also learn how to import the GPO into one's production environment. The SCM has multiple export capabilities.

    Provided By Microsoft

  • Podcasts // May 2011

    Import an Existing Group Policy Objects into the Microsoft Security Compliance Manager (SCM)

    In this podcast the speaker will show one how to import and existing Group Policy Object into the Microsoft Security Compliance Manager (SCM). With SCM one can import one existing baselines to help compare and merge changes for one baseline configurations.

    Provided By Microsoft

  • Podcasts // Mar 2011

    Applying Microsoft SDL Release Practices Within Windows Azure

    In this podcast, the speaker, Co-Founder, Casaba, speaks about the Release phase of the Microsoft SDL and how to apply the Microsoft SDL release phase practices to applications built on top of Windows Azure. The speaker explains that the Microsoft SDL can apply to any cloud-based deployment, but focuses on...

    Provided By Microsoft

  • Podcasts // Feb 2011

    Secure Management and Access for Windows 7 Featuring Direct Access

    Microsoft Forefront Unified Access Gateway (UAG) and DirectAccess in Windows 7 can simplify management and access for a variety of external Windows client scenarios. Authentication, end-point security, application security, and infrastructure planning play crucial roles in management and access.

    Provided By Microsoft

  • Podcasts // Apr 2011

    Talk TechNet With Keith Combs and Matt Hester - Episode 22: Elias Mereb on Windows Client Security and Reliability

    Talk TechNet is all about discussing topics and trends in the world of IT Professionals. In this podcast the speakers will have guest Elias Mereb. Join the speakers for what promises to be a lively 60 minute session. Get some burning questions answered on Windows Client security, reliability and performance.

    Provided By Microsoft

  • Podcasts // May 2011

    Overview of the Microsoft Security Compliance Manager (SCM)

    In this podcast the speaker will give one a quick tour of the Microsoft Security Compliance Manager (SCM). Microsoft Security Compliance Manager provides centralized security baseline management features, a baseline portfolio, customization capabilities, and security baseline export flexibility to accelerate an organization's ability to efficiently manage the security and compliance...

    Provided By Microsoft

  • Podcasts // May 2011

    SDL Threat Modeling Tool

    Listen to this podcast to learn more about the Microsoft Security Development Lifecycle (SDL) Threat Modeling tool. The SDL Threat Modeling Tool is one of many free tools made available as part of the SDL Toolset. The SDL Threat Modeling Tool is the first threat modeling tool which isn't designed...

    Provided By Microsoft

  • Podcasts // May 2011

    Code Analysis for C/C++

    Listen to this podcast to learn more about Code Analysis for C++. The C/C++ Code Analysis tool is a static analyzer that is provided with the installation of Microsoft Visual Studio Team System or Microsoft Visual Studio Team Suite, which provides information to developers about possible vulnerabilities in their C/C++...

    Provided By Microsoft

  • Podcasts // Jul 2011

    Expanding your business with mobile enable portals

    Listen in to get the key points on how to effectively and efficiently deliver and utilize web applications on any of the over 7000 mobile platforms currently in use. Write once and render to many!

    Provided By IBM

  • Podcasts // Apr 2010

    How Do I: Exchange Message Scan

    This podcast shows how to configure Microsoft Forefront Security for Exchange Server to scan messages that are in the store and as they are accessed. In this podcast the speaker explains how to configure file filters, content filters and email notifications.

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Remove Files

    This podcast shows how to use Forefront Server Security for Exchange server to scan the existing messages within an Exchange mailbox store for specific files and then remove them. In this podcast he shows how to configure a manual scan job to search for files of a particular type, generate...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Forefront Management Console Part 3

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In this, podcast of aseries of 3, the speaker explains how to configure alerting using the management console and discuses the use of filters to...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Forefront Management Console Part 1

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In the first podcast in this series, the speaker explains how to install the console and then create a package to deploy Forefront Security for...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Incoming E-mail Scan

    This podcast explains how to configure Microsoft Forefront Security for Exchange Server to scan incoming and outgoing emails. In this podcast the speaker explains how to configure file and keyword filters as well as configuring notifications.

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Quarantined E-mails

    This podcast explains how to manage emails and files that have been quarantined by Microsoft Forefront Security for Exchange Server. In this podcast the speaker shows how to configure the security mode for messages delivered from quarantine, how to export the incident and the quarantine log files, how to redeliver...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Information Protection Using Exchange 2010 and Active Directory Rights Management Services

    Exchange 2010 and Active Directory Right Management services integrate in order to provide Information Rights Management (IRM) in Exchange. IRM is used to protect messages at multiple levels, including in-transit mail as well as stored mail and voicemail, among others. In this podcast speaker speaks about the prerequisites for enabling...

    Provided By Microsoft

  • Podcasts // Jan 2010

    An Interview With Ken Krieg, Former Under Secretary Of Defense: Finding Talent And Opportunity

    The aerospace and defense industry generates some $150 billion in sales each year in the U.S., driven in part by the booming market for cutting-edge homeland defense products and services. Currently, the industry is at a crossroads as factors like the slowing economy, strategic mergers and acquisitions, and an aging...

    Provided By University of Pennsylvania (Wharton)

  • Podcasts // Jun 2010

    Technical Introduction to System Center Data Protection Manager 2010

    It's here; Microsoft System Center Data Protection Manager (DPM) 2010 delivers unified data protection of Microsoft application, virtualization, and file servers and client workstations running Windows operating systems. This podcast highlights the new features in DPM 2010, including Microsoft SQL Server database auto-protection and self-restore, Microsoft Exchange 2010 database availability...

    Provided By Microsoft

  • Podcasts // May 2010

    Project Server 2010 - Backup and Restore

    In this podcast, speakers explain the process for performing backup and restore in Project Server 2010. The supported scenarios they cover include mirroring (with and without witness), restore over existing farm, and restore into a new farm. They explain the tools in Central Admin, command line, PowerShell, and Microsoft SQL...

    Provided By Microsoft

  • Podcasts // Aug 2010

    Windows Phone 7 in 7 Minutes: Security and Windows Phone 7

    This podcast is about Windows Phone 7. This podcast discusses security considerations relevant to Windows 7 Phone applications.

    Provided By Microsoft

  • Podcasts // Jan 2012

    What's New With VMware View

    The latest release of VMware View, the next generation of the VMware VDI solution, enables one to streamline virtual desktop and application management, reduce costs and improve data security. This podcast features VMware product management and professional services discussing the technology advancements in the solution.

    Provided By VMW Games

  • Podcasts // Jun 2012

    Set It & Forget It - Apple Devices in the Enterprise

    Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.

    Provided By Absolute Software

  • Podcasts // Jun 2012

    What is a ClickAppStore?

    Are you looking to empower the people in your organization working outside of the office to do a great job and make sure that the customers get the best service in the industry? ClickSoftware's mobility solution gives you the freedom of seamless mobility to drive your enterprise forward. ClickMobile is...

    Provided By ClickSoftware

  • Podcasts // Oct 2010

    Extentrix Delivers Advanced Endpoint Security for Virtualized Environments and Appliances

    In this podcast, the speaker reveals that Extentrix Systems announced the general availability of Extentrix EPA Scans 5.5 Advanced and Enterprise editions. Originally created to enhance the security of Citrix Access Gateway, EPA Scans 5.5 now extends the same endpoint security capabilities to adopters of increasingly popular virtual appliances such...

    Provided By DABCC.com

  • Podcasts // Jun 2010

    HP Strengthens Security Across Physical and Virtual Environments

    In this podcast, the speaker reveals that HP today announced new high-performance security solutions designed to prevent network breaches in a Converged Infrastructure by delivering comprehensive data protection across both physical and virtual environments.

    Provided By DABCC.com

  • Podcasts // Apr 2012

    Customers Discuss Oracle Database Security

    Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.

    Provided By Oracle

  • Podcasts // Jan 2012

    SIEM Is Dead

    In this podcast, the speaker going discusses about the SIEM where organizations have relied on point products such as log management and SIEM to monitor event-based information. But, that method could miss critical data, creating gaps that could lead to loss of customer and business data.

    Provided By CompuCom Systems

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 1: Overview

    In this podcast, the speakers explain about how VMware vSphere helps IT cut capital and operational costs by over 50% for all applications while improving control over application service levels and preserving customer choice to use any hardware, OS, or application.

    Provided By VMW Games

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 7: Control of Application Security

    In this podcast, the speakers explain how VMware vSphere gives a better control over application security levels than possible in the physical world. The speakers also explain the new features of VMware vSphere.

    Provided By VMW Games

  • Podcasts // Oct 2012

    Oracle and Cloudera working together on Big Data

    Recent years have seen growing interest in various approaches to clouds and server virtualisation. So far, most cloud use cases focus on application servers. Yet, there are many reasons user organisations also need a "database cloud" for database management systems, data driven applications such as business intelligence and data warehousing...

    Provided By Oracle

  • Podcasts // Dec 2009

    Railscasts #192: Authorization With CanCan

    In this podcast, the speaker going to explain about the CanCan. CanCan which is an simple authorization plugin that offers a lot of flexibility. Learn how to set up a CanCan authorization and how it works.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #189: Embedded Association

    In this podcast, the speaker going to explain about the embedded association, learn how to set up a one-to-many or many-to-many association which is entirely embedded into a single column through a string or bitmask.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #188: Declarative Authorization

    In this podcast, the speaker going to explain about the authorization which is really tricky topic. The speaker explains about declarative authorization which provides an advanced and powerful solution for role based authorization.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2009

    Railscasts #178: 7 Security Tips

    Security is much more important, so in this podcast, the speaker going to show the user about seven different security flaws which are common to Rails applications ranging from mass assignment to CSRF protection.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2013

    HP AppSystems for SAP HANA Use Case: Utilities

    See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy efficiency benchmarks and achieve energy savings and emission targets. Sponsored by HP and Intel® Xeon® Processors

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2013

    My Patch Compliance Rates are WHAT

    Are you alarmed by patch compliance rates that aren’t anywhere near 100 percent? Do you wonder why it takes so long to apply required patches to all of your systems? Many organizations struggle to effectively patch all of their systems, especially when they have a mix of Microsoft Windows,...

    Provided By IBM

  • Podcasts // Oct 2013

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By WindRiver

  • Podcasts // Jan 2012

    Measuring Operational Resilience

    In this podcast, the speaker going to show traditional operational security metrics such as number of machines patched, vulnerability scan results, number of incidents, and number of staff trained are easy to collect and can be useful.

    Provided By Carnegie Mellon University