Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Dec 2009

    Improving Security Monitoring Using Advanced Filtering Techniques

    With the move to 10G in full force, it is important to filter data so tools are not overloaded but can still complete their assigned tasks. This webcast shows types of traffic traversing today's networks. It shows how to best filter that data on a continuously changing and dynamic network...

    Provided By Anue Systems

  • Webcasts // Jan 2010

    A View From Above: Justin Ryan, VP, Strategic Planning And Marketing, Honeywell Aerospace

    Justin Ryan, vice president of strategic planning and marketing at Honeywell Aerospace, discusses the impact of the financial crisis on the industry and on Honeywell, how his company is controlling costs during the economic downturn, industry changes likely to come as a result of a new administration in Washington, how...

    Provided By University of Pennsylvania (Wharton)

  • Webcasts // Jan 2010

    Beyond The Classroom

    In this webcast, hear the students talk about School clubs, social events and networking opportunities.

    Provided By London Business School

  • Webcasts // Jan 2010

    My Masters In Management Story: Yi-Chen Hsieh

    In this webcast, hear from Yi-Chen about her programme experience, the curriculum's practical approach and the networking opportunities presented by the programme.

    Provided By London Business School

  • Webcasts // Oct 2010

    Securing Information in the Health-Care Industry: Network Security, Incident Management, and Insider Threat

    Many experts in the health-care industry believe that the key success factor in reducing health-care costs, while at the same time improving quality, is the availability of useful medical information. In fact, the Health Information Technology for Economic Clinical Health Act (HITECH), a component of the American Recovery and Reinvestment...

    Provided By Carnegie Mellon University

  • Webcasts // Jun 2010

    Securing Global Software Supply Chains

    The increasingly global nature of software development has raised concerns that global supply chains could be compromised, allowing malicious code to be inserted into a delivered software product during development, or enabling a compromised product to be substituted during delivery or installation. However, the intentional exploitation of software vulnerabilities inadvertently...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2009

    Secure Coding

    It is a frequent yet unintended mistake among software developers. In copying a string in memory, they unwittingly create a vulnerability that can be used to execute malicious code by an attacker. The malicious code may be used to spread a worm, or insert a back door on a machine,...

    Provided By Carnegie Mellon University

  • Webcasts // May 2009

    SQUARE Up Your Security Requirements Engineering with SQUARE

    It is well recognized in industry that requirements engineering is critical to the success of any major development project. Security requirements, if they are specified at all, tend to be developed independently of the rest of the requirements engineering activity.

    Provided By Carnegie Mellon University

  • Webcasts // Sep 2009

    Securing IP Networks

    As Fixed Mobile Convergence (FMC) is opening the door to a wealth of new opportunities for service providers and their customers, it also ushers in a number of potential security flaws that can be exploited. These security concerns are compounded by the fact that IP and open source technologies are...

    Provided By Light Reading

  • Webcasts // Jun 2011

    African Elections And Democracy

    Nations across Africa are holding elections, a good sign for emerging democracies on the continent. However, the presenter says the quality of governance in African nations varies widely. Some states are making solid progress toward becoming effective democracies, while others remain under the sway of corrupt leaders, with serious consequences...

    Provided By Brookings Institution

  • Webcasts // Apr 2011

    Redistricting For Political Gains

    Every decade since 1790, a census of the entire U.S. population is used by state governments to apportion representatives in the U.S. House of Representatives. But the redrawing of congressional districts that follows the census is an exercise in pure politics, says the presenter.

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The Politics And Process Of Congressional Redistricting

    Now that the 2010 Census is concluded, states will begin the process of reapportionment - re-drawing voting district lines to account for population shifts. A Nonresident Senior Fellow, the presenter, says redistricting has been fraught with controversy and corruption since the nation's early days, when the first "Gerrymandered" district was...

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The History Of The State Of The Union

    Presidential scholar and former White House speech writer the presenter has seen many presidents deliver the State of the Union message, and studied its evolution over the past two centuries. As Washington prepares for President Obama's second such address, the senior fellow emeritus discusses the history of the speech.

    Provided By Brookings Institution

  • Webcasts // Jan 2011

    The Government And Internet Security

    The Internet has expanded communications and commerce in ways unimaginable just a few years ago. But there is a downside: personal information, business records and government materials aren't always secure from hackers and thieves. Venturing into cyberspace isn't completely safe, as Nonresident Fellow the presenter explains.

    Provided By Brookings Institution

  • Webcasts // Dec 2010

    Obama~s Nominees To Federal Judgeships Lag

    The pace of confirmations to the federal bench has slowed in recent years, and President Obama's nominees to the federal district courts and appeals courts have faced considerable partisan resistance. Visiting Fellow the presenter says historically, well-qualified presidential nominees were routinely confirmed to the bench, but that's no longer the...

    Provided By Brookings Institution

  • Webcasts // Nov 2010

    Assessment Of The 2010 Midterm Elections

    In this webcast, the presenter discusses the results of the 2010 midterm elections. Analyzing the rise of the tea party movement and the evolving attitudes of the American electorate, the presenter sees partisan gridlock continuing to dominate Washington over the next two years.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Religion And Politics

    Is there a relationship between religion and politics? Yes. Can faith-based doctrine influence election outcomes? Absolutely. Does this present a conflict with the doctrines put forth by the founding fathers? Not really, explains the presenter.

    Provided By Brookings Institution

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Jul 2009

    President Obamas First Six Months In Office; Kurdish Elections In Iraq

    In this webcast, Brookings experts release a composite index of national and global trends for the first six months of President Obama's term, lining them up against the same point in the five prior presidencies; the presenter discusses the significance to the American people of the Kurdish vote in Iraq;...

    Provided By Brookings Institution

  • Webcasts // Jun 2009

    Iran; Cash For Clunkers; The Federal Deficit

    Brookings scholars ponder the developments in Iran as the government cracks down on protests over the presidential election; the public weighs in on the "Cash for clunkers" legislation; and vice president and director of Economic Studies, advises controlling the federal deficit sooner rather than later.

    Provided By Brookings Institution

  • Webcasts // Apr 2009

    The Illegal Drug Trade; Obamas Trip To Turkey; And Cuba

    In this webcast, Latin America Initiative Director, one of the presenters and a panel of experts discuss a new report on the illegal drug trade and organized crime in Latin America; Governance Studies Vice President and Director, the other presenter, takes at look at President Obama's meeting with leaders from...

    Provided By Brookings Institution

  • Webcasts // Mar 2009

    Janet Napolitano On Homeland Security; Jim Steinberg On Foreign Policy; Credit Card Gouging

    In this webcast, a U.S. Homeland Security Secretary, one of the presenters, talks homeland security issues along our northern border; Deputy Secretary of State, the other presenter addresses the foreign policy challenges facing the fledgling Obama administration; and the man of the street sounds off on credit card gouging.

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    The Politics And Perils Of Guant?namo

    Opposition to trying alleged 9/11 mastermind Khalid Sheik Mohammed in civilian court has led the Obama administration to consider a military tribunal instead. Meanwhile, controversy continues over when, where and how to try terrorism suspects, and what to do with some 220 detainees who remain at Guant?namo Bay a year...

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    Partisanship On Capitol Hill

    Brookings takes an in-depth look at the polarizing effects of partisanship on Capitol Hill. Senior Fellow assesses the situation and offers some insight into how this way of doing business will affect the midterm elections.

    Provided By Brookings Institution

  • Webcasts // Feb 2010

    Education And President Obamas Budget

    When President Obama's proposed budget was released, education was declared among the "Winners." In this webcast, the presenter says the proposed spending increases will make reform advocates smile, but could leave state legislators cold about the shift from state to federal funding.

    Provided By Brookings Institution

  • Webcasts // Oct 2009

    Closing Schools For H1N1 Flu; Children At Risk Of Abuse; Iran

    Brookings expert says closing schools to keep kids safe from the flu may come with a big price tag for the economy; scholars and a member of Congress debate the efficacy of home visitation for children at risk of abuse and neglect; and the man on the street discusses nuclear...

    Provided By Brookings Institution

  • Webcasts // May 2010

    The Senate Filibuster

    The founding fathers viewed the Senate as a place where heated rhetoric could cool down, but today the upper chamber is just as fiercely partisan as the House. The presenter describes the origins of the filibuster and why the idea of allowing one Senator to block Senate business has its...

    Provided By Brookings Institution

  • Webcasts // Jan 2010

    PLD: How Will Organizations Benefit?

    When leaders in a single domain gain a broader business foundation, valuable contributions follow.

    Provided By President and Fellows of Harvard College

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva