Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Knock Knock: A Survey of iOS Authentication Methods

    Webcasts // Feb 2015 // provided by SecurityTube.net

    Almost all \"Interesting\" mobile applications don't exist in a vacuum. They rely on external systems for much of their data, and as such, frequently need a method for identifying and authenticating the application's user to the server. How this happens varies widely.

    Watch Now
  • SEWiFi: Building a Security Enhanced WiFi Dongle

    Webcasts // Feb 2015 // provided by SecurityTube.net

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it ...

    Watch Now
  • NSA Playset: USB Tools

    Webcasts // Feb 2015 // provided by SecurityTube.net

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Watch Now
  • Get Off My Lawn: Examining Change Through the Eyes of the Old Guard

    Webcasts // Feb 2015 // provided by SecurityTube.net

    In this webcast, the presenter will examine personal privacy, contemporary threats, and the user's role in security, and other issues neatly written on Shmooballs and thrown at panelists. The panel is constructed of individuals who have been involved in information security for decades and may have developed a jaded, pessimistic, ...

    Watch Now
  • The Windows Sandbox Paradox

    Webcasts // Feb 2015 // provided by SecurityTube.net

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Watch Now
  • Rethinking Security's Role in Computer Science Education

    Webcasts // Feb 2015 // provided by SecurityTube.net

    The role of security in computer science education needs to be reconsidered. There is little to no applied security content for the majority of undergraduate computer science students. Given that security is an afterthought in education, it should be no surprise that it ends up being an afterthought when those ...

    Watch Now
  • There's Waldo! Tracking Users Via Mobile Apps

    Webcasts // Feb 2015 // provided by SecurityTube.net

    Sure the users assume the NSA can track them, but due to insecure mobile apps, it may be possible for anyone else to track them too. Mobile apps often leverage user location data to provide a custom experience. Unfortunately, as their case studies show, this is often done insecurely, revealing ...

    Watch Now
  • Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

    Podcasts // Feb 2015 // provided by SecurityTube.net

    Password entry on mobile devices significantly impacts both usability and security, but there is a dearth of usable security research in this area, specifically for complex password entry. To address this research gap, the speaker set out to assign strength metrics to passwords for which they already had usability data, ...

    Listen Now
  • Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    Webcasts // Feb 2015 // provided by SecurityTube.net

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception ...

    Watch Now
  • Betting Bios Bugs Won't Bite Y'er Butt?

    Webcasts // Feb 2015 // provided by SecurityTube.net

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?