Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Podcasts // Mar 2011

    Addressing Data Management and IT Infrastructure Challenges in a SharePoint Environment - Podcast

    In this podcast, SharePoint server expert Michael Noel will cover key topics around SharePoint infrastructure sprawl and high-availability, including reasons why SharePoint infrastructure grows quickly, how to address sprawl, high-availability at the web tier and high-availability database tier. Michael will also cover topics such as backup and restore requirements, site...

    Provided By NetApp

  • Podcasts // Jun 2012

    Chesapeake Bay Foundation rescues the bay with NetApp's affordable and efficient solution for mission-enabling IT

    Learn how Chesapeake Bay Foundation optimized their data center infrastructure by creating a technology foundation that meets the challenges of the coming years. They were able to unify their server and storage architecture and implement best practices, rearchitect VMware? environment to gain greater virtualization efficiency; as well as upgrade and...

    Provided By NetApp

  • Podcasts // Jun 2012

    Raven Industries Elevates Corporate Services with Improved Uptime on NetApp - Video

    For Raven Systems, 24/7 systems availability is critical. With NetApp, Raven Systems was able to deliver superior uptime, allowing the Corporate Services division to enhance its service and the business to focus on remaining competitive. Challenges they overcame: performance issues with firmware upgrade cycles, improve storage efficiency and scalability to...

    Provided By NetApp

  • Podcasts // May 2009

    Railscasts #160: Authlogic

    Authentication can get very complex. In this podcast, the speaker will going to show how Authlogic can handle this complexity while the user stay in control of how it is presented to the them.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #192: Authorization With CanCan

    In this podcast, the speaker going to explain about the CanCan. CanCan which is an simple authorization plugin that offers a lot of flexibility. Learn how to set up a CanCan authorization and how it works.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #189: Embedded Association

    In this podcast, the speaker going to explain about the embedded association, learn how to set up a one-to-many or many-to-many association which is entirely embedded into a single column through a string or bitmask.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #188: Declarative Authorization

    In this podcast, the speaker going to explain about the authorization which is really tricky topic. The speaker explains about declarative authorization which provides an advanced and powerful solution for role based authorization.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2009

    Railscasts #178: 7 Security Tips

    Security is much more important, so in this podcast, the speaker going to show the user about seven different security flaws which are common to Rails applications ranging from mass assignment to CSRF protection.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2009

    Railscasts #170: OpenID With Authlogic

    Ever wonder how to implement OpenID authentication in the users Railsapp? In this podcast, the speaker going to explain the user how to add it to a site with an existing authentication system.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2009

    Railscasts #169: Dynamic Page Caching

    Use JavaScript to allow dynamic content in a page cache. In this podcast, the speaker going to explain the user how to insert the user-specific content into a page through JavaScript.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #227: Upgrading to Rails 3 Part 3

    Authentication can get very complex. In this podcast, the speaker explains about how authlogic can handle this complexity by removing all deprecation warnings and fixing some problems in the view.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #226: Upgrading to Rails 3 Part 2

    In this podcast, the speaker explains about how authlogic can handle this complexity while one stay in control of how it is presented to the users were authentication can get very complex.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #241: Simple OmniAuth

    Authentication is incredibly simple to add with just OmniAuth if the user doesn't need username/password or multiple authentications per user. In this podcast, the speaker going to explain about OmniAuth which is an easy way to add many different authentication services to the users' app.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #237: Dynamic Attr_accessible

    It is important to use attr accessible for security with mass assignment, but what if the user need it to be dynamic based on their permissions. In this podcast, the speaker going to explain about attr accessible and learn how to stop it.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #235: OmniAuth Part 1

    In this podcast, the speaker going to explain about OmniAuth. OmniAuth which is an easy way to add many different authentication services to the users' app. The speaker also started integrating it with Devise.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2013

    HP AppSystems for SAP HANA Use Case: Utilities

    See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy efficiency benchmarks and achieve energy savings and emission targets. Sponsored by HP and Intel® Xeon® Processors

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2012

    Railscasts #352: Securing an API

    There are many approaches to locking down an API. In this podcast, the speaker will start off with HTTP Basic authentication then move on to generating a unique token which can be passed through a URL parameter or HTTP header.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2012

    Railscasts #358: Brakeman

    In this podcast, the speaker will explain about the Brakeman. The Brakeman is an opensource vulnerability scanner gem which will scan the Ruby code of a Rails application and alert the user to common security vulnerabilities.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2012

    Railscasts #366: Sidekiq

    In this podcast, the speaker explains about Sidekiq which allows one to move jobs into the background for asynchronous processing. It uses threads instead of forks so it is much more efficient with memory compared to Resque.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #250: Authentication From Scratch

    In this podcast, the speaker going to explain about authentication from scratch. Password authentication is not too complicated to make from scratch, it will also help to get a better understanding of how it works.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 1: Overview

    In this podcast, the speakers explain about how VMware vSphere helps IT cut capital and operational costs by over 50% for all applications while improving control over application service levels and preserving customer choice to use any hardware, OS, or application.

    Provided By VMW Games

  • Podcasts // Jan 2012

    What's New in VMware vSphere Part 7: Control of Application Security

    In this podcast, the speakers explain how VMware vSphere gives a better control over application security levels than possible in the physical world. The speakers also explain the new features of VMware vSphere.

    Provided By VMW Games

  • Podcasts // Jan 2012

    What's New With VMware View

    The latest release of VMware View, the next generation of the VMware VDI solution, enables one to streamline virtual desktop and application management, reduce costs and improve data security. This podcast features VMware product management and professional services discussing the technology advancements in the solution.

    Provided By VMW Games

  • Podcasts // Sep 2009

    Cloud Security & Privacy

    In this podcast, the speakers explain about cloud computing's SPI delivery model, and its impact on various aspects of enterprise information security (e.g., infrastructure, data, identity and access management, security management), privacy, and compliance. Also explain the Security-as-a-Service (SaaS) and the impact of cloud computing on corporate IT.

    Provided By O'Reilly

  • Podcasts // May 2008

    The Top Five Log Analysis Mistakes

    In this podcast, the speaker will explains how to avoid the log analysis mistakes and how to get the most value out of various log files, generated by systems, applications and security devices.

    Provided By O'Reilly

  • Podcasts // May 2009

    iPhone Hacking - Intermediate & Advanced

    In this podcast, the speakers focus on the iPhone Hacks, involving hardware and software development. They targeted towards people who want to do more hardware and advanced hacks involving software development.

    Provided By O'Reilly

  • Podcasts // Jan 2010

    Cloud Security Deep Dive

    In this podcast, the speakers explore a deep dive into cloud security issues and focus on three specific aspects: data security; identity management in the cloud and governance in the cloud (in the context of managing a cloud service provider with respect to security obligations).

    Provided By O'Reilly

  • Podcasts // Apr 2010

    Preparing for a Cyber Attack

    In this podcast, the speaker will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect the users' and their organization from the actors orchestrating these intrusions.

    Provided By O'Reilly

  • Podcasts // May 2010

    Spear Phishing: A Smarter and More Dangerous Social Web

    In this podcast, the speaker explores a future-looking forecast about targeted attacks on identity, email, and data on the internet. What happens when every ad doesn't feel like spam because of increased information sharing and improving analytics? Spear phishing is the next-generation of e-mail phishing - except citizens, companies, and...

    Provided By O'Reilly

  • Podcasts // May 2010

    Cloud Computing and Security: Can't We All Just Get Along?

    In this podcast, the speaker will offer a framework to analyze security issues, and present a set of best practices toward implementing security in cloud-based applications. Security is considered the primary barrier to cloud computing adoption. Therefore, focusing attention toward minimizing security risks offers the potential for increasing cloud computing...

    Provided By O'Reilly

  • Podcasts // Jan 2014

    Attacking CAPTCHAs for Fun and Profit

    CAPTCHAs are a potent mechanism to prevent web applications against automated form submissions. To analyze the strength of CAPTHA deployments on the internet, a research spanning hundreds of high traffic websites and several CAPTCHA service providers was conducted.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    New and Improved: Hacking Oracle From Web

    In this podcast, the speaker will explain about number of attacks against Oracle database and in almost every other CPU there is a shiny new exploit which allows a malicious database user to gain DBA privileges on the back-end database.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Million Browser Botnet

    Online advertising networks can be a web hacker's best friend. For mere pennies per thousand impressions (that means browsers) there are service providers who allow the users' to broadly distribute arbitrary JavaScript - even malicious JavaScript. The users' are supposed to use this feature to show ads, to track users,...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    HTML5/JS Security

    In this podcast, the speaker explores the vulnerabilities behind JavaScript, including: a new class of vulnerabilities unique only to JavaScript, vulnerabilities in 3rd-party platforms which are exploited through JavaScript code and HTML5 which is considered the NG-Javascript. In turn, HTML5 introduces a new set of vulnerabilities

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Top Ten Proactive Web Application Controls

    The OWASP proactive control is a \"Top 10 like document\" aimed to help developers build secure applications. In this podcast, the speaker will explain the fundamental controls in critical software categories such as authentication, access control, validation, encoding, query parameterization, data protection, secure requirements, secure architecture and secure design.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Running At 99% Surviging An Application DoS

    Application-level Denial-of-Service (DoS) attacks are a threat to nearly everyone hosting content on the internet. DoS attacks are simple to launch, but can be difficult to defend against. Modern websites are a diverse set of moving parts, and a malicious actor only needs to find the point at which any...

    Provided By SecurityTube.net

  • Podcasts // Apr 2012

    Manually Removing Viruses and Malware from Windows 7

    Getting a virus on the users' computer is a pain and they are becoming ever more difficult to remove. In this podcast, the speaker explains manually and safely removing viruses and malware from the users' computer without damaging their files or windows itself.

    Provided By O'Reilly

  • Podcasts // Sep 2014

    Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information

    One of the reasons application security is so challenging to address is that it spans multiple teams within an organization. Development teams build software, security testing teams find vulnerabilities, security operations staff manage applications in production and IT audit organizations make sure that the resulting software meets compliance and governance...

    Provided By SecurityTube.net

  • Podcasts // Sep 2014

    Lean Security for Small or Medium Sized Business

    For a Small or Medium sized Business (SMB) the fallout from a security or privacy incident can be at best a PR nightmare. At their worst it can cause irrecoverable damage and end the users business by impacting sales or ad revenue. The user base may take a hit. The...

    Provided By SecurityTube.net