Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Podcasts // Jan 2012

    WIDS/WIPS / Reseller FAQ

    In this podcast, the speaker discusses about Wireless Intrusion Detection and Prevention Systems. The speaker will share answers to questions garnered from a recent Network World Q&A on WIDS. Secondly, the speaker explains about a reseller dedicated to the Wireless space who answers some of the most popular FAQs he...

    Provided By Wireless LAN Professionals

  • Podcasts // Jun 2013

    HP AppSystems for SAP HANA Use Case: Utilities

    See how SAP HANA, run on Intel-powered HP solutions, enable utility companies to address their smart grid challenges by enabling them to boost customer satisfaction and retention, create energy efficiency benchmarks and achieve energy savings and emission targets. Sponsored by HP and Intel® Xeon® Processors

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2009

    Railscasts #160: Authlogic

    Authentication can get very complex. In this podcast, the speaker will going to show how Authlogic can handle this complexity while the user stay in control of how it is presented to the them.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #192: Authorization With CanCan

    In this podcast, the speaker going to explain about the CanCan. CanCan which is an simple authorization plugin that offers a lot of flexibility. Learn how to set up a CanCan authorization and how it works.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #189: Embedded Association

    In this podcast, the speaker going to explain about the embedded association, learn how to set up a one-to-many or many-to-many association which is entirely embedded into a single column through a string or bitmask.

    Provided By Oleksiy Kovyrin

  • Podcasts // Dec 2009

    Railscasts #188: Declarative Authorization

    In this podcast, the speaker going to explain about the authorization which is really tricky topic. The speaker explains about declarative authorization which provides an advanced and powerful solution for role based authorization.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2009

    Railscasts #178: 7 Security Tips

    Security is much more important, so in this podcast, the speaker going to show the user about seven different security flaws which are common to Rails applications ranging from mass assignment to CSRF protection.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2009

    Railscasts #170: OpenID With Authlogic

    Ever wonder how to implement OpenID authentication in the users Railsapp? In this podcast, the speaker going to explain the user how to add it to a site with an existing authentication system.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2009

    Railscasts #169: Dynamic Page Caching

    Use JavaScript to allow dynamic content in a page cache. In this podcast, the speaker going to explain the user how to insert the user-specific content into a page through JavaScript.

    Provided By Oleksiy Kovyrin

  • Podcasts // May 2012

    Railscasts #352: Securing an API

    There are many approaches to locking down an API. In this podcast, the speaker will start off with HTTP Basic authentication then move on to generating a unique token which can be passed through a URL parameter or HTTP header.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2012

    Railscasts #358: Brakeman

    In this podcast, the speaker will explain about the Brakeman. The Brakeman is an opensource vulnerability scanner gem which will scan the Ruby code of a Rails application and alert the user to common security vulnerabilities.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jul 2012

    Railscasts #366: Sidekiq

    In this podcast, the speaker explains about Sidekiq which allows one to move jobs into the background for asynchronous processing. It uses threads instead of forks so it is much more efficient with memory compared to Resque.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #250: Authentication From Scratch

    In this podcast, the speaker going to explain about authentication from scratch. Password authentication is not too complicated to make from scratch, it will also help to get a better understanding of how it works.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #241: Simple OmniAuth

    Authentication is incredibly simple to add with just OmniAuth if the user doesn't need username/password or multiple authentications per user. In this podcast, the speaker going to explain about OmniAuth which is an easy way to add many different authentication services to the users' app.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #237: Dynamic Attr_accessible

    It is important to use attr accessible for security with mass assignment, but what if the user need it to be dynamic based on their permissions. In this podcast, the speaker going to explain about attr accessible and learn how to stop it.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #235: OmniAuth Part 1

    In this podcast, the speaker going to explain about OmniAuth. OmniAuth which is an easy way to add many different authentication services to the users' app. The speaker also started integrating it with Devise.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #227: Upgrading to Rails 3 Part 3

    Authentication can get very complex. In this podcast, the speaker explains about how authlogic can handle this complexity by removing all deprecation warnings and fixing some problems in the view.

    Provided By Oleksiy Kovyrin

  • Podcasts // Oct 2011

    Railscasts #226: Upgrading to Rails 3 Part 2

    In this podcast, the speaker explains about how authlogic can handle this complexity while one stay in control of how it is presented to the users were authentication can get very complex.

    Provided By Oleksiy Kovyrin

  • Podcasts // Jun 2012

    It's the Putting Right That Counts

    In this Podcast, the speaker discusses about Flame malware. Flame malware involves mathematical breakthroughs, MPAA does not appose returning legitimate Mega-upload files to users. The speaker also discusses about flame malware disadvantages of Flame malware.

    Provided By RawVoice

  • Podcasts // Oct 2013

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By Wind River

  • Podcasts // Jan 2013

    NetIQ

    In this podcast, the speaker explains how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate the users' security across the enterprise and public cloud access, and increase executive visibility by providing their management...

    Provided By Novell

  • Podcasts // Jan 2013

    Accelerate to the Cloud With Novell Cloud Manager

    In this podcast, learn how the users' can build and manage a secure and compliant private cloud with Novell cloud manager. And not just how they can do it, but why they would want to.

    Provided By Novell

  • Podcasts // Jan 2013

    Solving Cloud Security: Your Nightmare, a Hackers Dream

    In this podcast, the speakers examine the security vulnerabilities of cloud computing. The speaker will also explores the emerging trends in cloud security, examining the benefits and limitations of current tools and methods.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Management: Challenges and Observations

    This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The...

    Provided By Novell

  • Podcasts // Jan 2013

    Tips for Managing and Securing Endpoints in the Enterprise

    In today's economy, organizations are becoming more complex everyday and devices are exploding in the enterprise. This growth creates IT challenges. In this podcast, the speakers offer tips to help organizations manage, optimize and secure their endpoints.

    Provided By Novell

  • Podcasts // Jan 2013

    Novell Cloud Security

    Most enterprises focus their security strategies. In this podcast, the speakers will examine how Novell Cloud security can help the users' to manage their applications and functions and secure multiple SaaS applications.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Environment Using Novell ZENworks Endpoint Security Management and Novell ZENworks Network Access Control

    In this podcast, learn how the users' can leverage the power of ZENworks endpoint security management. The speaker will also examines ZENworks network access control across their enterprise, so their users can stay productive.

    Provided By Novell

  • Podcasts // Jan 2013

    Storage Control - Enforce Read Only Access and Disable Removable Storage Devices

    In this podcast, the speaker going to discuss about the storage device control which enforce read only access and disable removable storage devices. And also learn how to disable storage, enforce to read only access to storage and white list storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Endpoints With Novell Endpoint Security Management

    In this podcast, the speaker explains the need for ZENworks endpoint security management and how ZESM addresses those needs. ZENworks endpoint security is agent based solution for enforcing information security policies.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Infrastructure Using ZENworks Endpoint Security Management and ZENworks Network Access Control

    Organizations everywhere are providing users with more mobile devices - with the ability to connect to more networks - than ever before. Why? Because mobility equals productivity, and organizations benefit from every additional degree of mobile enablement they provide to their people. In this podcast, the speaker will help the...

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Security Best Practices From IDC and Novell

    To ensure that the users' infrastructure is protected against external threats, it's critical to not only secure the infrastructure at the perimeter, but also at the endpoint. In this podcast, the speakers will discusses about the business endpoint security issues, business at the endpoint and endpoint case studies.

    Provided By Novell

  • Podcasts // Jan 2013

    The Path to the Private Cloud

    In this podcast, the speakers discuss the challenges and opportunities surrounding enterprise cloud computing, and introduce Novell Cloud Manager, an exciting new product that allows enterprises to create and manage their own private cloud.

    Provided By Novell

  • Podcasts // Jan 2013

    The Shift to Enterprise Cloud Computing

    In this podcast, the speaker going to explain about the shift to enterprise cloud computing. The speaker will discuss about how the technology is rapidly evolving in which applications are now portable were the portability requires security and management.

    Provided By Novell

  • Podcasts // Jan 2013

    What's New in ZENworks Endpoint Security Management 11

    In this podcast, the speaker going to explain about the latest features of ZESM 11 endpoint security management. The speaker will also explain how to deploy and configure integrated ZESM, UI for ZESM policies, location assignment policy and conflict resolution.

    Provided By Novell

  • Podcasts // Jan 2013

    Wi-Fi Security - White List Access Points by SSID

    In this podcast, the speaker going to explain about the Wi-Fi security policy of endpoint security management. The speaker will also explain the how to allow access to a specific SSID and block other APs and enforce minimum wireless security.

    Provided By Novell

  • Podcasts // Jan 2013

    The Cloud's Impact on the Economics of Branch Office Networking

    In this podcast, the speaker explains how cloud-enabled networking allows full functionality in the branch, enterprise-grade visibility and control in real-time, with the ability to provide automated remediation and security to even the most remote branch or teleworker.

    Provided By Aerohive Networks

  • Podcasts // Jan 2013

    Encryption - Encrypt Data Written to Removable Storage Devices

    Database users and applications need not be aware of the fact that the data they are accessing is stored in encrypted form. In this podcast, the speaker going to explain how to enforce encryption for files written to removable storage devices.

    Provided By Novell

  • Podcasts // Jan 2013

    VPN Enforcement

    In this podcast, learn how to configure the VPN enforcement, locations and network environments, firewalls for office and VPN enforcement, VPN enforcement setup, trigger location, switch to location, and invoke VPN.

    Provided By Novell

  • Podcasts // Jan 2013

    Application Control

    In this podcast, the speaker going to explain about the application control policies at ZENworks endpoint security management. The speaker will also explain the how to block the execution of files and network access of files.

    Provided By Novell

  • Podcasts // Jan 2013

    Hardware Control-Disable Wi-Fi When Wired

    In this podcast, the speaker going to explain communication hardware policy of how to disable Wi-Fi when wired, disable modems, disable modems when wired, manage 1394 (Firewire), IDA, Bluetooth, serial/parallel, and adapter bridging.

    Provided By Novell