Security

Stay one step ahead of the hackers with strong security management, authentication, encryption and risk strategies.

  • Webcasts // Apr 2015

    Locksport: A Brief Introduction

    In this webcast, the presenter will give an overview about the physical security, types of locks and how they work, how the user open locks without keys or combinations. The presenter also explains the Cleveland Locksport community, rules, and guidelines, and recommendations for enhancing security at home and elsewhere.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Attacking and Defending Full Disk Encryption

    Many organizations are flocking to full disk encryption solutions as a solution to their data security requirements. Unfortunately, many of these installations view the deployment of full disk encryption as a panacea for any and all security concerns for their laptop fleets. All too often, these systems are not properly...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Threat Models That Exercise Your SIEM and Incident Response

    In this webcast, the presenter presents a case study on taking actual security incidents, creating threat models, and using the models to create red team exercises. The resulting red team exercises are then used to evaluate their technical controls (SIEM, vulnerability management) and incident response.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Security Implications of the Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Shameful Secrets of Proprietary Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy....

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Analyzing RFID Security

    RFID tags and contact-less smart cards are regularly criticized for their lack of security. While many RFID tags have weaknesses, the security level of different tags varies widely. Using the Mifare classic cards as an example, the presenter illustrate the complexity of RFID systems and discuss different attack vectors.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    SWF and the Malware Tragedy

    In this webcast, the presenter explains possible web-based attacks using Flash with a particular focus on obfuscation, de-obfuscation and the generic detection of malicious SWF. While there are some tools out there to analyze AS2 and AS3 based SWF, using various techniques, analysis of SWF can become a nightmare.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Short Attention Span Security

    In this webcast, the presenter will explain about script injection in flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors, Auto-WEP key cracking with ITX, porting network security tools to the iPhone. Along with this, the presenter can make some code available for the hex editor, a bunch...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Security of MICA-Based Wireless Sensor Networks

    In this webcast, the presenter mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together

    Developers want to write code and security testers want to break it and both groups have specialized tools supporting these goals. The problem is - security testers need to know more about application code to do better testing and developers need to be able to quickly address problems found by...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Security Implications of Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

    ModSecurity web application firewall was first released more than a decade ago, available as open source software that gives the ability to protect web applications. Over the years ModSecurity has matured significantly, and is the most widely deployed WAF, protecting millions of websites. In this webcast, the presenter will show...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Smart Storage Scanning for Mobile Apps - Attacks and Exploit

    Mobile application hacking and its security is becoming a major concern in today's world especially with BYOD and user's jail breaking/rooting their devices. Scanning and vulnerabilities detections are two major areas for mobile applications in current state. Attacking techniques and exploit delivery on different platform are evolving, protection is even...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Can Application Security Training Make Developers Build Less Vulnerable Code?

    In this webcast, the presenter will shares the results of a yearlong survey of nearly 600 software developers that captures their knowledge of application security before and after formal training. The presenter also explains the results of a \"Retest\" of a subset of respondents, to identify how much security knowledge...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    PCIDSS and Secure Applications

    The Payment Card Industry Data Security Standard (PCI DSS) applies to whether cardholder data is stored, processed or transmitted. In this webcast, the presenter will examine the best practices in development of bespoke or custom written applications to be used within the cardholder data environment of the PCI DSS to...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Cloud-Based Detection Techniques for Botnets and Other Malware

    Traditional techniques for detecting malware, such as viruses, worms and rootkits, rely on identifying virus-specific signature definitions within network traffic, applications or memory. Botnets are ideally suited for launching mass Distributed Denial of Services (DDoS) attacks against the ever increasing number of networked devices that are starting to form the...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Apr 2015

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Apr 2015

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Apr 2015

    Product Preview: Big Data Analytics

    Ready for strategic real-time answers to your most critical business questions? Want the ability to make decisions based on predictive data-driven insights and not just intuition? See how Workday Big Data Analytics allows managers and executives to gain insight into information that was previously too difficult or time-consuming to obtain.

    Provided By Workday

  • Webcasts // Apr 2015

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2015

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2015

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2015

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2015

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2015

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Apr 2015

    Morneau Shepell boosts storage with IBM Storwize V7000

    IBM helps Morneau Shepell meeting the challenge of growing storage demands.

    Provided By IBM

  • Webcasts // Apr 2015

    Canucks Sports & Entertainment wins at the storage expansion game

    Canucks Sports & Entertainment, owners of the Vancouver Canucks hockey team, needed to expand their storage capacity to handle exponential growth in digital media. They needed a scalable storage system, and they were able to implement an IBM solution that surpassed their expectations.

    Provided By IBM

  • Webcasts // Apr 2015

    Marienhospital Stuttgart finds the cure to escalating volumes of data

    The need To improve patient care, Marienhospital Stuttgart wanted to extend the use of modern medical equipment and provide a single source of patient data. Both aims necessitated more storage capacity.The solution Marienhospital Stuttgart deployed a virtualized storage solution based on IBM technology to meet escalating data storage requirements and...

    Provided By IBM

  • Webcasts // Apr 2015

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Apr 2015

    Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment

    Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed. And, you...

    Provided By Citrix Online

  • Webcasts // Apr 2015

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Apr 2015

    What’s New in VMware vCloud Director 5.1

    VMware vCloud® Director™ orchestrates the provisioning of software-defined datacenter services as complete virtual datacenters (VDCs) that are ready for consumption in a matter of minutes. While a virtual machine provides only virtualized compute, the virtual datacenter provides virtualized compute, networking, storage, security and availability. With vCloud Director, an administrator can...

    Provided By VMware

  • Webcasts // Apr 2015

    Moving to Microsoft Exchange 2013?

    Are you ready to make the move to Exchange 2013 and enjoy its new, powerful features? In this archived webcast, see if your company is ready for this important migration and the steps to take for it to be a success. Watch it today.

    Provided By Dell Software

  • Webcasts // Apr 2015

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Apr 2015

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel