Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Oct 2010

    Solutions For The Federal Deficit

    The national debt and our yearly deficits have reached staggering heights, just as the nation struggles to recover from a deep and persistent recession, says the presenter, senior fellow and director of the Budgeting for National Priorities project. Solutions for taming the deficits are straightforward, the presenter argues, but the...

    Provided By Brookings Institution

  • Webcasts // Jul 2009

    President Obamas First Six Months In Office; Kurdish Elections In Iraq

    In this webcast, Brookings experts release a composite index of national and global trends for the first six months of President Obama's term, lining them up against the same point in the five prior presidencies; the presenter discusses the significance to the American people of the Kurdish vote in Iraq;...

    Provided By Brookings Institution

  • Webcasts // Jun 2009

    Iran; Cash For Clunkers; The Federal Deficit

    Brookings scholars ponder the developments in Iran as the government cracks down on protests over the presidential election; the public weighs in on the "Cash for clunkers" legislation; and vice president and director of Economic Studies, advises controlling the federal deficit sooner rather than later.

    Provided By Brookings Institution

  • Webcasts // Apr 2009

    The Illegal Drug Trade; Obamas Trip To Turkey; And Cuba

    In this webcast, Latin America Initiative Director, one of the presenters and a panel of experts discuss a new report on the illegal drug trade and organized crime in Latin America; Governance Studies Vice President and Director, the other presenter, takes at look at President Obama's meeting with leaders from...

    Provided By Brookings Institution

  • Webcasts // Mar 2009

    Janet Napolitano On Homeland Security; Jim Steinberg On Foreign Policy; Credit Card Gouging

    In this webcast, a U.S. Homeland Security Secretary, one of the presenters, talks homeland security issues along our northern border; Deputy Secretary of State, the other presenter addresses the foreign policy challenges facing the fledgling Obama administration; and the man of the street sounds off on credit card gouging.

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    The Politics And Perils Of Guant?namo

    Opposition to trying alleged 9/11 mastermind Khalid Sheik Mohammed in civilian court has led the Obama administration to consider a military tribunal instead. Meanwhile, controversy continues over when, where and how to try terrorism suspects, and what to do with some 220 detainees who remain at Guant?namo Bay a year...

    Provided By Brookings Institution

  • Webcasts // Mar 2010

    Partisanship On Capitol Hill

    Brookings takes an in-depth look at the polarizing effects of partisanship on Capitol Hill. Senior Fellow assesses the situation and offers some insight into how this way of doing business will affect the midterm elections.

    Provided By Brookings Institution

  • Webcasts // Feb 2010

    Education And President Obamas Budget

    When President Obama's proposed budget was released, education was declared among the "Winners." In this webcast, the presenter says the proposed spending increases will make reform advocates smile, but could leave state legislators cold about the shift from state to federal funding.

    Provided By Brookings Institution

  • Webcasts // Oct 2009

    Closing Schools For H1N1 Flu; Children At Risk Of Abuse; Iran

    Brookings expert says closing schools to keep kids safe from the flu may come with a big price tag for the economy; scholars and a member of Congress debate the efficacy of home visitation for children at risk of abuse and neglect; and the man on the street discusses nuclear...

    Provided By Brookings Institution

  • Webcasts // May 2010

    The Senate Filibuster

    The founding fathers viewed the Senate as a place where heated rhetoric could cool down, but today the upper chamber is just as fiercely partisan as the House. The presenter describes the origins of the filibuster and why the idea of allowing one Senator to block Senate business has its...

    Provided By Brookings Institution

  • Webcasts // Jan 2010

    PLD: How Will Organizations Benefit?

    When leaders in a single domain gain a broader business foundation, valuable contributions follow.

    Provided By President and Fellows of Harvard College

  • Webcasts // Jan 2009

    Five Ways to Reduce Your IT Audit Burden

    Most organizations spend 30-50% more on compliance than they should. The good news is that compliance can be achieved effectively and efficiently and the attendee of this webcast will learn five key methods to streamline the compliance efforts and reduce the IT audit burden.

    Provided By CXO Media

  • Webcasts // Jan 2009

    Protecting PII: How to Work With IT to Manage Risk

    Privacy professionals must make sure their IT organization is employing responsible privacy practices that will ensure the safety of their company's business-critical data or face significant fines. Understand the critical nature of the test data privacy problem and tips on how to work with IT to implement a test data...

    Provided By CXO Media

  • Webcasts // Jan 2009

    Barracuda Spam & Virus Firewall Introduction

    This webcast will give introduction of Barracuda spam & virus firewall.

    Provided By Barracuda Networks

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    Recognizing Web Application Parameter Tampering

    In this webcast, the presenters say about explores ways an attacker can modify parameters within a Web application. Parameter tampering is a simple attack targeting the application business logic. This attack takes advantage of the fact that many programmers rely on hidden or fixed fields (such as a hidden tag...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding Script Injection

    This webcast should be viewed as a prerequisite to the XSS video demonstration. Script Injection is a form of Web application attack where the victim Web server is tricked into running the attackers script/code.

    Provided By Imperva

  • Webcasts // Jan 2011

    User Rights Management for Databases

    In this webcast, the presenters say about User Rights Management for Databases (URMD) enables security, database administrators and audit teams to review rights associated with sensitive data and identify excessive or dormant rights based on organizational context and actual usage. In this webcast, will see how URM is used to...

    Provided By Imperva

  • Webcasts // Jan 2011

    Using Cookie Poisoning to Bypass Security Mechanisms

    In this webcast, the presenters say about cookie poisoning attacks. Cookie poisoning attacks involve the modification of the contents of a cookie (personal information stored in a Web user's computer) in order to bypass security mechanisms. Using cookie poisoning attacks, attackers can gain unauthorized information about another user and steal...

    Provided By Imperva

  • Webcasts // Jan 2012

    Put 1080p High-Definition Analytics Into Your IP Camera

    Advanced analytics is replacing simple motion detection in surveillance cameras. See how one can get 1080p high-definition (HD) analytics in their IP camera with a single-chip video analytics solution. In this webcast, the presneter discusses why FPGAs are ideal for high-definition video analytics systems.

    Provided By Imperva

  • Webcasts // Apr 2014

    On-demand Webcast: Three Reasons Your Competitors Are Adopting Cloud

    Adoption of the cloud is accelerating as businesses face a growing body of facts and figures that show the cloud can meet data security, privacy, and compliance requirements; reduce costs; and allow consolidation of data backup and recovery needs. With this mounting evidence, the cloud train is leaving the station....

    Provided By EVault

  • Webcasts // Feb 2010

    Made To Stick: Sparking Curiosity

    Dan Heath, co-author of Made to Stick, speaks with Fast Company about how to get one's ideas across through the power of testable credentials.

    Provided By American Express

  • Webcasts // Dec 2009

    It's Raining Clothes

    A designer who makes some stylish clothes out of discarded umbrellas and gives clients new looks all the time, now gets a makeover of her own.

    Provided By American Express

  • Webcasts // Mar 2010

    When Times Are Tough, Focus On Product

    Despite the economy, Diane von Furstenberg, Founder and Chairman of DVF Studio, LP, proclaims "We have been surfing the tsunami beautifully." In this webcast she explains that her approach in difficult economic times was to focus on the product and basic rules of supply and demand.

    Provided By American Express

  • Webcasts // Feb 2010

    American Business: A Rockin#$# Business

    What do you do when you feel like your business has lost its identity? Members of the band "Third Eye Blind" know that situation all too well. After years in the mainstream, they took back control of their brand by going independent.

    Provided By American Express

  • Webcasts // Jun 2010

    Disaster In The Gulf: Small Business Struggles

    The oil spill in the Gulf region is having a disastrous effect on the environment and on the bottom line of thousands of small businesses. Sen. Mary Landrieu of Louisiana, chair of the Senate Small Business Committee, talks about the chances of entrepreneurs being compensated for their losses.

    Provided By American Express

  • Webcasts // Jan 2010

    Want A Great Product? Roll The D.I.C.E.

    Guy Kawasaki, founder of alltop.com, discusses the four qualities that every product should strive for: Deep, Intelligent, Complete, and Elegant. In this webcast he explains how products with these qualities push businesses to the next level.

    Provided By American Express

  • Webcasts // Jul 2010

    Infrastructure Optimization

    Infrastructure optimization solutions from CDW can help consolidate resources and improve performance while reducing maintenance and operating expenses.

    Provided By CDW

  • Webcasts // Jan 2009

    Minimizing the Risk of Information Security Breaches: Best Practices for SOA Governance and Compliance

    Today's enterprises face more information security risks and vulnerabilities than ever before. Protecting privacy is essential. The presenter discusses the latest techniques for guarding data without locking it away. The presenter will discuss how Service Oriented Architecture (SOA) increases the risk and how one can protect the customers. The attendee...

    Provided By Alcatel-Lucent

  • Webcasts // Dec 2009

    The Cyberspace Data Explosion: Boon or Black Hole?

    The people are entering a cyber world where millions of sensors continuously collect data. From the ocean bottom to deep space, scientists are monitoring environments at unprecedented scales. On a more personal level, implanted medical devices can now monitor their well-being and "Smart chips" embedded in passports, IDs and transit...

    Provided By University of Washington