Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Cloud Security at Scale and What It Means for Your Application

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Cloud computing is all the rage, but few organizations have really thought about what security means for their applications and networks in cloud-centric deployments. Netflix is amongst the largest users of public cloud resources and consumes roughly 1/3 of all the US's downstream broadband at peak. In this podcast, the ...

    Listen Now
  • Bringing a Machete to the Amazon

    Podcasts // Sep 2014 // provided by SecurityTube.net

    With concrete examples and new techniques in this podcast, the speaker will explore \"Full stack\" vulnerabilities and their effect on security and how they create new pitfalls when migrating to and operating in an Amazon Web Services (AWS) world. From the simple (checking in the user AWS credentials to github ...

    Listen Now
  • Top 10 Web Hacking Techniques of 2013

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile ...

    Listen Now
  • Runtime Manipulation of Android and iOS Applications

    Podcasts // Sep 2014 // provided by SecurityTube.net

    With over 1.6 million applications in the Apple AppStore and Google Play store, and around 7 billion mobile subscribers in the world, mobile application security has been shoved into the forefront of many organizations. Mobile application security encompasses many facets of security. Device security, application security, and network security all ...

    Listen Now
  • Static Analysis for Dynamic Assessments

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Today's dynamic and static web vulnerability scanners are capable of analyzing complex web applications for security weaknesses. They automate testing of much common vulnerability. However, there is a gap between static and dynamic scanners. They find different vulnerabilities. So why aren't dynamic testers running static tools? Typically, they don't have ...

    Listen Now
  • Use After Free Exploitation

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Use after free vulnerabilities is the cause of a large number of web browser and client-side compromises. Software bugs residing on the heap can be difficult to detect through standard debugging and QA. In this podcast, the speaker will first define the use after free vulnerability class, and then dive ...

    Listen Now
  • Mobile Security Attacks: A Glimpse From the Trenches

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Hackers today apply covert and persistent techniques to attack mobile devices. In this podcast, the speaker will explain about the latest threats on mobile devices from the team who uncovered iOS malicious profiles and HTTP request hijacking. The speaker will describe and demonstrate emerging mobile security threats: from physical, through ...

    Listen Now
  • Reversing Engineering a Web Application - For Fun, Behavior and WAF Detection

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Screening HTTP traffic can be something really tricky and attacks to applications are becoming increasingly complex day-by-day. By analyzing thousands upon thousands of infections, the speaker noticed that regular blacklisting is increasingly failing and started research on a new approach to mitigate the problem. Initially reverse engineering the most popular ...

    Listen Now
  • Catch Me If You Can: Building a Web Malware Analyzer Using Machine Learning

    Podcasts // Sep 2014 // provided by SecurityTube.net

    With close to 10,000 new, legitimate websites being added to the Google malware blacklist every day, it's clear that infecting websites to spread malware has become the go-to choice for malicious hackers. In this podcast, the speaker will focus on how the problem is evolving, how websites are getting infected ...

    Listen Now
  • BSIMM: A Decade of Software Security

    Webcasts // Sep 2014 // provided by SecurityTube.net

    Now, at the end of a decade of great progress in software security, the way of measuring software security initiatives called the BSIMM. BSIMM is helping transform the field from an art into a measurable science. In this webcast, the presenter will provide an entertaining review of the software security ...

    Watch Now