Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Identity Based Attack Detection and Manifold Adversaries Localization in Wireless Networks

    White Papers // Sep 2014 // provided by Journal of Theoretical and Applied Information Technology

    Wireless spoofing attacks are easy to launch in wireless network due to openness of wireless network. Although the identity of a node can be detected through cryptographic authentication, conservative security approaches are not always possible because of their overhead requirements. Source sends a data to the destination; data is forwarded ...

    Download Now
  • Security for the Mobile First Era

    Research // Sep 2014 // provided by MobileIron

    Sandboxed mobile operating systems are secure. Threats, such as malware, are mitigated by OS design. Preventing data loss on mobile requires focus on a different set of risk vectors. Download to read more.

    Read more
  • From the Ground Up

    Podcasts // Sep 2014 // provided by SecurityTube.net

    In this podcast, the speaker will explain about the continuation of that proof and is aimed at developers to help them detect security vulnerabilities using live source-sink analysis. It is dependent on the code coverage and not aimed to be used in a production environment.

    Listen Now
  • The DevOps of Everything

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Although the movement started out as a problem statement to solve developer and operations collaboration, it quickly moved into other disciplines such as security, networking and storage. In this podcast, the speaker will take a look at the DevOps affect on things like converged infrastructure, software defined networking, software defined ...

    Listen Now
  • Where the Security Rubber Meets the DevOps Road

    Podcasts // Sep 2014 // provided by SecurityTube.net

    DevOps is a natural evolution of agile, lean, continuous integration and other patterns common amongst high performers and continuous process improvement. As someone who has helped dozens of organizations get started with DevOps patterns and tool chains, in this podcast, the speaker will explain where people get started - and ...

    Listen Now
  • Autoscaling Web Application Security in the Cloud

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Securing web applications has placed extreme demands on security professionals - in addition to understanding attack patterns and defense tactics, effectively protecting web apps requires some level of programming and database management expertise. With broad adoption of public clouds, this bar is rising once again. Today's cloud enabled applications scale-up ...

    Listen Now
  • Cloud Security at Scale and What It Means for Your Application

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Cloud computing is all the rage, but few organizations have really thought about what security means for their applications and networks in cloud-centric deployments. Netflix is amongst the largest users of public cloud resources and consumes roughly 1/3 of all the US's downstream broadband at peak. In this podcast, the ...

    Listen Now
  • Bringing a Machete to the Amazon

    Podcasts // Sep 2014 // provided by SecurityTube.net

    With concrete examples and new techniques in this podcast, the speaker will explore \"Full stack\" vulnerabilities and their effect on security and how they create new pitfalls when migrating to and operating in an Amazon Web Services (AWS) world. From the simple (checking in the user AWS credentials to github ...

    Listen Now
  • Top 10 Web Hacking Techniques of 2013

    Podcasts // Sep 2014 // provided by SecurityTube.net

    Every year the security community produces a stunning number of new Web hacking techniques that are published in various white papers, blog posts, magazine articles, mailing list emails, conference presentations, etc. Within the thousands of pages are the latest ways to attack websites, Web browsers, Web proxies, and their mobile ...

    Listen Now
  • Runtime Manipulation of Android and iOS Applications

    Podcasts // Sep 2014 // provided by SecurityTube.net

    With over 1.6 million applications in the Apple AppStore and Google Play store, and around 7 billion mobile subscribers in the world, mobile application security has been shoved into the forefront of many organizations. Mobile application security encompasses many facets of security. Device security, application security, and network security all ...

    Listen Now