Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2011

    Tool Talk Webcast: Detect Data Loss and Fraud With Application Monitoring and SIEM

    In this webcast, the presenters say about sensitive information is leaving organizations inside email attachments, file transfers, instant messages, and social media and web posts. Confidential data is being altered - whether by a disgruntled employee, or by an outsider using compromised user credentials. Current technologies, like DLP, can be...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    The Emergence of Content Aware SIEM

    In this webcast, the presenters say about content aware SIEM is a new generation of Security Information and Event Management (SIEM) solutions that now have visibility into network flows, database sessions and application layer data and can combat insider threats, data loss, fraud and advanced persistent threats.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Detecting Dangerous PDFs and Application Layer Threats

    In this webcast, the presenters say about malware making use of PDF files is one of many complex threats that are "Moving up the stack" to exploit vulnerabilities at the application and session layers. Visibility into the contents of applications, documents and protocols is needed to capture critical data to...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Automating Compliance and Security With SIEM at the Bank of China

    In this webcast, the presenters speak about increasing compliance requirements and relentless cyber threats and attacks, the Bank of China in New York needed to automate network security to make its IT staff more effective and efficient.

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Making Log Data Actionable Through SIEM Integration

    In this webcast, the presenters say about log data collected to meet compliance requirements can be used to increase security as well. If effectively combined with event, activity and flow data, logs contribute to effective threat detection and incident response. A deeply integrated, high performance SIEM and log management solution...

    Provided By NitroSecurity

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2011

    EDI eCommerce Strategy and Roadmap - New and Enhanced Solutions for Your Advantage

    What is new with EDI eCommerce. New enhancements make the product easier to use. Does one have a need for less technical personnel to manage EDI data? Does one have requirements to process XML documents? Has anyone considered EDI on Demand? With a very mature product with over 800 customers...

    Provided By QAD

  • Webcasts // Jan 2011

    Monitor the Pulse of Your Supply Chain: QAD Warehousing and Transportation Management

    With complex global supply networks transporting thousands of components, services and finished products, it is becoming increasingly difficult for managers to keep track of each and every detail. To aid in this process, QAD has defined acceptable procedures that can be established with alerting mechanisms to identify when risk conditions...

    Provided By QAD

  • Webcasts // Jan 2011

    Dell Keeps Your System Secure

    In this webcast, the presenters explain about the security of computer. The presenters help to learn how to keep safe and security computer by the users when surfing and shopping online.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    ID Theft

    In this webcast, the presenter explains one of society's scariest concerns, and largely brought about by advances in technology. Identity theft is America's fastest growing crime. It impacts one in four people, and it costs one more than $50 billion every year.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    Episode 1 - Setting Up Wireless Security

    In this webcast, the presenters explain about how to enable security on a wireless network connection using both WEP and WPA. The presenter reveals his hair secrets and their secure.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    Email Causes Security Concerns

    In this webcast, the presenter explains about how email causes security concerns on HowStuffWorks. Email is perhaps the most important and useful technology online; it's also the cause of the most number of security issues.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    Computer Forensics

    In this webcast, the presenter explains about computer forensics on HowStuffWorks. Computer-based crimes are a big business and it's growing. Computer investigations are increasingly becoming a more important part of solving these types of crimes.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    It's All Geek to Me: Wireless Internet Security

    In this webcast, the presenter explains about how secure is the average public wireless Internet hotspot? Take a look and learn more about the Internet in this video.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    Phishing Trips

    In this webcast, the presenter explains about Discovery News' Kasey-Dee Gardner sits down with an email expert and finds out why they should never return spam emails.

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    To Return Spam or Not

    In this webcast, the presenter says about Spam regularly clogs many email inbox and generally irritates just about everyone with an internet connection. But is it a good idea to send spam back to the sender?

    Provided By HowStuffWorks.com

  • Webcasts // Jan 2011

    The Register Webcast - Thinking about moving to service delivery?

    Thinking about moving to service delivery? Published: 1 Jan 2011 For years, most organizations have been managing the components of IT, with a primary focus on the performance and availability of specific assets. Those who think deeply on such things, however, reckon it's all changing. In the future, it's...

    Provided By CA

  • Webcasts // Jan 2011

    A Week in the Life of a Web Hosting Operations Manager

    In this webcast, the presenters say about the Open source anti-spam and anti-virus software are popular with web hosting operators as they offer low cost solutions. But do they really save money? Check out a week in the life of Dave, a web hosting operations manager, and the issues he...

    Provided By Commtouch Software

  • Webcasts // Jan 2011

    Computer Security in the Virtual World

    In this Webcast, the presenter describes about computer security in the virtual world. The virtual world exists online on networks, peer to peer, from computer to computer, from server to server; basically anything that's not in the tangible world, but the world of binary code and packets. Binary code is...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Protect Your Computer From Identity Thieves

    In this Webcast, the presenter gives expert video advice on: how to protect their computer from identity thieves. A couple of the things that one can do to protect from people who are trying to steal information from one include blocking their computer from someone always having access to it...

    Provided By Videojug

  • Webcasts // Jan 2011

    Identity Theft: Computers and Laptops

    In this Webcast, the presenter gives expert video advice on: is it safe to sell an old laptop or computer? How can one prevent their laptop or computer from being stolen by identity thieves. In the event that one decide to sell their laptop or computer make sure that one...

    Provided By Videojug

  • Webcasts // Jan 2011

    Computer Security Breach

    In this Webcast, the presenter gives expert video advice on: computer security breach. Hackers want to gain entry to the computer for a couple of reasons. Often, it's just mischievous, it's the challenge of being able to do it. They're not looking for any personal gain and they're not looking...

    Provided By Videojug

  • Webcasts // Jan 2011

    How to Hack a Call Center Telephone System

    How To Hack A Call Center Menu System: Tired of touch-tone hell? In this Webcast, the presenter shows how to find phone numbers, cheat the computer and hack the call center system with the hacking tools.

    Provided By Videojug

  • Webcasts // Jan 2011

    World-Famous Tenor Inspired To Create Leukemia Foundation

    Jos? Carreras, world-famous tenor and founder of the Jos? Carreras International Leukemia Foundation, talks about his goal of making leukemia completely curable. In a recent interview with IESE Prof. Johanna Mair, tenor Jos? Carreras discussed how the feelings of gratitude he felt towards those who helped him when he was...

    Provided By IESE School Of Business

  • Webcasts // Jan 2011

    Norton Secured Seal Powered by VeriSign: Partner Thoughts

    In this webcast, the presenter explains about Verisign. The presenter also discusses about the transition of VeriSign SSL (Secure Sockets Layer) to Norton Secured Seal Powered by VeriSign. The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission over the Internet.

    Provided By Symantec

  • Webcasts // Jan 2011

    Political Change In China Is 'Almost Inevitable' But Beijing Has 'Nothing To Fear': Anson Chan

    Asian pro-democracy advocate Anson Chan says China has 'Nothing to fear' in allowing Hong Kong full democracy. China's Communist leadership has signaled the Special Administrative Region can elect its chief executive in 2017 and all members of the legislature three years later.

    Provided By INSEAD

  • Webcasts // Jan 2011

    IPv6 Threats

    In this webcast, the presenters say about the Internet industry is undergoing a fundamental change as it transitions from IPv4 to IPv6. Part 2 of Commtouch's informational series on IPv6 offers insight on the potential threats and security issues that are likely to arise as a result of the move...

    Provided By Commtouch

  • Webcasts // Jan 2011

    Web Application Security Demo

    In this webcast, the presenters say about learn how the SecureSphere Web Application Firewall safeguards Web applications without modifying application behavior or impacting performance. This five minute webcast demonstrates common application threats and describes key product capabilities including automated application learning, up-to-date security defenses, and transparent deployment.

    Provided By Imperva

  • Webcasts // Jan 2011

    Blocking Malicious Attacks Using SQL Injection Signature Evasion

    This webcast demonstration is focused on a more advanced SQL Injection technique called "Signature evasion." As the name implies, these techniques allow SQL Injection attacks to be conducted while avoiding detection by security controls that rely on signatures.

    Provided By Imperva

  • Webcasts // Jan 2011

    Database Security Demo

    In this webcast, the presenters say about provides a high-level overview of Imperva's database security products and describes how the market-leading product addresses each step in the data security and compliance life cycle.

    Provided By Imperva

  • Webcasts // Jan 2011

    Detecting XSS Scripting (Cross-Site Scripting)

    This webcast should be viewed following the Script Injection video demonstration. Cross-site scripting ('XSS' or 'CSS') is an attack that takes advantage of a Web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

    Provided By Imperva

  • Webcasts // Jan 2011

    Direct Database Access SQL Injection (Database Hacking)

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands...

    Provided By Imperva

  • Webcasts // Jan 2011

    Session Hijacking - Bypassing Web Application Security

    In this webcast, the presenters say about the session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web...

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Web Application Firewall - Vulnerability Assessment Integration

    This webcast demonstrates how the Imperva SecureSphere Web Application Firewall integrates with application vulnerability scanners. Watch this video to find out how SecureSphere creates policies and detects and blocks attacks based on vulnerability assessment results.

    Provided By Imperva

  • Webcasts // Jan 2011

    Understanding Script Injection

    This webcast should be viewed as a prerequisite to the XSS video demonstration. Script Injection is a form of Web application attack where the victim Web server is tricked into running the attackers script/code.

    Provided By Imperva

  • Webcasts // Jan 2011

    User Rights Management for Databases

    In this webcast, the presenters say about User Rights Management for Databases (URMD) enables security, database administrators and audit teams to review rights associated with sensitive data and identify excessive or dormant rights based on organizational context and actual usage. In this webcast, will see how URM is used to...

    Provided By Imperva

  • Webcasts // Jan 2011

    File Security Demo

    In this webcast, the presenters say about learn how SecureSphere File Activity Monitoring addresses file auditing, security, and user rights management requirements. This five minute video explains how Imperva SecureSphere solves critical security, compliance, and IT operations challenges by monitoring file activity, finding data owners, and controlling permissions to sensitive...

    Provided By Imperva

  • Webcasts // Jan 2011

    Imperva Cloud WAF Introduction

    Imperva Cloud WAF is an easy and affordable Web Application Firewall service in the cloud that addresses PCI 6.6, and keeps hackers out while making websites faster. Imperva security experts provide continuous monitoring, policy tuning, and immediate incident response.

    Provided By Imperva

  • Webcasts // Jan 2011

    Insights on WikiLeaks From the Leader in Data Security

    In this webcast, the presenters say about WikiLeaks has rocked government and diplomatic circles, but it's a wake-up call for businesses as well. Join Amichai Shulman, Imperva CTO and head of the Application Defense Center, as he cuts through the WikiLeaks clutter to help organizations bolster their overall data security.

    Provided By Imperva

  • Webcasts // Jan 2011

    SecureSphere Interactive Audit Analytics

    In this webcast, the presenters say about SecureSphere Interactive Audit Analytics provides a fast reliable way to view audit data and understand database activities. Using various audit views it supports analysis and correlation of security events with just a few clicks of a mouse.

    Provided By Imperva