Security

Infosec lapses, malware, phishing, and other targeted attacks can ruin your day. Beef up your cybersecurity arsenal with strong authentication, encryption, and real-time monitoring.

  • Webcasts // Aug 2015

    On-demand Webroot Webinar: How to fight modern malware with the power of collective threat intelligence

    Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm. According to Webroot, over 20 billion new internet-connected devices are expected to come online in the next few...

    Sponsored By Webroot

  • Webcasts // Jun 2015

    On-Demand Webcast: 10 questions to ask to determine how well your business is protected from cyber-attacks

    How confident are you about your company's network security? Today, knowing your security position may be as important as knowing your cash flow. Many organizations have a small IT staff or an outside resource that handles network security. If you know the answers to these important questions, you could...

    Sponsored By Dell

  • Webcasts // Apr 2015

    On-demand Webcast: Adding Macs to Your Enterprise? Start with Identity Management

    PC shipments in the first quarter of 2015 are down. On the other hand, shipments of Macs continue their steady rise, showing an 8.9 percent increase over the same quarter a year ago. If you manage PCs in your enterprise, you're undoubtedly seeing more and more Macs. It's no...

    Sponsored By Centrify

  • Webcasts // Apr 2015

    Live Webcast: Be Your Own Forensics Expert

    Know WHO, WHEN, WHERE, and HOW malicious software invaded your endpoints. Once a breach occurs, it’s imperative that organizations accelerate their threat investigation and discover the true point of origin of an attack. Viewfinity flags suspect behavior by monitoring all applications installing and running in your environment. Its monitoring...

    Sponsored By Viewfinity

  • Webcasts // Mar 2015

    Using Machine-Readable Threat Intelligence to Block Unknown Threats

    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an...

    Sponsored By Webroot

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    On-demand Webcast: Mobile devices, wearables, and the future of identity

    For computer networks, digital identities are the keys to the kingdom. Your identity credentials open doors to your corporate network, your medical records, your bank account, and even all your private communications. Today, the very concept of digital identity is under fire. Every week, we read about a new...

    Sponsored By Centrify

  • Webcasts // Feb 2015

    On-demand Webcast: Single Sign On: Past, Present, and Future

    Since the invention of the second app, IT has had to implement single sign on to eliminate the hassles of multiple passwords. But can we leverage what we have learned about on-premises SSO to solve today’s cloud and mobile identity challenges? And how can we deploy solutions today that don’t...

    Sponsored By Centrify

  • Webcasts // Aug 2015

    When Steganography Stops Being Cool

    The art and science of concealing stuff inside other stuff is what they know as steganography. People have used it for ages to keep adversaries from looking at their secret information. In this webcast, the presenters look specifically at malware writers and how they are using steganography to hide malicious...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Intro to Data Science for Security

    The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Advancing Internet Security Research With Big Data and Graph Databases

    The OpenDNS IntelDB is a graph database system that captures and stores all security-related data for the entire organization. In addition to providing valuable data such as whitelisting and threat attribution, this system is the foundation for the next generation of security research at OpenDNS. The webcast will give a...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Analogue Network Security

    Today, it is the inter-infrastructural foundation of civilization. The internet of things is adding so-called intelligence to some 50+ billion endpoints. Where's the security? Or privacy? Massive new projects using next generation, smarter, faster ways of doing the same old stuff all over again is the ultimate deja vu epic...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Crash the IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)

    In this webcast, the presenter will discuss the previously-unreleased firmware distribution called "Intentionally Vulnerable WRT (IV-WRT)". IoT, or more accurately embedded device, security is a train wreck. IV-WRT is an attempt at bringing vulnerabilities to light which exist inside of firmware on embedded systems.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Backdooring MS Office Documents with Secret Master Keys

    Recent MS Office documents are normally encrypted very strongly, making them difficult to brute force. However, there are techniques an attacker can use to secretly backdoor these encrypted documents to make them trivial to decrypt. Cloud environments may be more dangerous than thought as it is not possible for users...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    How Portal Can Change Your Security Forever

    When used correctly gamification can be one of the most effective tools for changing behavior on a large scale, but it requires more than just designing a few digital merit badges for taking security training. In this webcast, the presenter will discuss how games like portal and Candy Crush were...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Barely Legal: The Hacker's Guide to Cybersecurity Legislation

    Cybersecurity is a hot topic in DC, and everyone is building an agenda on it. That's only going to increase as more high profile breaches and vulnerabilities hit the headlines and technology becomes more pervasive in people's lives.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Secure Software Development

    Developing software is hard, and there are lots of different facets to consider. In this webcast, the presenter will explain about how to think about security during the software development lifecycle, hopefully making software more secure.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Security Consulting, an Introductory Guide

    Security consulting an introductory guide within IT security, the key consultancy specialization areas are risk management, design and build of security solutions, and penetration testing. Being a consultant is about being trusted and providing expert advice in the user's domain of expertise.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    The Irresistible Rise of Online Crypto Currencies

    In this webcast, the presenter will explain what crypto currencies are, their advantages and their failings. It draws on economics as well as cryptography. The webcast examines the nature of money and examines some historical as well as current attempts to construct a monetary system with cyber-currencies.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Low-Level Software Security: Attacks and Countermeasures

    In this webcast, the presenter will introduce common low-level security problems and solutions by example. Focusing on the C language, the presenters will discuss four common attack techniques that attackers can use to gain control over the execution of software: return address clobbering, where an attacker gains control by overwriting...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    The Web's Security Model

    While the Web has undergone a dramatic transformation since the first static HTML documents, the underlying security model has been largely unchanged. However, due to the vastly expanded client-side capabilities in modern web applications, the security model is now more important than ever. Understanding this security model is key to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Anonymity Systems Requirements and Architecture

    Anonymity systems are one of the most challenging classes of security technologies to build and deploy. This webcast will describe the types of systems which are available and difficulties encountered in realizing these goals. As a study, the webcast will use the largest deployed anonymity network, Tor.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Authorization With Oauth 2.0

    OAuth 2.0 is an open standard for authorization and is becoming the de facto standard to integrate with social media like Facebook and Twitter. It allows users to share private resources between sites without having to hand out their credentials. In this webcast, the presenters will describe how OAuth works...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Entity Authentication and Session Management

    In this webcast, the presenters will discuss the security considerations to consider when building an AuthenticatioN (AuthN) layer of a web application. They will review a series of historical authentication threats. They will also discuss a variety of authentication design patterns and defensive controls necessary to build a low-risk high-security...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Approaching Secure Code

    In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected software are occurring every day. Developers must learn to code in a secure fashion to have any chance of providing...

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    JavaScript Security

    As one of the key technologies underlying advanced web applications, JavaScript is becoming ever more important. As a developer, the users need to understand what features of the language they can embrace fully, and which ones to stay away from. Doing so will help them write more securable code (i.e....

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Threat Modeling

    The webcast begins by describing the threat model process the users use at Cigital. In this webcast, the presenter will walk through an in-class example applying the process to identify potential flaws in a system.

    Provided By SecurityTube.net

  • Webcasts // Aug 2015

    Ensuring the Success of your IAM Projects

    Identity and access management (IAM) projects are some of the most important (and difficult) activities that organizations must undertake. This on-demand webcast explores hundreds of companies and real-world projects to help you create a successful, affordable and sustainable IAM implementation. View the Webcast >>

    Provided By Dell Software

  • Webcasts // Jul 2015

    Powershell for Incident Responders & Security Professionals

    Windows system administrators know the benefits of Powershell for automation and administration, but it is often overlooked by security professionals. Unfortunately, malware authors have utilized Powershell extensively to both penetrate and maintain a foothold in networks.

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Security Metrics: Why, Where and How?

    Security metrics, when used correctly can help the users paint a picture on the status of their security, they can also help they make security decisions so that they can prioritize and reduce the risk when making these decisions.

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    DarkComet From Defense to Offense

    DarkComet is a remote access Trojan that has been around for a while. It has been used by script kiddies and nation states alike. It is no longer in active development and it is well documented and understood. So why the users would be interested in the presenter talking to...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Introducing WiFiphisher, a Tool for Automated WifiPhishing Attacks

    Wi-Fi networks are commonly plagued by two serious issues: management frames can be easily forged and wireless devices tend to automatically connect to the access point with the best signal. The evil twin and karma attacks exploit the above issues, allowing attackers to perform man-in-the-middle and phishing attacks.

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Proprietary Network Protocols - Risky Business on the Wire

    When speed and latency counts, there is no place for standard HTTP/SSL stack and a wise head comes up with a proprietary network protocol. How to deal with embedded software or thick clients using protocols with no documentation at all? Binary TCP connections, unlike anything, impossible to be adapted by...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Enterprise Class Vulnerability Management Like a Boss

    In this webcast, the presenter applies the recent OWASP Application Security Verification Standard (ASVS) 2014 framework and applies it to enterprise vulnerability management in an attempt to make a clearly complicated yet necessary part of the users organization's ESA much more manageable, effective and efficient with feasible recommendations, based on...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Eating the SMB Security Elephant - An ITsec Framework for Small IT Shops

    Small or one person IT shops doesn't have a large amount of resources to put towards security. The presenters are responsible for far more than just security and there are many competing demands for their time and attention. How do they make decisions on security projects in a sea of...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Funny Money: What Payment Systems Teach Us About Security

    Emerging payment systems means new opportunities to make old mistakes. Apple Pay and Google Wallet have taken the users cardless and wireless. Starbucks invented its own espresso-driven gift cards. Bluetooth payment beacons are taking them cashier less. Yet amid the encryption and tokenization and PCI DSS compliance, somehow, criminals still...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Information Security Reconciliation: The Scene and the Profession

    Whether people want to admit it or not, there's a strong, concerning segmentation that's more obvious than ever within information security. On this 5th anniversary of security B-Sides Detroit, this presenter will provide an unapologetic perspective of what the presenter have seen, what the presenter am seeing and what the...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Cyber Intelligence: Concrete Analysis in a Fluid World

    In this webcast, the presenters will discuss their experiences, over many generations of learning from failures, to build an effective and scalable cyber intelligence operation. While based upon GE Aviation's approach, they will cover numerous technologies, concepts, processes and controls which they rely upon to provide a continuous and responsive...

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Process - The Salvation of Incident Response

    Skilled incident responders are in rare supply. InfoSec tools fall short of automated detection. Sophisticated, targeted attacks are on the rise. In short, the attackers are winning. This webcast will examine how to maximize existing personnel and tools to more effectively identify and quantify security risks.

    Provided By SecurityTube.net

  • Webcasts // Jul 2015

    Who Watches the Watchers? Metrics for Security Strategy

    In this webcast, the presenter will borrow concepts from epidemiology, repeated game theory, classical and causal probability theory in order to demonstrate some inventive metrics for evaluating vulnerability management strategies. Not all vulnerabilities are at risk of being breached. Not all people are at risk for catching the flu.

    Provided By SecurityTube.net