Software

With virtualization, mobile apps, and agile dev platforms, software increasingly defines business. Take advantage of our expert guidance for developing, managing, and monetizing software.

  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    Watch Now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    Watch Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now
  • Uponor case study package: On the road to marketing maturity with the Sitecore® Experience Platform™

    Webcasts // Nov 2015 // provided by Sitecore

    Rapid technology disruptions, high customer demands, and gaps in staff skills to address both, are some of the crucial challenges most digital marketers face today. With so much energy going toward these in-the-moment needs, it can be easy to lose sight of your future plans, much less any sense of ...

    Watch Now
  • Rowhammer.js: Root Privileges for Web Apps?

    Webcasts // Jan 2016 // provided by SecurityTube.net

    In this webcast, the presenters present Rowhammer.js, a JavaScript-based implementation of the Rowhammer attack. After presenting the native attack, they underline the challenges they faced to trigger the vulnerability from JavaScript, without any special instruction. Beyond DRAM, this attack also requires a very fine understanding of CPU cache internals that ...

    Watch Now
  • The Ling Language: Modular and Precise Resource Management

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenter will present the experimental language Ling. The presenter shall get an intuitive understanding of the language through familiar concepts from imperative programming. The presenter shall cover how Ling enables a modular and precise control on memory allocation, through a general optimization called fusion.

    Watch Now
  • Penetration Testing with Raspberry Pi

    Webcasts // Dec 2015 // provided by SecurityTube.net

    The Raspberry Pi is a $35 computer that can be used for small computing tasks and education purposes. However it can also be used as a penetration testing platform that allows for social engineering, advanced attacks and other forms of evil. In this webcast, the presenter will cover how the ...

    Watch Now
  • How Machine Learning Finds Malware Needles in an AppStore Haystack

    Webcasts // Dec 2015 // provided by SecurityTube.net

    Machine learning techniques are becoming more sophisticated. This webcast will include a live demo showing data analysis techniques and the results machine learning delivers in terms of classifying mobile applications with malicious or risky behavior. In this webcast, the presenter will also explain the difference between supervised and unsupervised algorithms ...

    Watch Now
  • REpsych: Psychological Warfare in Reverse Engineering

    Webcasts // Dec 2015 // provided by SecurityTube.net

    The users' precious 0-day? That meticulously crafted exploit? The perfect foothold? At some point, they'll be captured, dissected and put on display. Reverse engineers when they begin snooping through their hard work, it pays to have planned out their defense ahead of time.

    Watch Now
  • Abusing Adobe Readers JavaScript APIs

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenters will provide insight into both the documented and undocumented APIs available in adobe reader. Several code auditing techniques will be shared to aid in vulnerability discovery, along with numerous proofs-of-concept which highlight real-world examples. They will detail out how to chain several unique issues to ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?