Featured Videos
Video Library
-
How to use Armitage as a vulnerability assessment tool
Video: In this Armitage tutorial, Keith Barker of CBT Nuggets shows how to use the Metasploit add-on to perform vulnerability assessments.
-
Data loss prevention tools: Understanding your options
Video: Kevin Beaver uses real-life experiences with data loss prevention tools to help you with your technology choices, rollout and management.
-
Endpoint data security revolution: Beyond antivirus
Video: Mike Rothman assesses next-generation endpoint data security strategy and how to integrate endpoint technologies to spot persistent attackers.
-
Evaluating next-generation firewalls
In this presentation, Joel Snyder discusses best practices for evaluating next-generation firewalls.
-
How to use the ThreadFix vulnerability management tool
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process.
-
IT security risk and business risk: Closing the gap
Video: It's a mistake to equate IT security risk and business risk. VerSprite's Tony UcedaVelez explains why, and offers advice on bridging the chasm.
-
An introduction to Web application threat modeling
Video: VerSprite's Tony UcedaVelez explains how Web application threat modeling assesses Web risk and how it differs from penetration testing.
-
Understanding database security issues
This presentation takes a look at vulnerabilities that directly affect database security and what enterprises should do to monitor database access to detect potential security incidents.
-
Discover Web app vulnerabilities using OWASP's ZAP tool
Video: Keith Barker of CBT Nuggets offers a OWASP Zed Attack Proxy tutorial. Learn how to find and nullify Web application vulnerabilities using ZAP.
-
How Adobe turns developers into security 'ninjas'
Video: Adobe CSO Brad Arkin explains how his firm fosters secure software development by inspiring developers to become security 'ninjas.'
-
Kandek: Plug-ins threaten Web browser security
Video: Qualys CTO Wolfgang Kandek said plug-ins now affect Web browser security more than the browsers themselves.
-
Dexter tutorial: How to use the Android analysis tool
Video: Keith Barker of CBT Nuggets demos Dexter, the Android static analysis tool that examines and securely deploys Android applications.
-
NSA shares lessons learned from SE Android pilot
Video: The NSA's Troy Lange discusses SE Android and how he hopes it will play a role in fostering improved Android platform security for enterprises.
-
Adobe's Arkin on vulnerability disclosure and Group-IB
Video: Adobe software security chief Brad Arkin details the software giant's policy on vulnerability disclosure and Group-IB's Reader sandbox claims.
-
Update on Cisco network security product strategy
Video: Cisco SVP Chris Young details the vendor's 2013 network security product strategy, specifically combining more features into its line of ASA firewalls.
-
Holding software vendors accountable with VBSIMM
Video: Gary McGraw explains how JPMorgan Chase and others use the VBSIMM security model to vet software purchased from third-party vendors.
-
After 15 years, Snort IDS tool still going strong
Video: Snort creator Martin Roesch discusses new Snort features like JavaScript normalization and rule modeling, and looks ahead to Snort's future.
-
Schneier: Cyberwar rhetoric puts freedom at risk
Video: Bruce Schneier explains why ongoing China cyberwar rhetoric evokes the wrong responses and may damage personal privacy, and ultimately freedom.
-
IPv6 co-inventor offers IPv6 rollout security advice
IPv6 co-inventor Robert Hinden outlines IPv6 implementation security risks and a critical IPv6 security tip for working with network security vendors.
-
Assess threats, malware with the Mandiant Redline tool
Video: Keith Barker of CBT Nuggets shows how to use the Mandiant Redline memory analysis tool to conduct threat assessments, defeat rootkits.
Security Management Strategies for the CIO