Videos

  • RSA 2011: Attendees talk threats, security solutions

    In this video from the RSA exhibitor show floor, they share their views of the state of the threat landscape, the evolution of the RSA conference and the kinds of security vendor technologies that appeal to them.

  • Secure application development processes improving, expert says

    In this interview conducted at RSA Conference 2011, Gary McGraw, chief technology officer at Cigital Inc., a software security and quality consulting firm, explains how more organizations are embracing software development processes to improve the code they are producing.

  • CISO details DLP deployment issues at RSA Conference 2011

    In an interview at RSA Conference 2011, Larry Whiteside Jr., CISO of the Visiting Nurse Service of New York, outlines some of the successes and the pitfalls of deploying data leakage protection software for the first time.

  • Mobile malware targeting Android, iPhones, says Kaspersky Lab expert

    Mobile malware has been increasing in scope and intensity explains Denis Maslennikov, senior malware analyst on Kaspersky Lab's global research and analysis team.

  • VeriSign CSO on new IPv6 threats, Internet stability and security

    VeriSign CSO Danny McPherson talks about the new threats posed by the move from IPv4 to IPv6 and the issues hindering the the adoption of the next Internet protocol.

  • Security researcher calls for greater focus on supply chain assurance

    Hart Rossman, vice president and CTO for cyber programs at SAIC says more needs to be done to secure hardware and software moving in the global supply chain. Rossman explains the threat posed by poorly manufactured, bogus parts and software. Unfortunately few technologies exist to oversee secure manufacturing and ensure electronic components and software are not knock-offs.

  • Default deny security: How to implement a positive security model

    What is 'default deny' security? How difficult is the implementation process, and how could you sell it to executives? In this video, expert Mike Rothman explains how a positive security model works and how to decide if it's right for your enterprise.

  • The business case for enterprise password management

    Spyro Malaspinas discusses the importance of enterprise password management and how your business can benefit from implementing good identity management practices.

  • RSA Conference 2011 preview: Mobile security

    In this RSA Conference 2011 preview video, SearchSecurity.com News Director Robert Westervelt moderates a discussion on the growing threat posed by mobile devices and the state of the network perimeter. Speakers include SearchSecurity.com Senior Site Editor Eric Parizo, and Research Director Josh Corman of The 451 Group.

  • RSA Conference 2011 preview: State of APT

    In this RSA Conference 2011 preview video, SearchSecurity.com News Director Robert Westervelt moderates a discussion on the state of the advanced persistent threat (APT). Speakers include SearchSecurity.com Senior Site Editor Eric Parizo, and Research Director Josh Corman of The 451 Group.

  • RSA Conference 2011 preview: Trends and tips

    In this RSA Conference 2011 preview, SearchSecurity.com News Director Rob Westervelt and Senior Site Editor Eric Parizo discuss possible tips and trends with Joshua Corman, research director of enterprise security practice for the 451 Group.

  • RSA 2011 preview: Compliance

    In this RSA Conference 2011 preview video, SearchSecurity.com News Director Robert Westervelt moderates a discussion on a wide variety of compliance issues. Speakers include SearchSecurity.com Senior Site Editor Eric Parizo, and Research Director Josh Corman of The 451 Group.

  • Endpoint integrity enforcement: The ins and outs

    Learn about the latest in endpoint integrity enforcement and the questions you should ask vendors and groups within your own organization to stop infected, non-compliant endpoints from threatening your business.

  • What you need to do for MA 201 CMR 17 compliance

    In this video, expert Richard Mackey outlines the steps that every organization must take to comply with Massachusetts 201 CMR 17 data protection law.

  • Incident response team best practices

    Do you know how to maximize your incident response management? Expert Lenny Zeltser discuses incident response best practices for policies, maturity and teams in this interivew.

  • Best practices: Identity management - Part 2

    Do you know how to optimize your identity management? Learn how In part 2 of Best practices: Identity management where experts Kelly Manthey and Peter Gyurko discuss how using case studies involving a Fortune 500 bank.

  • Best practices: Identity management - Part 1

    In Best practices: Identity management - Part 1, experts Kelly Manthey and Peter Gyurko discuss development, education, strategies involving identity management.

  • What is identity management?

    Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise.

  • Identity management maturity model

    Learn about identity management and its capabilities in a detailed maturity model that highlights people, process and technology.

  • Meeting business goals with network security technologies

    This video will discuss how moving from primary business functions to more detailed business tasks can help identify goals that network security can assist in meeting.

  • Web 2.0 threats illustrated

    Find the tools needed to balance between security and business in Web 2.0 platforms.

  • A buyer's guide to buying a provisioning system

    Video: Randall Gamby on what to look for in a provisioning vendor and how to choose the product that's right for your enterprise.

  • Realign your data protection strategy efforts

    In this video, learn what you need to do to realign your strategic focus to counter new threats by first understanding what’s important to your business.

  • How to perform a third-party risk assessment for compliance

    Afraid of non-compliant business partners? Learn how to perform a third-party risk assessment to prevent non-compliance.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close