Videos

  • Adobe: Flash security and the Microsoft Active Protections Program

    Brad Arkin discusses Adobe's strategy to secure Flash Player and its decision to join the Microsoft Active Protections Program.

  • Adobe: Bug reporting and the sandbox

    Brad Arkin talks about Adobe's policy on "bug bounties" and why it's decided to play in a "sandbox."

  • Adobe: Automatic updates and creating 'perfect' software

    Brad Arkin discusses Adobe's addition of automatic update downloads for Reader and Acrobat, and why it took Adobe so long to offer automatic updates. Plus he tackles the feasibility of making "perfect" software.

  • Adobe: Increasing transparency and the secure product lifecycle

    Brad Arkin discusses why Adobe created his role, how it engages the security research community and how Adobe has learned that talking about security isn't a bad thing.

  • Face-off: Information security awareness and when not to reveal information

    Can the security industry learn from the Transportation Security Administration? It may seem like an odd pairing, but both struggle with the challenges of protecting those in their care while maintaining usability and personal privacy.

  • Attackers are turning to mobile platforms, researcher says

    In this interview, Mikko Hypponen, chief research officer, F-Secure Corp. talks about what he sees as the coming mobile security threats.

  • Raising the bar on compliance success

    By now, most enterprises have established baselines for reporting on foundational IT controls. They've also leveraged control frameworks and resident technologies to assist in logging, auditing and reporting. The next milestone is to "raise the bar" on how this information and data is collected and managed by using fewer resources to achieve better results.

  • PCI DSS 1.1: Strategies for compliance

    In this video, Diana Kelley and Ed Moyle of consultancy SecurityCurve discuss the changes that have taken place during the first two years PCI DSS has been in effect, and look forward to potential future changes.

  • An application security framework for infrastructure security managers

    Video: Get a primer on common application attack methods and an application security framework to help infrastructure security teams.

  • SIEM market overview: Gartner's Mark Nicolett

    Gartner VP and distinguished analyst Mark Nicolett discusses SIEM vendor consolidation, the myth that SIEM is a cost-saving effort and more.

  • The future of hacking: Dealing with the underground economy

    How is the underground economy evolving, and what can security practitioners do to anticipate and respond to future threats? In this Face-off video, Hugh Thompson and Adam Shostack discuss the best options.

  • Face-off: Information security management metrics

    Are metrics useful, or do they just distract security pros from the real issues at hand? In this video, Hugh Thompson and Adam Shostack discuss the necessity of metrics.

  • 419 baiters: Not all scam emails from Nigeria

    Almost everyone has received an email promising riches from African royalty, but not all 419 scam emails come from Africa. Learn how to prevent employees from getting suckered in by these scams.

  • Expert on cyber espionage, types of cybercrime and prevention

    In this video, Rober Rodriguez, chairman and founder of the Security Innovation Network (SINET), discusses the state of cybercrime and cyberespionage, and what enterprises need to do to secure themselves.

  • How to be a Chief Information Security Officer (CISO)

    If being a Chief Information Security Officer (CISO) is your dream job, this video is for you. Ernie Hayden, consultant and former CISO, gives advice on the essentials, including how to keep things running smoothly enough that you can take time off.

  • Face-off: Is end-user education worth the effort?

    In this face-off, security experts Hugh Thompson, Founder of People Security, and Adam Shostack, co-author of "The New School of Information Security," discuss whether user security awareness training is worth the time, effort and resources.

  • Paypal account security: CISO on ways to prevent phishing

    Paypal has become known as one of the top organizations when it comes to fighting phishing, mostly because its been a target of so many phishing scams. In this interview, Paypal CISO Michael Barrett describes how his organization approaches the phishing problem with technologies, training and fraud modeling.

  • 201 CMR 17 compliance: What you need to know

    The new Massachusetts data protection law, 201 CMR 17, is known as one of the most stringent laws of its kind. In this interview, David Navetta of the Information Law Group discusses how enterprises should approach compliance with this law.

  • Bruce Schneier on cryptography and government information security

    Author and leading security expertBruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI.

  • Metasploit and software vulnerability testing

    Metasploit is a free tool that can be used to pen test for new and potentially damaging vulnerabilites. In this interview, H.D. Moore, creator of Metasploit, explains how the tool works and what it can contribute to software security.

  • The future of PCI DSS

    Bob Russo, General Manager of the PCI Security Standards Council, discusses upcoming changes to the PCI DSS, including what new changes might be mandated, and when they might go into effect.

  • Re-evaluating QSA training

    Recently, the PCI QSA training process has come under scrutiny over the quality of individual PCI assessors. In part two of this interview, Bob Russo, General Manager of the PCI Security Standards Council, sheds light on changes to the training process.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close