Videos

  • Face-off: Information security management metrics

    Are metrics useful, or do they just distract security pros from the real issues at hand? In this video, Hugh Thompson and Adam Shostack discuss the necessity of metrics.

  • 419 baiters: Not all scam emails from Nigeria

    Almost everyone has received an email promising riches from African royalty, but not all 419 scam emails come from Africa. Learn how to prevent employees from getting suckered in by these scams.

  • Expert on cyber espionage, types of cybercrime and prevention

    In this video, Rober Rodriguez, chairman and founder of the Security Innovation Network (SINET), discusses the state of cybercrime and cyberespionage, and what enterprises need to do to secure themselves.

  • How to be a Chief Information Security Officer (CISO)

    If being a Chief Information Security Officer (CISO) is your dream job, this video is for you. Ernie Hayden, consultant and former CISO, gives advice on the essentials, including how to keep things running smoothly enough that you can take time off.

  • Face-off: Is end-user education worth the effort?

    In this face-off, security experts Hugh Thompson, Founder of People Security, and Adam Shostack, co-author of "The New School of Information Security," discuss whether user security awareness training is worth the time, effort and resources.

  • Paypal account security: CISO on ways to prevent phishing

    Paypal has become known as one of the top organizations when it comes to fighting phishing, mostly because its been a target of so many phishing scams. In this interview, Paypal CISO Michael Barrett describes how his organization approaches the phishing problem with technologies, training and fraud modeling.

  • 201 CMR 17 compliance: What you need to know

    The new Massachusetts data protection law, 201 CMR 17, is known as one of the most stringent laws of its kind. In this interview, David Navetta of the Information Law Group discusses how enterprises should approach compliance with this law.

  • Bruce Schneier on cryptography and government information security

    Author and leading security expertBruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions of the CNCI.

  • Metasploit and software vulnerability testing

    Metasploit is a free tool that can be used to pen test for new and potentially damaging vulnerabilites. In this interview, H.D. Moore, creator of Metasploit, explains how the tool works and what it can contribute to software security.

  • The future of PCI DSS

    Bob Russo, General Manager of the PCI Security Standards Council, discusses upcoming changes to the PCI DSS, including what new changes might be mandated, and when they might go into effect.

  • Re-evaluating QSA training

    Recently, the PCI QSA training process has come under scrutiny over the quality of individual PCI assessors. In part two of this interview, Bob Russo, General Manager of the PCI Security Standards Council, sheds light on changes to the training process.

  • Assessing the botnet threat

    Botnet researcher Joe Stewart discusses the current threat levels presented by botnets and how to protect your enterprise from DDoS and other botnet attacks.

  • Faceoff: Has social networking changed data privacy and security?

    In this exclusive conversation, security industry luminaries Hugh Thompson, founder of People Security, and Adam Shostack, author of "The New School of Information Security," discuss the state of social networking and data privacy, and why the social networking phenomenon may be an infosec ticking time bomb waiting to explode.

  • Data Accountability and Trust Act

    Attorney David Navetta discusses the proposed DATA law, including the similarities and differences with existing state data privacy laws.

  • Noted cryptographer on SSL, encryption and cloud computing

    Cryptographer, Taher Elgamal of Axway Inc., the inventor and initial driving force behind SSL, explains how applications may be better adapted to defend against attacks.

  • Botnets, malware security and capturing cybercriminals: Video

    Malware isn't getting more sophisticated, but cybercriminals have better tools to control their botnets and deploy more targeted attacks, says Gunter Ollmann of Damballa, Inc.

  • VeriSign on DNSSEC support

    Joe Waldron, a product manager in VeriSign's Naming (DNS) Group, said engineers are testing and upgrading systems to support security extensions for DNS (DNSSEC).

  • Regulatory requirements driving enterprise role and entitlement management

    Learn how implementing IAM technologies and strategies can help your enterprise achieve compliance with various regulations.

  • How to advance in your information career in the current economic storm

    It's not news that the current economy is struggling, but what's the best way for infosec pros to position themselves to make it through? Sara Santarelli, Chief Network Security Officer of Verizon, gives her advice how how to advance your information security career and what to do if you lose your infosec job.

  • Security risk management video: Business partner security and pandemic planning

    In this exclusive interview, Sara Santarelli gives tips on how to deal with the risks posed by business partners and possible pandemics, and how to assess your enterprise's exposure to these risks.

  • Choosing the right authentication method for your business

    Learn about common authentication methods and how to choose the right multifactor and mobile device authentication solution in this video with Mark Diodati of Burton Group,

  • Schneier-Ranum face-off part 6: Audience questions

    Wrapping up their face-off at ISD 09, Bruce Schneier and Marcus Ranum take questions from the audience on everything from strategies for protecting risky assets to what they would do as the U.S. cybersecurity coordinator.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close