Videos

  • Creating an enterprise data protection framework

    By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company.

  • Defining DLP

    The rash of information thefts, security breaches and data loss incidents in recent years has driven the development of a new breed of products designed to prevent sensitive data from making its way out of enterprise networks. But there is a lot of confusion in the industry about what constitutes a DLP product, how they work and how to deploy them.

  • Business continuity: Defining internal risk management policies

    In part three of this series, Andre Gold explains how organizations should define their own internal risk management policies and standards to ensure a solid development to your disaster recovery and business continuity efforts.

  • Core elements to prevent business continuity, disaster recovery problems

    In conclusion to this video series, Andre Gold discusses the importance of communication to avoid business continuity and disaster recovery planning problems, and defines the core elements needed for a successful BCP and DR efforts.

  • The availability, business continuity and disaster recovery relationship

    In part two of this series, gain a better understanding of the relationship between availability, business continuity planning and disaster recovery.

  • Disaster recovery and business continuity planning: Problems and issues

    Andre Gold discusses the most common problems and pitfalls organizations can be expected to face in their business continuity and disaster recovery planning efforts and how to avoid these problems.

  • Key elements of disaster recovery and business continuity planning

    In part four of this series, Andre Gold discusses the key aspects of developing a successful business continuity and disaster recovery plan, including location, technology, crisis management and communications.

  • Disaster recovery and business continuity planning basics

    In this video, Andre Gold, vice president and CISO of MoneyGram International, will discuss the basics of disaster recovery and business continuity planning, and define several general terms associated with disaster recovery and business continuity planning to help organizations develop a more accurate understanding

  • Mozilla security chief on Firefox improvements

    Mozilla's "human shield" Johnathan Nightingale discusses Firefox browser privacy and security issues at the recent Black Hat briefings in Las Vegas.

  • Perimeter defense in the era of the perimeterless network

    When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a perimeterless network and leading technologies for endpoint security.

  • Vulnerability mitigation study shows need for faster patching

    Qualys CTO Wolfgang Kandek says vendors and administrators need to find ways to speed up the patching cycle.

  • Next generation spam: New threats and new technologies

    This video examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure data doesn't leave your organization.

  • WASC Web Honeypot Project enters next phase

    Ryan Barnett of Breach Security and leader of the WASC Honeypot Project talks about phase three of the project, which uses an open proxy server to analyze Web attack data.

  • Top tactics for endpoint security

    The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured. This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access.

  • Newest malware threats

    What are the newest threats to enterprise networks, and how can you subvert these emerging security threats? Greg Hoglund, CEO of HBGary and creator of the first rootkit, answers these questions.

  • Software security threats and employee awareness training

    What are the newest threats to enterprise networks, and how can you subvert these emerging security threats? Greg Hoglund, CEO of HBGary and creator of the first rootkit, answers these questions.

  • Compliance in the cloud

    Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security.

  • Unified communications: Securing a converged infrastructure

    With so many different communications systems being combined, it can be tough to know where to start when it comes to security. In this video, John Burke explains the basics of securing this new type of infrastructure.

  • Risky Business: Understanding WiFi threats

    Interested in taking your enterprise wireless, or securing the wireless network you already have? Look no further. In this first of a four-part video series, Lisa Phifer of Core Competence explains WiFi threats, including some common attacks.

  • Incident response planning

    Jack Phillips, managing partner of security research firm, IANS, talks about how companies can prepare to appropriately handle a security incident.

  • The failing war against cybercriminals

    Sophos senior security consultant Graham Cluley explains why it has been difficult to defeat international cybercriminal gangs.

  • PCI compliance requirement 4: Encrypt transmissions

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 4: "Encrypt transmission of cardholder data across open, public networks."

  • PCI compliance requirement 10: Auditing

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 10: "Track and monitor all access to network resources and cardholder data."

  • PCI compliance requirement 8: Unique IDs

    In a nutshell, Requirement 8 of the Payment Card Industry Data Security Standard calls for individual identification for anyone and everyone who has access to cardholder data.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close