Video

Video Library

  • Defense in Depth 2.0

    This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy...

  • Jim Lewis on secure infrastructure collaboration

    In this video, the director of the Center for Strategic and International Studies discusses cyberwar and the need for collaborative infrastucture protection.

  • Jim Lewis on SCADA security threats, Stuxnet analysis

    Jim Lewis, Director and Senior Fellow at the Center for Strategic and International Studies, gives his analysis of the Stuxnet worm, and what he believes are the greatest threats to SCADA systems.

  • Expert talks secure coding basics

    Chris Eng, senior security researcher at Veracode Inc., explains how firms can get started improving their software development processes.

  • Intersecting state and federal data protection acts

    Expert Richard Mackey discusses data protection acts and regulations from Massachusetts and Nevada and shows why compliance plays such an important role.

  • Using Windows 7 security features

    Lisa Phifer discusses Windows 7 security features like AppLocker, User Access Controls, BitLocker and BitLockerToGo, Volume Shadow Copy and DirectAccess.

  • Video: Previewing the Verizon 2011 breach report

    Verizon's Wade Baker previews the 2011 Verizon Breach Investigations Report and shares surprising insight from the 2010 report on tactics that do and don't help prevent breaches.

  • PCI DSS Compliance: Debating the benefits, Part 1

    Is PCI DSS effective? Are there unintended consequences? Mike Dahn, head of PCI Compliance at Verizon and Joshua Corman, director of security research at the 451 Group discuss how PCI DSS has chang...

  • PCI DSS Compliance: Debating the benefits, Part 2

    Can critics of PCI DSS can get along with proponents of the standard? Gene Kim of Tripwire Inc. and Martin McKeay of Verizon, explain what can be learned by studying the effects of PCI DSS compliance.

  • Scott Charney on fighting botnets, rogue antimalware

    In the final segment of SearchSecurity.com's exclusive RSA Conference 2011 video interview with Scott Charney, Microsoft's Corporate VP of Trustworthy Computing, he discusses a variety of concerns ...

  • CISO interview: Enterprise risk management policy

    In this video interview from RSA Conference 2011, CISO Scott Sysol discusses his organization's enterprise risk management policy on various emerging technologies.

  • Microsoft Trustworthy Computing initiative in 2011

    In this exclusive video interview from RSA Conference 2011, Microsoft Corporate Vice President of Trustworthy Computing Scott Charney and SearchSecurity.com Senior Site Editor Eric B. Parizo discus...

  • Bruce Schneier: What is cyberwar?

    In this RSA Conference 2011 interview, Michael Mimoso, Editorial Director of the Security Media Group at TechTarget interviews Bruce Schneier, Chief Security Technology Officer of BT Group and trie...

  • Expert Bruce Schneier's Stuxnet malware analysis

    In this RSA Conference 2011 interview, Michael Mimoso, Editorial Director of the Security Media Group at TechTarget interviews Bruce Schneier, Chief Security Technology Officer of BT Group discusse...

  • Bruce Schneier on cyberweapons and cyberespionage

    In this RSA Conference 2011 interview, Michael Mimoso, Editorial Director of the Security Media Group at TechTarget interviews Bruce Schneier, Chief Security Technology Officer of BT Group discusse...

  • Scott Charney: Microsoft and collective defense

    In this video, Microsoft's VP for Trustworthy Computing, Scott Charney, discusses collective defense, the Microsoft security policy proposition for securing consumer computers on the Internet.

  • Deploying Database Activity Monitoring

    In this video, learn how to determine the best use cases for DAM, what you need to protect and how to select a deployment model.

  • RSA 2011: Attendees talk threats, security solutions

    In this video from the RSA exhibitor show floor, they share their views of the state of the threat landscape, the evolution of the RSA conference and the kinds of security vendor technologies that ...

  • Secure application development processes improving

    In this interview conducted at RSA Conference 2011, Gary McGraw, chief technology officer at Cigital Inc., a software security and quality consulting firm, explains how more organizations are embra...

  • CISO details DLP deployment issues at RSA 2011

    In an interview at RSA Conference 2011, Larry Whiteside Jr., CISO of the Visiting Nurse Service of New York, outlines some of the successes and the pitfalls of deploying data leakage protection sof...