Video Library
-
The importance of secure software development training
At Information Security Decisions 2008, security researchers discuss secure application coding and how to teach best practices to young developers (part 4 of 4).
-
The future of exploit vulnerability research
At Information Security Decisions 2008, security researchers discuss the most vulnerable network points and the future of the SDLC (part 1 of 4).
-
Defending against Internet security threats and attacks
From buffer overflows to cross-site scripting, Web threats are many. Security researchers at Information Security Decisions 2008 discuss how to keep enterprises safe from these attacks (part 2 of 4).
-
FAQ: Corporate Web 2.0 Threats
In this expert video, you will learn about Web 2.0 software, the threats it poses, and whether the benefits outweigh the risks. Key areas covered include the threats posed by services like Facebook...
-
How to increase a wireless network's bandwidth
In this video, Joel Snyder of Opus One reviews how to provide sufficient network bandwith to all the users in your organization.
-
Wireless networks: Managing guest user authentication
Joel Snyder reviews your different access policies and how to deal with the threat of unauthenticated users.
-
Wireless network security: WLAN switches and more
Joel Snyder of Opus One reviews the WLAN switch technology and explains why intrusion detection systems and firewalls need to also be carefully added to a "defense in depth" network configuration.
-
Wireless network security: 802.11i and WPA basics
In this video, Joel Snyder of Opus One reviews 802.11i and WPA, along with the other minimum requirements necessary for building a secure network.
-
Johannes Ullrich: ISC, stealthy malware
SANS Chief Research Officer Johannes Ullrich discusses the Internet Storm Center (ISC), information sharing and the state of malware.
-
CISSP Lesson 1: Security management practices
In this CISSP lesson, learn about security management practices.
-
Avi Rubin on e-voting, online privacy
The Johns Hopkins University professor discusses online privacy perception and reality, plus the state of electronic voting security.
-
Gary McGraw on secure software development
Gary McGraw of Cigital Inc. explains why better secure coding could help thwart future Web 2.0 attacks. He says the industry is making progress.
-
Dan Kaminsky on DNS, Web attacks
Noted network security researcher Dan Kaminsky, director of penetration testing at IOActive, shares his research on DNS and Web-based attack techniques.
-
2007 Security 7 Awards
The industry's best and brightest security officers discuss key issues and answer questions during the Security 7 awards at the 2007 Information Security Decisions conference.
-
Video: Data encryption techniques and methods for protecting data
In this screencast, which is a part of our SearchSecurity.com Data Protection Security School lesson, you will about the different data encryption techniques and methods for protecting data as well...
-
Webcast: FRCP requirements force new thinking on e-disc
In this presentation, Frank Lagorio discusses e-discovery policy best practices under FRCP requirements, how to get started and pitfalls to avoid.
-
Securing your network from the inside out
Learn to effectively assess threats from internal clients, detect anomalies in outgoing traffic, architect networks to resist internal attacks, respond effectively when attacks occur and more.
-
NAC and endpoint security: The hard questions
Joel Snyder covers challenging endpoint security questions and explains how NAC technology can address them.
-
The business case for intrusion, perimeter defense
In this presentation, Joel Snyder explains how to secure the necessary funds to implement intrusion defense and perimeter defense security tactics.
-
Smart tactics for antivirus and antispyware
AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural pers...
Security Management Strategies for the CIO