Security Video Library | Page 17

Video

Video Library

  • Marcus Ranum on cyberwarfare, infosec careers

    At 2009's Information Security Decisions conference, security expert Marcus Ranum sat down to answer some of readers' security questions.

  • Schneier on outsourcing, awareness training

    At the 2009 Information Security Decisions conference, security expert Bruce Schneier answered some of readers' burning security questions.

  • Creating an enterprise data protection framework

    By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company.

  • Defining DLP

    The rash of information thefts, security breaches and data loss incidents in recent years has driven the development of a new breed of products designed to prevent sensitive data from making its wa...

  • Factors of disaster recovery, business continuity

    In part four of this series, Andre Gold discusses the key aspects of developing a successful business continuity and disaster recovery plan, including location, technology, crisis management and co...

  • Availability, business continuity and disaster recovery

    In part two of this series, gain a better understanding of the relationship between availability, business continuity planning and disaster recovery.

  • Disaster recovery, business continuity planning basics

    In this video, Andre Gold, vice president and CISO of MoneyGram International, will discuss the basics of disaster recovery and business continuity planning, and define several general terms associ...

  • Defining internal risk management policies

    In part three of this series, Andre Gold explains how organizations should define their own internal risk management policies and standards to ensure a solid development to your disaster recovery a...

  • Prevent business continuity, disaster recovery problems

    In conclusion to this video series, Andre Gold discusses the importance of communication to avoid business continuity and disaster recovery planning problems, and defines the core elements needed f...

  • Disaster recovery, business continuity plan problems

    Andre Gold discusses the most common problems and pitfalls organizations can be expected to face in their business continuity and disaster recovery planning efforts and how to avoid these problems.

  • Mozilla security chief on Firefox improvements

    Mozilla's "human shield" Johnathan Nightingale discusses Firefox browser privacy and security issues at the recent Black Hat briefings in Las Vegas.

  • Perimeter defense for a perimeterless network

    When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a ...

  • Vulnerability mitigation study

    Qualys CTO Wolfgang Kandek says vendors and administrators need to find ways to speed up the patching cycle.

  • Next generation spam: New threats and new technologies

    This video examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure data doesn't ...

  • WASC Web Honeypot Project enters next phase

    Ryan Barnett of Breach Security and leader of the WASC Honeypot Project talks about phase three of the project, which uses an open proxy server to analyze Web attack data.

  • Top tactics for endpoint security

    The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading...

  • Software security threats and awareness training

    What are the newest threats to enterprise networks, and how can you subvert these emerging security threats? Greg Hoglund, CEO of HBGary and creator of the first rootkit, answers these questions.

  • Newest malware threats

    What are the newest threats to enterprise networks, and how can you subvert these emerging security threats? Greg Hoglund, CEO of HBGary and creator of the first rootkit, answers these questions.

  • Compliance in the cloud

    Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security.

  • Securing unified communications

    With so many different communications systems being combined, it can be tough to know where to start when it comes to security. In this video, John Burke explains the basics of securing this new ty...