Videos
-
Virtualization compliance: Put compliance to work in a virtual world
In this presentation, Eric Ogren examines security challenges in virtual environments, with specific views on making virtualization compliance work.
-
(ISC)2 board member on security industry growth vs. member value
Video: Board member David Melnick discusses the "interesting challenge" of growing (ISC)2's ranks while still creating value for existing members.
-
The challenges of mobile device security policy enforcement
Video: Deloitte mobile security expert David Melnick discusses the challenges of mobile device security policy enforcement and how to develop reasonable controls.
-
pfSense tutorial: Configure pfSense as an SMB-caliber firewall
Video: Keith Barker of CBT Nuggets provides a brief pfSense tutorial. Learn how to configure pfSense, a free yet surprisingly capable firewall.
-
Vulnerability researcher on layered security plan mistakes
A layered security plan is good, but Argonne National Laboratory vulnerability researcher Roger Johnston warns against too many layers.
-
Researcher details findings on spoofing GPS, malicious insiders
Roger Johnston of Argonne National Laboratory discusses the implications of spoofing GPS and ways to manage angry and potentially malicious insiders.
-
PCI SSC's Bob Russo on point-to-point encryption, PCI compliance
Video: The PCI SSC GM discusses tokenization, point-to-point encryption, PCI compliance and plans to approve vendor P2P encryption products.
-
Bob Russo on mobile payment security and PCI compliance
Video: The PCI SSC is working on guidance for businesses that want to accept mobile payments and are testing mobile payment applications for PCI compliance.
-
Mobile device platform security: Exploring mobile security threats
Video: Learn about the mobile device platform flaws in iOS and Android, and emerging mobile security threats that range beyond mere mobile malware.
-
Log management and analysis: How, when and why
In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture.
-
Expert: Mobile app privacy issues may lead to enterprise data leakage
Video: Mobile app privacy issues threaten contacts, calendar items and other sensitive data, said Domingo Guerra of San Francisco-based Appthority.
-
Researcher lauds Windows 8 memory protections
Video: New memory-based protections in Windows 8 make heap-based buffer overflow attacks much more difficult.
-
DLP use cases: When to use network storage and endpoint DLP
In this video, our expert will explain how different types of DLP work, such as network and endpoint DLP, and how it secures data at rest.
-
Black Hat 2012: Rodrigo Branco on new malware research database
Video: Qualys vulnerability researcher Rodrigo Branco discusses his new malware analysis system that will serve as a malware research database.
-
Black Hat 2012: Phishing and social engineering penetration testing
Video: Anti-spear phishing training is controversial, but can be effective if it is done right, says Rohyt Belani, CEO and co-founder of PhishMe Inc.
-
With Spyeye, Zeus variants, cybercriminals up the ante
They have long plagued the financial industry, but the latest Spyeye/Zeus variants are a serious and complicated threat, says Dell SecureWorks.
-
Social media legal issues: Advice for IT security pros
Video: When a company or its employees use social media, the IT team should understand the legal terms and conditions of each social media site.
-
Android security issues point to Android platform security concerns
Video: Researcher Dan Guido discusses mobile attacks and Android security issues, highlighting Android platform security concerns like app downloads.
-
Dave Shackleford on improving internal pen testing methodology
Video: Learn how to improve your pen testing methodology in the areas of reconnaissance, scanning, enumeration, penetration and reporting.
-
Peter Kuper on IT and the economy; IT security spending outlook
In this special keynote, In-Q-Tel's Peter Kuper analyzes the state of IT and the economy in 2012, and the resulting IT security spending outlook.
-
PCI compliance guidance fueling technology investments, expert says
Despite no update to PCI DSS until the end of 2013, merchants are busy with compliance initiatives, explains Diana Kelley of SecurityCurve.
-
Andrew Hay on steps in an MDM comparison
Expert Andrew Hay discusses security threats putting mobile devices at risk and lists the steps in an MDM comparison.
-
Brian Contos on detecting rootkits with hardware-based security
Hardware-based security tools can help security teams detect rootkits that are used by attackers to hide malware below the operating system.
-
Jeremiah Grossman on making hard information security budget decisions
IT investments and IT security investments are often out of alignment. Jeremiah Grossman suggests ways to get the infosec budget back on track.