Videos

  • Disaster recovery and business continuity planning: Problems and issues

    Andre Gold discusses the most common problems and pitfalls organizations can be expected to face in their business continuity and disaster recovery planning efforts and how to avoid these problems.

  • Disaster recovery and business continuity planning basics

    In this video, Andre Gold, vice president and CISO of MoneyGram International, will discuss the basics of disaster recovery and business continuity planning, and define several general terms associated with disaster recovery and business continuity planning to help organizations develop a more accurate understanding

  • The availability, business continuity and disaster recovery relationship

    In part two of this series, gain a better understanding of the relationship between availability, business continuity planning and disaster recovery.

  • Mozilla security chief on Firefox improvements

    Mozilla's "human shield" Johnathan Nightingale discusses Firefox browser privacy and security issues at the recent Black Hat briefings in Las Vegas.

  • Perimeter defense in the era of the perimeterless network

    When it comes to perimeter defense, identifying the network edge is a challenge in itself. This video offers insight on defending the enterprise in a perimeterless world, including the issues of a perimeterless network and leading technologies for endpoint security.

  • Vulnerability mitigation study shows need for faster patching

    Qualys CTO Wolfgang Kandek says vendors and administrators need to find ways to speed up the patching cycle.

  • Next generation spam: New threats and new technologies

    This video examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure data doesn't leave your organization.

  • WASC Web Honeypot Project enters next phase

    Ryan Barnett of Breach Security and leader of the WASC Honeypot Project talks about phase three of the project, which uses an open proxy server to analyze Web attack data.

  • Top tactics for endpoint security

    The start- and end-points of today's enterprise networks are radically different than they were 10 years ago. IT staffs no longer have control over every endpoint connecting to the network, leading to a host of problems where access control is weak or nonexistent, and the endpoints are not properly secured. This video will provide an overview of the endpoint security problem and offer strategies for securing endpoints and controlling their access.

  • Newest malware threats

    What are the newest threats to enterprise networks, and how can you subvert these emerging security threats? Greg Hoglund, CEO of HBGary and creator of the first rootkit, answers these questions.

  • Unified communications: Securing a converged infrastructure

    With so many different communications systems being combined, it can be tough to know where to start when it comes to security. In this video, John Burke explains the basics of securing this new type of infrastructure.

  • Risky Business: Understanding WiFi threats

    Interested in taking your enterprise wireless, or securing the wireless network you already have? Look no further. In this first of a four-part video series, Lisa Phifer of Core Competence explains WiFi threats, including some common attacks.

  • Incident response planning

    Jack Phillips, managing partner of security research firm, IANS, talks about how companies can prepare to appropriately handle a security incident.

  • PCI compliance requirement 12: Policy

    To pass the Payment Card Industry Data Security Standard, particularly Requirement 12, it's important that you maintain a body of policy or documentation of how you will address the PCI DSS requirements. In this video, Diana Kelley and Ed Moyle review PCI best practices.

  • PCI compliance requirement 5: Antivirus

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 5: "Use and regularly update antivirus software."

  • PCI compliance requirement 1: Firewalls

    PCI experts Diana Kelley and Ed Moyle review Requirement 1 of the Payment Card Industry Data Security Standard, which includes a mandate for stateful inspection firewalls.

  • PCI compliance requirement 11: Testing

    PCI Requirement 11 is a popular one, according to Diana Kelley. Learn why in this instructional video.

  • PCI compliance requirement 3: Protect data

    Ed Moyle and Diana Kelley review Requirement 3 of the Payment Card Industry Data Security Standard: Protect cardholder data. It's not as simple as it sounds.

  • PCI compliance requirement 10: Auditing

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 10: "Track and monitor all access to network resources and cardholder data."

  • PCI compliance requirement 7: Restrict access

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 7: "Restrict access to cardholder data."

  • PCI compliance requirement 4: Encrypt transmissions

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 4: "Encrypt transmission of cardholder data across open, public networks."

  • PCI compliance requirement 6: Systems and applications

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 6: "Develop and maintain secure systems and applications."

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close