Information Security

6d117b57d55f63febe392e40a478011f

Hacker Halted Miami: EC Council's Jay Bavisi

October 27, 2011

Jay Bavisi is the Co-Founder and President of EC-Council, a global Leader in Information Security Education, Training, and Certification. With 27 Infosec facing certifications, ECC's interest is in supporting the global need for Security Certified Professionals in the realm of Ethical Hacking...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted Miami: Qualys CTO Wolfgang Kandek on APTs

October 25, 2011

The term, "Advanced Persistent Threats" gives the impression that most organizations are not equipped to deal with sophisticated attacks. Wolfgang Kandek's Hacker Halted keynote exposes the reality behind the causes of these threats and makes the case for a new security model...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Benefits of Being a CISSP

October 24, 2011

Some people think a CISSP is a run-of-the-mill security certification... but it isn't. If you know how to use it to your benefit. You can wield unlimited power...

Comments  (6)

850c7a8a30fa40cf01a9db756b49155a

Reverse Engineering the RSA Malware Attack

September 08, 2011

In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. In this video, security expert J. Oquendo attempts to reverse engineer the attack using open source forensics tools...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Rainer Enders - CTO - NCP Engineering

August 23, 2011

Rainer Enders is the CTO at NCP Engineering, and is interested in solving security related issues on all levels of data transfer and communication. NCP engineering delivers software that allows enterprises to rethink their secure remote access and overcome the network complexities...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Tom Eston - Secure State Consultant

August 21, 2011

Tom Eston is a senior security consultant with Secure State, who's focus is in research on the security of social media and privacy. Tom wrote the popular "Facebook Privacy & Security Guide" which is used for awareness training at several universities and government organizations...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Robb Reck - Infosec Expert

August 18, 2011

Robb is a frequent contributor to Infosec Island, and is an experienced Information Security manager in the finance sector. Robb has over 13 years in IT security with proven experience creating and implementing security policy in small and large organizations...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Alexander Polyakov - CTO - ERPScan

August 18, 2011

Alexander Polyakov is the CTO at ERPScan, the OWASP-EAS manager for the OWASP-EAS, and a well-known security expert on enterprise applications such as SAP and Oracle, and who published a significant number of the vulnerabilities found in the applications of these vendors...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Nabil Ouchn - CTO at NETpeas

August 17, 2011

Nabil Ouchn is the co-founder and CTO at NETpeas and the creator of Security Tools Watch. Nabil has over 10 years of experience in IT security assessment, vulnerability management and IS risk analysis driving security pentests and ethical hacking audits...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Mark Boltz - Solutions Architect - Stonesoft

August 17, 2011

Mark Boltz is the senior solutions architect at Stonesoft, a CISSP and an innovator in business continuity and network security solutions. Mark has more than twenty years experience in information systems and network administration, with more than twelve years specialization in information security...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Theresa Payton - CEO - Fortalice

August 16, 2011

Theresa Payton is the Chief Advisor and CEO of Fortalice, and has over twenty years of business and technology leadership experience. From May 2006 until September 2008, Theresa worked for the Bush Administration as the White House Chief Information Officer, the first woman to hold this position...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Chris Blask of AlienVault

August 15, 2011

Chris Blask is the VP of the Industrial Control Systems Group at AlienVault. He has been involved in the information security industry for twenty years. He also invented one of the first commercial firewall products, the BorderWare Firewall Server, and is on the faculty at IANS...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Interview with Dan Kaminsky

August 10, 2011

Dan Kaminsky has been a noted security researcher for over a decade, and has spent his career advising Fortune 500 companies. Dan is best known for his work finding a critical flaw in the Internet’s DNS, and for leading the largest synchronized fix to the Internet’s infrastructure of all time...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat's Technical Director Travis Carelock

August 03, 2011

Travis Carelock is the Technical Director for the Black Hat USA 2011 Conference, taking place this year in Las Vegas, Nevada. Travis talks about some of the technical challenges his team ran into this year, including a fire alarm during the first keynote address by Cofer Black...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Spear Phishing Scams Hook Victims

July 04, 2011

2011 has been the year of the data breach. With what seems like a new report of a data breach each day, scams are on the rise. Identity Theft 911 Founder and Chairman Adam Levin talks to ABC about what consumers should do to protect themselves...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Don't Black List White Listing

June 22, 2011

As AV vendors struggle to keep up they too are looking at white listing too. The trend is toward a hybrid model with white listing doing the heavy lifting to protect end points from zero-day and uniquely fabricated malware and black listing to provide reports...

Comments  (0)


« First   < Previous   | 2 - 3 - 4 - 5 - 6 |   Next >   Last »