Videos Tagged with "Network Security Monitoring"

Bd07d58f0d31d48d3764821d109bf165

Utilizing Network Security Solutions: A Customer’s Perspective

August 16, 2012

Anyone can go research IT companies and make decisions based solely on what they read, but this is not how people make decisions. People interested in buying a product or service want to know if it will work, how well it has worked in the past, and if current customers are happy with the product or service...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Translating Security for the Non-Technical Folks

August 15, 2012

To provide more effective data protection that combines preventive and detective controls, a security admin can obtain the necessary technical information to create reports and dashboards that translate data into terms the business understands to make information security visible, measurable and accountable...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

What Makes Black Hat Europe So Special?

March 29, 2012

Black Hat Europe is one of the premier security conferences. But what brings people back here year after year? We asked some of the attendees what makes black hat so special to them, courtesy of Infosec Island and NETpeas...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: AlienVault CTO Roger Thornton on Network Visibility

February 29, 2012

Roger Thornton, CTO at AlienVault, discusses the need for organizations to reduce the overall cost of network security visibility. He believes that technology is not the problem, but instead it is the time, money and staff needed for effective and meaningful visibility...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Dominique Karg on the AlienVault Open Source Model

February 28, 2012

Dominique Karg, Co-Founder and Chief Hacking Officer for AlienVault, took some time to discuss the many myths around open source architecture, the inherent benefits and problems, and why AlienVault ultimately decided to go with the open source model...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Risk Management

February 10, 2012

A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Introduction to Bro Network Security Monitor

February 08, 2012

Great intro video to the Bro Security Network Analysis Framework by Richard Bejtlich. Bro is an amazing tool that gives you a summary of what is going on in your network. It creates text log files of connections, protocols, communications, and what it sees on the wire...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Security Onion Intrusion Detection System Setup Tutorial

January 25, 2012

Run this on a system that has two network cards and you have a complete NSM/IDS. One NIC connects to your network or internet side of your traffic and monitors every packet, the second NIC connects to your LAN side and can be used to remotely view and monitor intrusion attempts...

Comments  (2)