Videos Tagged with "Humor"

99edc1997453f90eb5ac1430fd9a7c61

Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

99edc1997453f90eb5ac1430fd9a7c61

Avoiding Security Budget Cuts

November 28, 2011

Companies are cutting back on information security departments budgets. I have, however, come up with an ingenious plan by which security departments can keep their funding without costing the company any money whatsoever. I’m pretty sure no-one has come up with this idea before...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Definition of a Real Security Consultant

November 11, 2011

No longer are arms or industrial might the measure of a country’s superiority, it resides within the information it holds. So if you have information that needs protecting and nobody else can help, you know what to do... just use a suitable encryption algorithm to render it unreadable...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

The Benefits of Being a CISSP

October 24, 2011

Some people think a CISSP is a run-of-the-mill security certification... but it isn't. If you know how to use it to your benefit. You can wield unlimited power...

Comments  (6)

46d1980e375ce08915b30d9a328c2fdc

the UNPROTECTED - Episode 1

September 10, 2010

In this episode of the UNPROTECTED, CTO Amanda learns Greencrest has not only failed their audit, but their main production database has been hacked!

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Episode 7

June 07, 2010

Javvad and Georgina question the integrity of security products on the market and try to show the world that any product can be marketed to have a security use! However, Will they succeed? Tune in to this weeks episode to find out!

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Episode 6

May 30, 2010

Special guest in Ruth Jacobs from Barclay Simpson talking about the Infosec job market, the weirdest types of emails they receive and how they can tell when a candidate is lying on their CV. Ruth also gets a chance to interview our resident cynics to see if they would stand a chance in getting a job in the security market.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Episode 5

May 24, 2010

Fake facebook logo's and Polish priests. Georgina also challenges Javvad to try and bypass the security controls on her laptop? Will she succeed? Or will Javvad take another step towards world domination... and who is this mysterious Peter Stevens guy?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Episode 4

May 18, 2010

Our hosts catch up with the Director of Marmalade Box, Mr Bruce Hallas where he shares his insights into the world of Information Security. How can you ensure your employee's won't walk away with your database, and why trust is such an important factor in cross business communications.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Episode 2

May 03, 2010

Coverage from Infosec Europe 2010 held at London's Earls court. Catch interviews with the likes of Fortify, Credant, Vanguard, Bit Defender, Redstone, ISACA, Napatech, IronKey, Varonis and others.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Episode 1

April 23, 2010

Season 1: Episode 1 of the Infosec Cynic Show. Hear the cynical view on Full body scanner, laptops that spy on high school students and find out what the best way to backup your data is!

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Cynic Show: Trailer

April 02, 2010

Episode 1 of the Infosec Cynic Show airs on Monday 26th April 2010. But if you can't wait, then here's a short trailer to give you a taste of what to expect over the first pilot season. Excited? We sure are!

Comments  (0)

Page « < 1 - 2 > »