Videos Tagged with "Video"

4c1c5119b03285e3f64bd83a8f9dfeec

Security and Privacy in a Connected and Cloudy World

November 29, 2012

A few months ago, I was invited to present at a summit organized by the New Zealand Privacy Commission, a government organization that is tasked with setting policies to ensure citizens of New Zealand remain secure when it comes to the use of their private information...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Website Security

November 08, 2012

So websites – even really large ones have some serious security flaws and it’s disturbing. Yet they don’t seem to care much. Guys like Troy Hunt are doing a great job bringing these issues to light. In this video Girl Cynic and I ponder over some of these issues...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

How to Become an Infosec Rock Star

September 20, 2012

I teamed up with the infamous Space Rogue to finally reveal the secrets "they" didn't want you to know - that's right, we break down how you can become an Infosec Rockstar...

Comments  (1)

Bd07d58f0d31d48d3764821d109bf165

Utilizing Network Security Solutions: A Customer’s Perspective

August 16, 2012

Anyone can go research IT companies and make decisions based solely on what they read, but this is not how people make decisions. People interested in buying a product or service want to know if it will work, how well it has worked in the past, and if current customers are happy with the product or service...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Translating Security for the Non-Technical Folks

August 15, 2012

To provide more effective data protection that combines preventive and detective controls, a security admin can obtain the necessary technical information to create reports and dashboards that translate data into terms the business understands to make information security visible, measurable and accountable...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Fighting Threats in the Age of Cyberwar

August 14, 2012

ICSA Labs Chief Emerging Threat Researcher Roger Thompson discusses security challenges in the face of ever-evolving cyber threats in the wild. Thompson is a pioneer in combating malware. In 1987, he created Australia’s first anti-virus program after recognizing a trend in malware lifecycles...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

When to Strike Back: Mitigative and Retributive Counterstriking

August 10, 2012

Our information and cyber security perimeters and infrastructures are battered daily by scores of probes, scans, and attacks. We stand in defensive posture ducking, bobbing and weaving as we try to avoid the offensive onslaught. It is a losing proposition. Isn't it time we started striking back?

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu

August 06, 2012

Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Vegas, BlackHat, BSidesLV and DefCon: The Video

August 02, 2012

Javvad takes us on a whirlwind video tour of Vegas, BlackHat, BSidesLV and DefCon. You will see a lot of familiar faces in characteristically compromising situations. Remember, if you can't keep it in Vegas, try to only share the small details...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Slide Rules - The Video...

July 24, 2012

I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

What is Cross-Site Scripting?

July 19, 2012

In a XSS attack, JavaScript might steal session credentials, capture keystrokes or iterate across every form on a page and replace every action so that instead of submitting your username and password to the real application, the JavaScript causes your username and password to be sent to the attacker...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Growing Responsibilities of a CISO

July 13, 2012

Phil Cracknell, Global Head of Security and Compliance at Yell Group, talks to us about the challenges of a CISO. Video taken at Information Security Europe 2012...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec: English - Do You Speak it?

June 29, 2012

Seeing as so many people (well OK, two people) were asking me about my BSides London talk, I thought that rather than just send the link to the video, I’ll embed it here so I can say a few words about it too... Uhm, this is my talk...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec and Business Speak

June 22, 2012

Information Security folk aren’t much different than people in other careers. When we get together and talk amongst ourselves, it can sound like a foreign language. But do we remember to revert back to normal language when we speak to non-security people?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Video: On the Recent Password Breaches

June 16, 2012

LinkedIn, LastFM and eHarmony all suffered major password database breaches recently. But really, with so many breaches happening, did anyone even notice?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

PCI DSS and Compliance: Just a Tick Box Exercise?

June 13, 2012

According to Neira Jones, Head of Payment Security at Barclaycard, compliance should be a natural byproduct of good risk management and information security practice...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »