Videos Tagged with "Enterprise Security"

68b48711426f3b082ab24e5746a66b36

Video: Do I Have to Secure All My Applications?

September 24, 2012

Attackers take advantage of any externally facing web application. If you think about a web application is not mission because it’s not touching data and if there is a SQL Injection vulnerability that exists in there attackers can use that to gain a foothold inside the network...

Comments  (0)

6d117b57d55f63febe392e40a478011f

BlackHat 2012: Howard Schmidt on Public-Private Partnership

July 31, 2012

Former White House Cybersecurity Coordinator Howard Schmidt offers his opinions on the issues surrounding the strengthening of the relationship between government and the private sector, as well as the urgent need for the passage of effective cybersecurity legislation...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Slide Rules - The Video...

July 24, 2012

I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Growing Responsibilities of a CISO

July 13, 2012

Phil Cracknell, Global Head of Security and Compliance at Yell Group, talks to us about the challenges of a CISO. Video taken at Information Security Europe 2012...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec: English - Do You Speak it?

June 29, 2012

Seeing as so many people (well OK, two people) were asking me about my BSides London talk, I thought that rather than just send the link to the video, I’ll embed it here so I can say a few words about it too... Uhm, this is my talk...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec and Business Speak

June 22, 2012

Information Security folk aren’t much different than people in other careers. When we get together and talk amongst ourselves, it can sound like a foreign language. But do we remember to revert back to normal language when we speak to non-security people?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

PCI DSS and Compliance: Just a Tick Box Exercise?

June 13, 2012

According to Neira Jones, Head of Payment Security at Barclaycard, compliance should be a natural byproduct of good risk management and information security practice...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Awareness Training for Employees

June 07, 2012

Security awareness training can be a bit dull and boring, so we commonly try to come up with ways on how to make it a more engaging topic for our audience. But do we end up patronizing them with gimmicks and child-like messages?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Proper System Hardening

May 16, 2012

When a system or device has been properly hardened, all unnecessary bells and whistles are turned off, disabled, or simply ripped out, leaving only the bare minimum needed to run the service. This creates a much smaller surface area to attack...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISA President Larry Clinton Discusses Cybersecurity Legislation

May 07, 2012

Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Experts Talk Security Awareness: Black Hat EU 2012 Finale

April 30, 2012

At Black Hat Europe 2012, we asked the experts for their views on the importance of user security awareness training and what the common issues are with such initiatives. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Securing Enterprise Communications Systems and Applications

April 27, 2012

Javvad Malik caught up with Rahul Sasi at Black Hat Europe 2012 to learn about securing automated enterprise communications systems and applications against sophisticated hacking attack techniques. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Video: FBI's Top Cyber Official Discusses Threats

March 30, 2012

"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Infosec Mistakes

March 23, 2012

We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: HP's Rafal Los on Network Security Challenges

March 02, 2012

Rafal Los is the Chief Security Evangelist for HP Software and took a few minutes to discuss challenges associated with Enterprise Network Security. He works with customers, the industry, and the community on effectively bringing business and technology together securely...

Comments  (1)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Josh Shaul on Security and Hacktivism

March 01, 2012

Josh Shaul, CTO for Application Security, Inc., took a few minutes out of his schedule at the BSides San Francisco event to discuss security issues and the mounting threats posed by hacktivist activities...

Comments  (0)

Page « < 1 - 2 > »