Videos Tagged with "Enterprise Security"
September 24, 2012
Attackers take advantage of any externally facing web application. If you think about a web application is not mission because it’s not touching data and if there is a SQL Injection vulnerability that exists in there attackers can use that to gain a foothold inside the network...
July 31, 2012
Former White House Cybersecurity Coordinator Howard Schmidt offers his opinions on the issues surrounding the strengthening of the relationship between government and the private sector, as well as the urgent need for the passage of effective cybersecurity legislation...
July 24, 2012
I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...
June 22, 2012
Information Security folk aren’t much different than people in other careers. When we get together and talk amongst ourselves, it can sound like a foreign language. But do we remember to revert back to normal language when we speak to non-security people?
May 07, 2012
Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...
April 30, 2012
At Black Hat Europe 2012, we asked the experts for their views on the importance of user security awareness training and what the common issues are with such initiatives. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
April 27, 2012
Javvad Malik caught up with Rahul Sasi at Black Hat Europe 2012 to learn about securing automated enterprise communications systems and applications against sophisticated hacking attack techniques. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...
March 30, 2012
"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."
March 23, 2012
We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”
March 02, 2012
Rafal Los is the Chief Security Evangelist for HP Software and took a few minutes to discuss challenges associated with Enterprise Network Security. He works with customers, the industry, and the community on effectively bringing business and technology together securely...
Mobile Security: Tips for Using Personal Dev... sikawai duluan on 08-20-2014
Security Risks of Telecommuting... Marek Hudczak on 08-18-2014