Videos Tagged with "Security"

4c1c5119b03285e3f64bd83a8f9dfeec

Security and Privacy in a Connected and Cloudy World

November 29, 2012

A few months ago, I was invited to present at a summit organized by the New Zealand Privacy Commission, a government organization that is tasked with setting policies to ensure citizens of New Zealand remain secure when it comes to the use of their private information...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Security vs. Privacy

October 23, 2012

Security and privacy are sometimes used synonymously, at other times they are used as separate entities, and at other times they are used as co-dependent on each other. But what is the truth? I ended up having this discussion with Brian Honan whilst at RSA Europe and he explained his point of view...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

How to Become an Infosec Rock Star

September 20, 2012

I teamed up with the infamous Space Rogue to finally reveal the secrets "they" didn't want you to know - that's right, we break down how you can become an Infosec Rockstar...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Vegas, BlackHat, BSidesLV and DefCon: The Video

August 02, 2012

Javvad takes us on a whirlwind video tour of Vegas, BlackHat, BSidesLV and DefCon. You will see a lot of familiar faces in characteristically compromising situations. Remember, if you can't keep it in Vegas, try to only share the small details...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Guess Who's Not going to Black Hat Europe 2012

March 05, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

FBI and Coffee: How to Spot Suspicious Activity

March 03, 2012

According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Mike Dahn Discusses Everything Security BSides

February 28, 2012

Michael Dahn is one of the founders of Security BSides, a series of security community events born out of the rejections to the Call For Papers for Black Hat USA 2009. Each BSides is a community-driven framework for and by information security community members...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Javvad Malik and Black Hat Europe 2012

February 19, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Importance of Online Safety

January 28, 2012

Taking on the topic of not trusting people online, I thought it would be a good idea to make a PSA style video. Like most of my video’s, it turned out different than I initially envisioned it to be, and hence it’s a lot darker and more serious than my previous offerings...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

A Look at Infosec Island

December 18, 2011

Rather than giving a security roundup or predicting future security trends for 2012, I thought it a good idea to look at some of the security bloggers over at Infosec Island over the course of the year...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Conference Director Leonard Chin

November 08, 2011

Leonard was instrumental in the conceptualization and organization of EC-Council's first Hacker Halted Conference in the United States in 2008 and has been the conference director for this conference series since then. From Myrtle Beach in 2008, he brought the event to Miami...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Jeremiah Grossman on Hacking Websites

November 06, 2011

"Fundamentally the answer to the software security question can be found through metrics. By carefully tracking and analyzing metrics, very particular key performance indicators (KPIs), an organization can determine where resources would be best invested..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Mike Dahn and Martin McKeay on Compliance in the Cloud

November 03, 2011

"Your management fears the auditors more than the hackers. So why is it they're looking at moving cardholder data so quickly? Because 'cloud computing' is the new marketing buzzword that promises to do everything..."

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Charlie Miller on Battery Firmware Hacking

November 02, 2011

Researchers are only recently considering the security implications of multiple processors, multiple pieces of embedded memory, etc. Dr. Charlie Miller, principal research consultant for Accuvant and four time Pwn2Own winner, discusses Battery Firmware Hacking at the Hacker Halted Conference...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Will Bechtel - Product Manager - Qualys

August 24, 2011

The demands on companies and government to protect networks from exploits that threaten the security of proprietary information have skyrocketed. The dependence on IT systems increased for nearly every business, and so have the financial motivations of criminals...

Comments  (0)

Page « < 1 - 2 > »
Most Liked