Latest Videos

68b48711426f3b082ab24e5746a66b36

Video: Cyber Security for Smart Energy Systems

April 09, 2012

Chris Wysopal discusses why it is so important to the power grid to write secure code for software, how computer intrusion methods have changed in over past two decades, the impact of data breaches on modern organizations, and the necessity for thorough testing prior to launch...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Phil Polstra at Black Hat EU 2012

April 07, 2012

At Black Hat Europe, we had a chance to catch up with Phil Polstra to give us the low down on his pet USB projects and an interesting speaker timer on the side. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

How Do I Learn More about Infosec?

April 05, 2012

A lot of people who are new in the field of infosec ask how they can learn and develop their skills more. So, to answer this common question, I present my favourite free (or inexpensive) ways that you can learn more. Including mentoring. What else do you need?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Didier Stevens at Black Hat Europe

April 04, 2012

We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Video: FBI's Top Cyber Official Discusses Threats

March 30, 2012

"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

What Makes Black Hat Europe So Special?

March 29, 2012

Black Hat Europe is one of the premier security conferences. But what brings people back here year after year? We asked some of the attendees what makes black hat so special to them, courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Guide to Surviving Black Hat Europe

March 24, 2012

Whilst at Black Hat Europe 2012, I realized that this was the first big conference many had attended, so thought it would be useful for others to create this short guide on how to survive black hat - courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Infosec Mistakes

March 23, 2012

We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

IS Controls: Protective, Detective and Recovery

March 09, 2012

To manage risks better, you often have to recommend or examine controls. The types of controls can be broken down into three types, Protective, Detective and Recovery...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Guess Who's Not going to Black Hat Europe 2012

March 05, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

FBI and Coffee: How to Spot Suspicious Activity

March 03, 2012

According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: HP's Rafal Los on Network Security Challenges

March 02, 2012

Rafal Los is the Chief Security Evangelist for HP Software and took a few minutes to discuss challenges associated with Enterprise Network Security. He works with customers, the industry, and the community on effectively bringing business and technology together securely...

Comments  (1)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Lenny Zeltser on Infosec Recruitment

March 01, 2012

Lenny Zeltser and Lee Kushner presented at Security BSides San Francisco on elements of successful infosec interviewing and hiring from the perspective of both sides of the process: the candidate and the employer...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Josh Shaul on Security and Hacktivism

March 01, 2012

Josh Shaul, CTO for Application Security, Inc., took a few minutes out of his schedule at the BSides San Francisco event to discuss security issues and the mounting threats posed by hacktivist activities...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: AlienVault CTO Roger Thornton on Network Visibility

February 29, 2012

Roger Thornton, CTO at AlienVault, discusses the need for organizations to reduce the overall cost of network security visibility. He believes that technology is not the problem, but instead it is the time, money and staff needed for effective and meaningful visibility...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Sharing Threat Intelligence with AV-OTX

February 29, 2012

David Barroso and Jaime Blasco discuss the AlienVault Open Threat Exchange (AV-OTX) - a system for sharing intelligence among OSSIM users where an attack on any member alerts and arms the others with the timely intelligence required to manage a similar event...

Comments  (0)


« First < Previous  | 2 - 3 - 4 - 5 - 6 |   Next > Last »