Latest Videos
BSidesSF: Dominique Karg on the AlienVault Open Source Model
February 28, 2012
Dominique Karg, Co-Founder and Chief Hacking Officer for AlienVault, took some time to discuss the many myths around open source architecture, the inherent benefits and problems, and why AlienVault ultimately decided to go with the open source model...
Comments (0)
BSidesSF: Marcia Hofmann on Security Research and the Law
February 28, 2012
Marcia Hofmann was a panelist at the Security BSides San Francisco event along with other attorneys from the Electronic Frontier Foundation. Marcia took a few minutes to discuss precautions security researchers need to take from a legal perspective...
Comments (0)
BSidesSF: Will Tarkington on Human Hacking Techniques
February 28, 2012
Will Tarkington presented an overview of the common techniques used by con men, psychics, spiritualists, and salesmen. The talk covered a wide range of cold, warm, subtle expressions, Barnum statements, selective memory, and body language...
Comments (0)
BSidesSF: Mike Dahn Discusses Everything Security BSides
February 28, 2012
Michael Dahn is one of the founders of Security BSides, a series of security community events born out of the rejections to the Call For Papers for Black Hat USA 2009. Each BSides is a community-driven framework for and by information security community members...
Comments (0)
BSidesSF: Dr. Mike Lloyd on Measuring Security Effectiveness
February 28, 2012
In his thought-provoking presentation at Security BSides SFO, Dr. Mike Lloyd - CTO at RedSeal Networks described methods for building an enterprise security metrics program that’s completely different from the current model of counting vulnerabilities or patches applied...
Comments (1)
BSidesSF: Amol Sarwate on SCADA Security Challenges
February 27, 2012
Amol Sarwate examined how SCADA security and advance persistent threats have now taken center stage. While the industry has some success in dealing with IT security, when it comes to industrial control systems or SCADA systems, it still has enormous challenges...
Comments (0)
Infosec Island's Javvad Malik and Black Hat Europe 2012
February 19, 2012
Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...
Comments (0)
Auditor IV: The Card Data Breach
February 17, 2012
When the unthinkable happens to a company, there's only one person they need to get to the bottom of the matter. The Auditor is back, but this time it's different...
Comments (0)
Javvad Malik on Risk Management
February 10, 2012
A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...
Comments (0)
Boston Police Offer Levity in Wake of Anonymous Hack
February 09, 2012
The Boston Police Department's Media Relation arm has produced a somewhat whimsical video response to the attack of their official website that occurred late last week. The department's website had been hacked and defaced by sympathizers of the rogue movement Anonymous...
Comments (6)
Introduction to Bro Network Security Monitor
February 08, 2012
Great intro video to the Bro Security Network Analysis Framework by Richard Bejtlich. Bro is an amazing tool that gives you a summary of what is going on in your network. It creates text log files of connections, protocols, communications, and what it sees on the wire...
Comments (0)
Straight Talk on Cloud Computing for the Enterprise
February 06, 2012
One of the fantastic things about events like this is that real people show up to listen, learn and share with their fellow attendees, and that's absolutely amazing. We managed to bring together some industry experts with vast practical knowledge on cloud computing...
Comments (0)
Video: Anonymous Claims Hack of FBI Conference Call
February 03, 2012
"The conversation covers tracking of Anonymous and other splinter groups, dates of planned arrests and details of evidence held by police. Anonymous also published an email from the FBI, showing the email addresses of call participants. The FBI confirmed the intercept..."
Comments (0)
On Forgotten Passwords and Security
February 03, 2012
What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...
Comments (0)
The Importance of Online Safety
January 28, 2012
Taking on the topic of not trusting people online, I thought it would be a good idea to make a PSA style video. Like most of my video’s, it turned out different than I initially envisioned it to be, and hence it’s a lot darker and more serious than my previous offerings...
Comments (0)
Interview with ISMP Founder Marisa Fagan on SECore
January 27, 2012
Marisa Fagan, the founder of the InfoSec Mentors Project - "a non-profit project that builds a more collaborative and friendly environment for newbies in information security" - kindly dropped by from across the pond to talk about SECore.info...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization