Latest Videos

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Dominique Karg on the AlienVault Open Source Model

February 28, 2012

Dominique Karg, Co-Founder and Chief Hacking Officer for AlienVault, took some time to discuss the many myths around open source architecture, the inherent benefits and problems, and why AlienVault ultimately decided to go with the open source model...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Marcia Hofmann on Security Research and the Law

February 28, 2012

Marcia Hofmann was a panelist at the Security BSides San Francisco event along with other attorneys from the Electronic Frontier Foundation. Marcia took a few minutes to discuss precautions security researchers need to take from a legal perspective...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Will Tarkington on Human Hacking Techniques

February 28, 2012

Will Tarkington presented an overview of the common techniques used by con men, psychics, spiritualists, and salesmen. The talk covered a wide range of cold, warm, subtle expressions, Barnum statements, selective memory, and body language...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Mike Dahn Discusses Everything Security BSides

February 28, 2012

Michael Dahn is one of the founders of Security BSides, a series of security community events born out of the rejections to the Call For Papers for Black Hat USA 2009. Each BSides is a community-driven framework for and by information security community members...

Comments  (0)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Dr. Mike Lloyd on Measuring Security Effectiveness

February 28, 2012

In his thought-provoking presentation at Security BSides SFO, Dr. Mike Lloyd - CTO at RedSeal Networks described methods for building an enterprise security metrics program that’s completely different from the current model of counting vulnerabilities or patches applied...

Comments  (1)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Amol Sarwate on SCADA Security Challenges

February 27, 2012

Amol Sarwate examined how SCADA security and advance persistent threats have now taken center stage. While the industry has some success in dealing with IT security, when it comes to industrial control systems or SCADA systems, it still has enormous challenges...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Javvad Malik and Black Hat Europe 2012

February 19, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Auditor IV: The Card Data Breach

February 17, 2012

When the unthinkable happens to a company, there's only one person they need to get to the bottom of the matter. The Auditor is back, but this time it's different...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Risk Management

February 10, 2012

A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Boston Police Offer Levity in Wake of Anonymous Hack

February 09, 2012

The Boston Police Department's Media Relation arm has produced a somewhat whimsical video response to the attack of their official website that occurred late last week. The department's website had been hacked and defaced by sympathizers of the rogue movement Anonymous...

Comments  (6)

B64e021126c832bb29ec9fa988155eaf

Introduction to Bro Network Security Monitor

February 08, 2012

Great intro video to the Bro Security Network Analysis Framework by Richard Bejtlich. Bro is an amazing tool that gives you a summary of what is going on in your network. It creates text log files of connections, protocols, communications, and what it sees on the wire...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Straight Talk on Cloud Computing for the Enterprise

February 06, 2012

One of the fantastic things about events like this is that real people show up to listen, learn and share with their fellow attendees, and that's absolutely amazing. We managed to bring together some industry experts with vast practical knowledge on cloud computing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Video: Anonymous Claims Hack of FBI Conference Call

February 03, 2012

"The conversation covers tracking of Anonymous and other splinter groups, dates of planned arrests and details of evidence held by police. Anonymous also published an email from the FBI, showing the email addresses of call participants. The FBI confirmed the intercept..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Forgotten Passwords and Security

February 03, 2012

What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Importance of Online Safety

January 28, 2012

Taking on the topic of not trusting people online, I thought it would be a good idea to make a PSA style video. Like most of my video’s, it turned out different than I initially envisioned it to be, and hence it’s a lot darker and more serious than my previous offerings...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Interview with ISMP Founder Marisa Fagan on SECore

January 27, 2012

Marisa Fagan, the founder of the InfoSec Mentors Project - "a non-profit project that builds a more collaborative and friendly environment for newbies in information security" - kindly dropped by from across the pond to talk about SECore.info...

Comments  (0)


« First < Previous  | 3 - 4 - 5 - 6 - 7 |   Next > Last »