Latest Videos

6d117b57d55f63febe392e40a478011f

Hacker Halted: McAfee's George Kurtz Discusses the War on Security

October 31, 2011

"The current cybersecurity model is disconnected and unable to keep pace with the seismic explosion in malware. Providing protection to a heterogeneous world of connected devices requires a new approach to security. McAfee CTO George Kurtz will explain the required paradigm shift..."

Comments  (1)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Jeff Bardin on the Cyber Intelligence Cycle

October 30, 2011

"Criminals and nation-states have adopted traditional physical intelligence techniques for the cyber world. Jeff Bardin examines various CYBINT and OSINT methods, information mining of social networking sites and the tools in use for gathering information on targets of opportunity...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted Miami: EC Council's Jay Bavisi

October 27, 2011

Jay Bavisi is the Co-Founder and President of EC-Council, a global Leader in Information Security Education, Training, and Certification. With 27 Infosec facing certifications, ECC's interest is in supporting the global need for Security Certified Professionals in the realm of Ethical Hacking...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted Miami: Qualys CTO Wolfgang Kandek on APTs

October 25, 2011

The term, "Advanced Persistent Threats" gives the impression that most organizations are not equipped to deal with sophisticated attacks. Wolfgang Kandek's Hacker Halted keynote exposes the reality behind the causes of these threats and makes the case for a new security model...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Benefits of Being a CISSP

October 24, 2011

Some people think a CISSP is a run-of-the-mill security certification... but it isn't. If you know how to use it to your benefit. You can wield unlimited power...

Comments  (6)

6d117b57d55f63febe392e40a478011f

Rafal Los Tapped as HP's Cloud Security Strategist

September 29, 2011

Hewlett-Packard's Software division has tapped Infosec Island contributor Rafal Los for the position of Enterprise and Cloud Security Strategist. Los combines over a decade of deep technical expertise in information security and risk management with a critical business perspective...

Comments  (2)

850c7a8a30fa40cf01a9db756b49155a

Reverse Engineering the RSA Malware Attack

September 08, 2011

In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. In this video, security expert J. Oquendo attempts to reverse engineer the attack using open source forensics tools...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Will Bechtel - Product Manager - Qualys

August 24, 2011

The demands on companies and government to protect networks from exploits that threaten the security of proprietary information have skyrocketed. The dependence on IT systems increased for nearly every business, and so have the financial motivations of criminals...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Rainer Enders - CTO - NCP Engineering

August 23, 2011

Rainer Enders is the CTO at NCP Engineering, and is interested in solving security related issues on all levels of data transfer and communication. NCP engineering delivers software that allows enterprises to rethink their secure remote access and overcome the network complexities...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Alex Quilter - Product Manager - Qualys

August 22, 2011

Qualys is the only security company that delivers these solutions through a single Software-as-a-Service platform: QualysGuard'. All of Qualys' on demand solutions can be deployed within hours anywhere around the globe, providing customers an immediate view of their security and compliance posture...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Tom Eston - Secure State Consultant

August 21, 2011

Tom Eston is a senior security consultant with Secure State, who's focus is in research on the security of social media and privacy. Tom wrote the popular "Facebook Privacy & Security Guide" which is used for awareness training at several universities and government organizations...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Robb Reck - Infosec Expert

August 18, 2011

Robb is a frequent contributor to Infosec Island, and is an experienced Information Security manager in the finance sector. Robb has over 13 years in IT security with proven experience creating and implementing security policy in small and large organizations...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Alexander Polyakov - CTO - ERPScan

August 18, 2011

Alexander Polyakov is the CTO at ERPScan, the OWASP-EAS manager for the OWASP-EAS, and a well-known security expert on enterprise applications such as SAP and Oracle, and who published a significant number of the vulnerabilities found in the applications of these vendors...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Nabil Ouchn - CTO at NETpeas

August 17, 2011

Nabil Ouchn is the co-founder and CTO at NETpeas and the creator of Security Tools Watch. Nabil has over 10 years of experience in IT security assessment, vulnerability management and IS risk analysis driving security pentests and ethical hacking audits...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Mark Boltz - Solutions Architect - Stonesoft

August 17, 2011

Mark Boltz is the senior solutions architect at Stonesoft, a CISSP and an innovator in business continuity and network security solutions. Mark has more than twenty years experience in information systems and network administration, with more than twelve years specialization in information security...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Theresa Payton - CEO - Fortalice

August 16, 2011

Theresa Payton is the Chief Advisor and CEO of Fortalice, and has over twenty years of business and technology leadership experience. From May 2006 until September 2008, Theresa worked for the Bush Administration as the White House Chief Information Officer, the first woman to hold this position...

Comments  (1)


« First < Previous  | 5 - 6 - 7 - 8 - 9 |   Next > Last »