Latest Videos

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Chris Blask of AlienVault

August 15, 2011

Chris Blask is the VP of the Industrial Control Systems Group at AlienVault. He has been involved in the information security industry for twenty years. He also invented one of the first commercial firewall products, the BorderWare Firewall Server, and is on the faculty at IANS...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Rodrigo Branco - Vulnerability Research - Qualys

August 14, 2011

Rodrigo Branco is the Vulnerability and Malware Research Director for Qualys, the leading provider of on demand IT security risk and compliance solutions. Qualys enables organizations to easily and cost-effectively ensure that their business technology systems remain highly secure...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Aaron Bryson - Security Engineer - Cisco

August 11, 2011

Aaron Bryson is a Senior Security Engineer for Cisco, with experience in computer, network, and information security in large corporate environments. Cisco offerings are used to create Internet solutions that make networks possible, providing access to information anywhere at any time...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Ivan Ristic - Director of Engineering - Qualys

August 10, 2011

Ivan Ristic is the Director of Engineering at Qualys, and is a respected security expert and book author, known especially for his contribution to the web application firewall field and the development of ModSecurity, the open source web application firewall. He is the author of Apache Security...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Interview with Dan Kaminsky

August 10, 2011

Dan Kaminsky has been a noted security researcher for over a decade, and has spent his career advising Fortune 500 companies. Dan is best known for his work finding a critical flaw in the Internet’s DNS, and for leading the largest synchronized fix to the Internet’s infrastructure of all time...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Wolfgang Kandek - CTO - Qualys

August 09, 2011

As the CTO for Qualys, Wolfgang is responsible for product direction and all operational aspects of the QualysGuard platform. Wolfgang has over 20 years of experience in developing and managing information systems, Unix-based server architectures and application delivery through the Internet...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Jeff Hudson - CEO - Venafi

August 09, 2011

While encryption was once used almost exclusively to protect information using SSL certificates and symmetric and asymmetric keys to scramble data, now it is also used in authentication mechanisms to confirm the identity of a user or a device, and for digital signing to protect data...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat USA 2011: Josh Shaul - CTO - Application Security Inc

August 08, 2011

As the Chief Technology Officer with Application Security, Inc. (AppSec), Josh Shaul is responsible for the direction of the technical strategy, which includes the product portfolio - AppDetectivePro for auditors and IT advisors, and its flagship solution DbProtect for the enterprise...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat 2011 USA: Phillipe Courtot - CEO - Qualys

August 08, 2011

Black Hat USA Interview: Demonstrating a unique mix of technical vision, marketing and business acumen, Philippe Courtot has repeatedly built innovative companies into industry leaders. As CEO of Qualys, Philippe has worked with companies to improve their IT security and compliance postures...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Black Hat's Technical Director Travis Carelock

August 03, 2011

Travis Carelock is the Technical Director for the Black Hat USA 2011 Conference, taking place this year in Las Vegas, Nevada. Travis talks about some of the technical challenges his team ran into this year, including a fire alarm during the first keynote address by Cofer Black...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Spear Phishing Scams Hook Victims

July 04, 2011

2011 has been the year of the data breach. With what seems like a new report of a data breach each day, scams are on the rise. Identity Theft 911 Founder and Chairman Adam Levin talks to ABC about what consumers should do to protect themselves...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Don't Black List White Listing

June 22, 2011

As AV vendors struggle to keep up they too are looking at white listing too. The trend is toward a hybrid model with white listing doing the heavy lifting to protect end points from zero-day and uniquely fabricated malware and black listing to provide reports...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Modern Malware Defense

May 25, 2011

Ashar Aziz, founder of FireEye, recognized early on that malware, zero day threats, and drive by downloads could slip by defenses that most organizations have deployed. He built the technology to take executables off the wire and run them in a mini-cloud of virtual emulators...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Granular Application Control Drives Next Gen Firewalls

May 18, 2011

Web apps in particular have become a nightmare for IT staff. Should users be allowed to use Twitter, URL shorteners like bit.ly or ur1.ca, or even Facebook? And if they do what should they be allowed to do within the app? Posting updates is one thing. Playing Mafia Wars is another...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Next Generation Firewalls vs UTM

May 04, 2011

Network security is primarily gateway security: the firewall. What about IPS? What about access control? What about URL content filtering and network anti-malware? Aren’t those separate products, categories, industries? NO, those are features in the gateway security product...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Beaconing Detection: A Required Defense

April 13, 2011

One of the hottest areas in network security is beaconing detection - from Ghost Net and and Night Dragon to attacks on the Pentagon, Google, and RSA. Once a desktop or server is infected it “phones home” for additional downloads, instructions, and ultimately to exfiltrate stolen data...

Comments  (0)


« First < Previous  | 6 - 7 - 8 - 9 - 10 |   Next > Last »