Videos Tagged with "Humor"

99edc1997453f90eb5ac1430fd9a7c61

On Website Security

November 08, 2012

So websites – even really large ones have some serious security flaws and it’s disturbing. Yet they don’t seem to care much. Guys like Troy Hunt are doing a great job bringing these issues to light. In this video Girl Cynic and I ponder over some of these issues...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

How to Become an Infosec Rock Star

September 20, 2012

I teamed up with the infamous Space Rogue to finally reveal the secrets "they" didn't want you to know - that's right, we break down how you can become an Infosec Rockstar...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Vegas, BlackHat, BSidesLV and DefCon: The Video

August 02, 2012

Javvad takes us on a whirlwind video tour of Vegas, BlackHat, BSidesLV and DefCon. You will see a lot of familiar faces in characteristically compromising situations. Remember, if you can't keep it in Vegas, try to only share the small details...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Slide Rules - The Video...

July 24, 2012

I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec and Business Speak

June 22, 2012

Information Security folk aren’t much different than people in other careers. When we get together and talk amongst ourselves, it can sound like a foreign language. But do we remember to revert back to normal language when we speak to non-security people?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Awareness Training for Employees

June 07, 2012

Security awareness training can be a bit dull and boring, so we commonly try to come up with ways on how to make it a more engaging topic for our audience. But do we end up patronizing them with gimmicks and child-like messages?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Incident Management

May 23, 2012

When you’re faced with an incident what do you do? Do you even realise there’s an incident? Do you ignore it? Or do you hide under the covers? All these things happen and usually the best laid plans usually end up in the bin when an incident does strike. How can one prevent this?

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

How Do I Learn More about Infosec?

April 05, 2012

A lot of people who are new in the field of infosec ask how they can learn and develop their skills more. So, to answer this common question, I present my favourite free (or inexpensive) ways that you can learn more. Including mentoring. What else do you need?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Guide to Surviving Black Hat Europe

March 24, 2012

Whilst at Black Hat Europe 2012, I realized that this was the first big conference many had attended, so thought it would be useful for others to create this short guide on how to survive black hat - courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Infosec Mistakes

March 23, 2012

We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

FBI and Coffee: How to Spot Suspicious Activity

March 03, 2012

According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Auditor IV: The Card Data Breach

February 17, 2012

When the unthinkable happens to a company, there's only one person they need to get to the bottom of the matter. The Auditor is back, but this time it's different...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Risk Management

February 10, 2012

A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Boston Police Offer Levity in Wake of Anonymous Hack

February 09, 2012

The Boston Police Department's Media Relation arm has produced a somewhat whimsical video response to the attack of their official website that occurred late last week. The department's website had been hacked and defaced by sympathizers of the rogue movement Anonymous...

Comments  (6)

99edc1997453f90eb5ac1430fd9a7c61

On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Passwords: Give Them the Respect They Deserve

December 16, 2011

Passwords are everywhere on the internet. You need them to log onto your banking, emails and a ton of other websites. They are extremely important, yet do we give them the respect they deserve?

Comments  (0)

Page « < 1 - 2 > »
Most Liked