Videos Tagged with "Video"
Security and Privacy in a Connected and Cloudy World
November 29, 2012
A few months ago, I was invited to present at a summit organized by the New Zealand Privacy Commission, a government organization that is tasked with setting policies to ensure citizens of New Zealand remain secure when it comes to the use of their private information...
Comments (2)
On Website Security
November 08, 2012
So websites – even really large ones have some serious security flaws and it’s disturbing. Yet they don’t seem to care much. Guys like Troy Hunt are doing a great job bringing these issues to light. In this video Girl Cynic and I ponder over some of these issues...
Comments (0)
How to Become an Infosec Rock Star
September 20, 2012
I teamed up with the infamous Space Rogue to finally reveal the secrets "they" didn't want you to know - that's right, we break down how you can become an Infosec Rockstar...
Comments (1)
Utilizing Network Security Solutions: A Customer’s Perspective
August 16, 2012
Anyone can go research IT companies and make decisions based solely on what they read, but this is not how people make decisions. People interested in buying a product or service want to know if it will work, how well it has worked in the past, and if current customers are happy with the product or service...
Comments (0)
Translating Security for the Non-Technical Folks
August 15, 2012
To provide more effective data protection that combines preventive and detective controls, a security admin can obtain the necessary technical information to create reports and dashboards that translate data into terms the business understands to make information security visible, measurable and accountable...
Comments (0)
Fighting Threats in the Age of Cyberwar
August 14, 2012
ICSA Labs Chief Emerging Threat Researcher Roger Thompson discusses security challenges in the face of ever-evolving cyber threats in the wild. Thompson is a pioneer in combating malware. In 1987, he created Australia’s first anti-virus program after recognizing a trend in malware lifecycles...
Comments (0)
When to Strike Back: Mitigative and Retributive Counterstriking
August 10, 2012
Our information and cyber security perimeters and infrastructures are battered daily by scores of probes, scans, and attacks. We stand in defensive posture ducking, bobbing and weaving as we try to avoid the offensive onslaught. It is a losing proposition. Isn't it time we started striking back?
Comments (0)
What it Takes to Create Intelligence for a Stuxnet, Flame or Duqu
August 06, 2012
Stuxnet, Flame, Duqu and Mahdi are but payloads of overall programs designed through the work of intelligence. The news, anti-virus firms, managed security companies and consultancies all focus on the malware and the code. They are missing the big picture...
Comments (0)
Vegas, BlackHat, BSidesLV and DefCon: The Video
August 02, 2012
Javvad takes us on a whirlwind video tour of Vegas, BlackHat, BSidesLV and DefCon. You will see a lot of familiar faces in characteristically compromising situations. Remember, if you can't keep it in Vegas, try to only share the small details...
Comments (0)
Security Slide Rules - The Video...
July 24, 2012
I read this blog post on Slide Rules by Wendy Nather and immediately dropped her a note asking for permission to convert it into a video. After a huge battle with 20th Century Fox over rights to film I won... well at least that’s how I imagine it to have happened...
Comments (0)
What is Cross-Site Scripting?
July 19, 2012
In a XSS attack, JavaScript might steal session credentials, capture keystrokes or iterate across every form on a page and replace every action so that instead of submitting your username and password to the real application, the JavaScript causes your username and password to be sent to the attacker...
Comments (0)
The Growing Responsibilities of a CISO
July 13, 2012
Phil Cracknell, Global Head of Security and Compliance at Yell Group, talks to us about the challenges of a CISO. Video taken at Information Security Europe 2012...
Comments (0)
Infosec: English - Do You Speak it?
June 29, 2012
Seeing as so many people (well OK, two people) were asking me about my BSides London talk, I thought that rather than just send the link to the video, I’ll embed it here so I can say a few words about it too... Uhm, this is my talk...
Comments (0)
Infosec and Business Speak
June 22, 2012
Information Security folk aren’t much different than people in other careers. When we get together and talk amongst ourselves, it can sound like a foreign language. But do we remember to revert back to normal language when we speak to non-security people?
Comments (0)
Video: On the Recent Password Breaches
June 16, 2012
LinkedIn, LastFM and eHarmony all suffered major password database breaches recently. But really, with so many breaches happening, did anyone even notice?
Comments (0)
PCI DSS and Compliance: Just a Tick Box Exercise?
June 13, 2012
According to Neira Jones, Head of Payment Security at Barclaycard, compliance should be a natural byproduct of good risk management and information security practice...
Comments (0)
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider
- SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020