Videos Tagged with "Network Security"


BSidesSF: Amol Sarwate on SCADA Security Challenges

February 27, 2012

Amol Sarwate examined how SCADA security and advance persistent threats have now taken center stage. While the industry has some success in dealing with IT security, when it comes to industrial control systems or SCADA systems, it still has enormous challenges...

Comments  (0)


On Forgotten Passwords and Security

February 03, 2012

What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...

Comments  (0)


Security Onion Intrusion Detection System Setup Tutorial

January 25, 2012

Run this on a system that has two network cards and you have a complete NSM/IDS. One NIC connects to your network or internet side of your traffic and monitors every packet, the second NIC connects to your LAN side and can be used to remotely view and monitor intrusion attempts...

Comments  (2)


Do Not Encrypt Passwords - Why, You Ask?

January 12, 2012

Encrypting passwords is bad. Try hashing them with a little bit of salt on top. Confused about the terminology - maybe i can clear your confusion with the use of a shoe, a box and a pen & paper...

Comments  (2)


On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)


Cybersecurity in Waste Water and Water Control Systems

December 14, 2011

The first of a monthly webinar series on Industrial Control System (ICS) Cybersecurity is now available for review in this video. This session provides insight for those interested in ICS Cybersecurity including policy makers, asset owners, vendors, consultants and integrators....

Comments  (0)


Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)


Next Generation Firewalls vs UTM

May 04, 2011

Network security is primarily gateway security: the firewall. What about IPS? What about access control? What about URL content filtering and network anti-malware? Aren’t those separate products, categories, industries? NO, those are features in the gateway security product...

Comments  (1)


Beaconing Detection: A Required Defense

April 13, 2011

One of the hottest areas in network security is beaconing detection - from Ghost Net and and Night Dragon to attacks on the Pentagon, Google, and RSA. Once a desktop or server is infected it “phones home” for additional downloads, instructions, and ultimately to exfiltrate stolen data...

Comments  (0)

Page « < 1 - 2 > »