Videos Tagged with "Network Security"

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Amol Sarwate on SCADA Security Challenges

February 27, 2012

Amol Sarwate examined how SCADA security and advance persistent threats have now taken center stage. While the industry has some success in dealing with IT security, when it comes to industrial control systems or SCADA systems, it still has enormous challenges...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Forgotten Passwords and Security

February 03, 2012

What do you do when a user forgets their password? There are a number of different approaches that can be taken. The challenge when allowing a user to self-service is that you could potentially open up a number of avenues for attack...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Security Onion Intrusion Detection System Setup Tutorial

January 25, 2012

Run this on a system that has two network cards and you have a complete NSM/IDS. One NIC connects to your network or internet side of your traffic and monitors every packet, the second NIC connects to your LAN side and can be used to remotely view and monitor intrusion attempts...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Do Not Encrypt Passwords - Why, You Ask?

January 12, 2012

Encrypting passwords is bad. Try hashing them with a little bit of salt on top. Confused about the terminology - maybe i can clear your confusion with the use of a shoe, a box and a pen & paper...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

On Input Validation

December 29, 2011

Input validation is a good security principle based on your application looking at what’s being asked of it and deal in a secure manner. It’s not always fool proof, but goes a long way...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cybersecurity in Waste Water and Water Control Systems

December 14, 2011

The first of a monthly webinar series on Industrial Control System (ICS) Cybersecurity is now available for review in this video. This session provides insight for those interested in ICS Cybersecurity including policy makers, asset owners, vendors, consultants and integrators....

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Santa Gets Hacked - Naughty List Leaked (video)

December 09, 2011

Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...

Comments  (3)

924ce315203c17e05d9e04b59648a942

Next Generation Firewalls vs UTM

May 04, 2011

Network security is primarily gateway security: the firewall. What about IPS? What about access control? What about URL content filtering and network anti-malware? Aren’t those separate products, categories, industries? NO, those are features in the gateway security product...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Beaconing Detection: A Required Defense

April 13, 2011

One of the hottest areas in network security is beaconing detection - from Ghost Net and and Night Dragon to attacks on the Pentagon, Google, and RSA. Once a desktop or server is infected it “phones home” for additional downloads, instructions, and ultimately to exfiltrate stolen data...

Comments  (0)

Page « < 1 - 2 > »