Videos Tagged with "Infosec"
February 19, 2012
Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...
January 28, 2012
Taking on the topic of not trusting people online, I thought it would be a good idea to make a PSA style video. Like most of my video’s, it turned out different than I initially envisioned it to be, and hence it’s a lot darker and more serious than my previous offerings...
January 05, 2012
When performing malware analysis one of the techniques the bad guys uses to hide their code is obfuscation. What this means is that the program is hidden or obscured to make malware analysis much more difficult. You didn’t think they would make it easy on you did they?
December 09, 2011
Breaking News (video): Networks at the North Pole have been breached by unidentified hackers leading to the disclosure of sensitive data - Santa's naughty list. Don’t worry – your secrets are safe! Included is a list of the things we really think are just that - a little bit naughty...
November 28, 2011
Companies are cutting back on information security departments budgets. I have, however, come up with an ingenious plan by which security departments can keep their funding without costing the company any money whatsoever. I’m pretty sure no-one has come up with this idea before...
November 11, 2011
No longer are arms or industrial might the measure of a country’s superiority, it resides within the information it holds. So if you have information that needs protecting and nobody else can help, you know what to do... just use a suitable encryption algorithm to render it unreadable...
November 08, 2011
Leonard was instrumental in the conceptualization and organization of EC-Council's first Hacker Halted Conference in the United States in 2008 and has been the conference director for this conference series since then. From Myrtle Beach in 2008, he brought the event to Miami...
November 06, 2011
"Fundamentally the answer to the software security question can be found through metrics. By carefully tracking and analyzing metrics, very particular key performance indicators (KPIs), an organization can determine where resources would be best invested..."
November 03, 2011
"Your management fears the auditors more than the hackers. So why is it they're looking at moving cardholder data so quickly? Because 'cloud computing' is the new marketing buzzword that promises to do everything..."
November 02, 2011
Researchers are only recently considering the security implications of multiple processors, multiple pieces of embedded memory, etc. Dr. Charlie Miller, principal research consultant for Accuvant and four time Pwn2Own winner, discusses Battery Firmware Hacking at the Hacker Halted Conference...
November 01, 2011
An in-depth examination of the current problems with authenticity in SSL, some of the recent high-profile SSL infrastructure attacks in detail, and some strategies to definitively fix the disintegrating trust relationships at the core of this fundamental protocol...
October 31, 2011
"The current cybersecurity model is disconnected and unable to keep pace with the seismic explosion in malware. Providing protection to a heterogeneous world of connected devices requires a new approach to security. McAfee CTO George Kurtz will explain the required paradigm shift..."
October 30, 2011
"Criminals and nation-states have adopted traditional physical intelligence techniques for the cyber world. Jeff Bardin examines various CYBINT and OSINT methods, information mining of social networking sites and the tools in use for gathering information on targets of opportunity...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013