Sort results by: Published date | Company name

Defending Against Insider Threats [ Source: CA Technologies ]
July 2012- Recent events, such as the WikiLeaks breach have brought the problem of insider threats to the forefront. Effective management of insider threats involves a variety of areas, including privileged user management, Web access management, and information classification and control.

This video explores some innovative approaches to identifying and remediating the threat of improper insider actions on your overall IT infrastructure.

[VIDEO]
Read Abstract | Go to Video

The New Status Quo: Zero-Day and Targeted APT Attacks [ Source: FireEye ]
July 2011- Cybercriminals are becoming more aggressive and successfully evading signature-based defenses leading to 95% of today's networks compromised.

Don't be the next headline -- IMF, Citibank, RSA, Sony, Epsilon, Lockheed and many others have been attacked. These attacks simply bypass traditional signature-based defenses such as NGFW, IPS, AV, and Web gateways. Learn how you can stop them before they compromise your network and gain access to critical data.

During the webcast, Dr. Wang ...

[VIDEO]
Read Abstract | Go to Video

INETCO Insight of the Week #5 - Combating The "Data Dilemma" with INETCO Insight [ Source: INETCO Systems Ltd. ]
July 2010- How powerful is complete transaction data at your fingertips? Hard question to answer if you have never experienced this before. We live in a world of fragmented data. Most payment processors out there have a number of network management, application performance monitoring, and transaction log tools that provide deep dive information for application or switch performance and network infrastructure analysis. The downside of these deep dive tools is a lack of visibility into clouds, third ...

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Dan Kaminsky and the Notorious DNS Flaw [ Source: TechWeb ]
January 2009- Last month, the world learned that Dan Kaminsky had discovered a seriousl vulnerability with DNS, which he unveiled at this year's Black Hat Conference in Las Vegas. Dark Reading's Site Editor, Tim Wilson, talks with Dan about the flaw.

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Phishing The Phishers [ Source: TechWeb ]
January 2009- InformationWeek Editor at Large, Thomas Claburn, speaks with Billy K. Rios of Microsoft and Nitesh Dhanjani of Ernst & Young, Black Hat presenters who inflitrated the phishing ecosystem and learned a great deal about how they operate.

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Hacking the Presidential Candidates [ Source: TechWeb ]
January 2009- Typo Squatting and Cross Site Scripting are just a couple of the recent threats facing the presidential candidate web sites, according to researcher Oliver Friedrichs.

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Storm BotNet Update from Joe Stewart [ Source: TechWeb ]
January 2009- Black Hat speaker Joe Stewart talks about the latest trends with the Storm Botnet and some new happenings with the more insidious Coreflood.

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Chris Hoff on Virtualization Security [ Source: TechWeb ]
January 2009- Organizations rolling out virtualized environments need to think about how to secure those environments. Dark Reading's Senior Editor, Kelly Jackson Higgins, speaks with Chris Hoff, Chief Security Architect with Unisys, about this topic.

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Ian Angell [ Source: TechWeb ]
January 2009- Director of CSI, Robert Richardson, speaks with Ian Angell at Black Hat 2008 in Las Vegas about how technology sometimes backfires and isn't always the magic bullet.

[VIDEO]
Read Abstract | Go to Video

Black Hat 2008: Hacking The Tollway System [ Source: TechWeb ]
January 2009- Dark Reading's Kelly Jackson Higgins talks to Root Labs Nate Lawson about his experiment to hack the toll systems. Lawson discusses the privacy and security implications of his findings.

[VIDEO]
Read Abstract | Go to Video
View All