Videos Tagged with "Video"

99edc1997453f90eb5ac1430fd9a7c61

Security Awareness Training for Employees

June 07, 2012

Security awareness training can be a bit dull and boring, so we commonly try to come up with ways on how to make it a more engaging topic for our audience. But do we end up patronizing them with gimmicks and child-like messages?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Flame Trojan: Fact or FUD?

June 05, 2012

What is FUD? Is it good or bad and how can you differentiate between what's true and what’s FUD? Like those old adverts that used to ask, “Is it real or is it Memorex”? Ask yourself whenever you hear something major has broken out that will infect every device on the planet, is it real, or is it FUD?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

How to Deal with a Security Incident

June 01, 2012

"Incidents are bound to happen, there's no avoiding it!" Brian Honan, internationally recognized information security expert, offers tips on how to respond to security incidents...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

The Best Security Advice

May 27, 2012

What's the best security advice you've been given? Attendees at Infosecurity Europe tell us their best information security tips. Don't forget to like the video if it has been of any use to you. As always, Javvad is easy to stalk...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Security Incident Management

May 23, 2012

When you’re faced with an incident what do you do? Do you even realise there’s an incident? Do you ignore it? Or do you hide under the covers? All these things happen and usually the best laid plans usually end up in the bin when an incident does strike. How can one prevent this?

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

On Proper System Hardening

May 16, 2012

When a system or device has been properly hardened, all unnecessary bells and whistles are turned off, disabled, or simply ripped out, leaving only the bare minimum needed to run the service. This creates a much smaller surface area to attack...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

BSides London and Infosec Europe 2012

May 11, 2012

So I guess the one thing you can take away from it all is that if you want to speak to CISO’s and heads of security or other high-flying execs, the easiest way to do so is get yourself a camera, a microphone and a press pass to an event and they will be like putty in your hands...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Experts Talk Security Awareness: Black Hat EU 2012 Finale

April 30, 2012

At Black Hat Europe 2012, we asked the experts for their views on the importance of user security awareness training and what the common issues are with such initiatives. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Securing Enterprise Communications Systems and Applications

April 27, 2012

Javvad Malik caught up with Rahul Sasi at Black Hat Europe 2012 to learn about securing automated enterprise communications systems and applications against sophisticated hacking attack techniques. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

LIGHTS: Addressing Cybersecurity for Smaller Facilities

April 26, 2012

Watch the roundtable launch of the LIGHTS program from April 24. LIGHTS Chair Chris Blask opens with a presentation on major issues facing industrial facilities, then is joined by Energysec's Steve Parker, Joel Langill a.k.a. SCADAHacker, and AWWA's Kevin Morley and Gary Sturdavan...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Using Interface Devices for Network Penetration Testing

April 26, 2012

Javvad Malik caught up with Nikhil Mittal at Black Hat Europe 2012 to talk about some human interface technology and their use in network penetration testing. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

The Future of Network Security, SSL, and Certificate Authorities

April 25, 2012

Infosec Island's Javvad Malik caught up with Tom Ritter at Black Hat Europe 2012 to discuss the future of network security, SSL, Certificate Authorities and all kinds of security goodness. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Don Bailey at Black Hat EU 2012

April 24, 2012

Javvad Malik caught up with Don Bailey at Black Hat Europe 2012 to hear about machine to machine technology and the security challenges it brings. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Ken Baylor at Black Hat EU 2012

April 23, 2012

Infosec Island's Javvad Malik was fortunate to catch up with Dr. Ken Baylor, widely recognized as a leader in Bank Security, IT Security and Regulatory Compliance, who conducted a session designed to teach attendees how to defend against botnets by understanding how to build them...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Hacking Tools and Ethics

April 20, 2012

Joshua Corman wrote a post in which he raises some valid points about tools like Metasploit. Naturally, the purpose such tools is to aid a security tester in finding vulnerabilities. However you cannot dictate if someone will use this for attack or defensive purposes...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Nabil Ouchn at Black Hat EU 2012

April 16, 2012

Nabil Ouchn is co-founder of NETPeas and the person behind the vastly impressive ToolsWatch. Nabil took the time to speak to us a bit about Tools Watch and their involvement in the Black Hat arsenal. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »