Videos Tagged with "Video"

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Rafal Los at Black Hat EU 2012

April 12, 2012

We were fortunate to get an interview with HP's Global Software Security Evangelist Rafal Los at Black Hat Europe where he speaks about threat modeling and how we can stop determined attackers. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Steve Lord at Black Hat EU 2012

April 10, 2012

Steve Lord, penetration tester extraordinaire and co-founder of 44Con, was at Black Hat Europe 2012 to talk about compromising MiFi (portable WiFi) devices to use for nefarious and not so nefarious purposes. But mainly for nefarious purposes (insert manic laughter)...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Video: Cyber Security for Smart Energy Systems

April 09, 2012

Chris Wysopal discusses why it is so important to the power grid to write secure code for software, how computer intrusion methods have changed in over past two decades, the impact of data breaches on modern organizations, and the necessity for thorough testing prior to launch...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Phil Polstra at Black Hat EU 2012

April 07, 2012

At Black Hat Europe, we had a chance to catch up with Phil Polstra to give us the low down on his pet USB projects and an interesting speaker timer on the side. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

How Do I Learn More about Infosec?

April 05, 2012

A lot of people who are new in the field of infosec ask how they can learn and develop their skills more. So, to answer this common question, I present my favourite free (or inexpensive) ways that you can learn more. Including mentoring. What else do you need?

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

What Makes Black Hat Europe So Special?

March 29, 2012

Black Hat Europe is one of the premier security conferences. But what brings people back here year after year? We asked some of the attendees what makes black hat so special to them, courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Guide to Surviving Black Hat Europe

March 24, 2012

Whilst at Black Hat Europe 2012, I realized that this was the first big conference many had attended, so thought it would be useful for others to create this short guide on how to survive black hat - courtesy of Infosec Island and NETpeas...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Infosec Mistakes

March 23, 2012

We all learn from our mistakes. Tripwire compiled the 25 mistakes infosec people make and I’m adding my own. You can see great examples such as “Yes, a UFO is an unidentified flying object, but it’s probably an alien” and “Is there an award for having the most passwords?”

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

IS Controls: Protective, Detective and Recovery

March 09, 2012

To manage risks better, you often have to recommend or examine controls. The types of controls can be broken down into three types, Protective, Detective and Recovery...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

FBI and Coffee: How to Spot Suspicious Activity

March 03, 2012

According to a flier issued by the FBI on how to spot suspicious activity, if you see someone paying for small items like a coffee with cash, it could be a sign that they are up to no good. Other such activities which could be deemed suspicious are...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Infosec Island's Javvad Malik and Black Hat Europe 2012

February 19, 2012

Infosec Island's Javvad Malik will be on site at the Black Hat Europe conference in Amsterdam conducting video interviews and - no doubt - interjecting his trademark brand of humor while exploring cutting edge infosec trends and developments...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Auditor IV: The Card Data Breach

February 17, 2012

When the unthinkable happens to a company, there's only one person they need to get to the bottom of the matter. The Auditor is back, but this time it's different...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Risk Management

February 10, 2012

A short illustration of risk management. Demonstrating the concepts of risk mitigation, acceptance, avoidance and transfer. Learn these concepts well and you’ll do well in your CISSP exam...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Boston Police Offer Levity in Wake of Anonymous Hack

February 09, 2012

The Boston Police Department's Media Relation arm has produced a somewhat whimsical video response to the attack of their official website that occurred late last week. The department's website had been hacked and defaced by sympathizers of the rogue movement Anonymous...

Comments  (6)

B64e021126c832bb29ec9fa988155eaf

Introduction to Bro Network Security Monitor

February 08, 2012

Great intro video to the Bro Security Network Analysis Framework by Richard Bejtlich. Bro is an amazing tool that gives you a summary of what is going on in your network. It creates text log files of connections, protocols, communications, and what it sees on the wire...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Interview with ISMP Founder Marisa Fagan on SECore

January 27, 2012

Marisa Fagan, the founder of the InfoSec Mentors Project - "a non-profit project that builds a more collaborative and friendly environment for newbies in information security" - kindly dropped by from across the pond to talk about SECore.info...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »