Richard Rushing, AirDefense CSO, on Wireless Security
by Mirko Zorz - Tuesday, 27 February 2007.
At the recent RSA Conference 2007 in San Francisco, AirDefense was doing wireless airwave monitoring. AirDefense found more than half of the 347 wireless devices susceptible to "Evil Twin" types of attacks, combined with some of the latest zero-day attacks. In this 8 minute video you'll get a picture of the wireless (in)security at a show where security professionals meet as well as some advice on how to get more secure.
Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.
Robert Hansen, Vice President of WhiteHat Security Labs, discusses the evolution of web application security, offers advice on how to improve web application security practices, recommends tools, and more.
While there is an increasing recognition in many organizations that application security is an important piece of the overall puzzle, putting together a comprehensive strategy that will effectively reduce an organization’s risk profile is not easy.
Insiders have been responsible for some interesting breaches or hostage scenarios in recent history, whether intentional or not. So, which is a bigger threat - an external hacker or a disgruntled employee?