Podcasts
  • The role of identity in responding to the threat environment

    Organizations are struggling to respond to an evolving threat environment - APTs, insider attacks, accidental breaches. Information is being stolen at an industrial scale while the landscape in which organizations are operating is becoming increasingly complex with trends such as cloud computing, mobility, BYOD and Big Data.

    In this podcast recorded at RSA Conference 2014, Geoff Webb, Director of Solution Strategy at NetIQ, talks about the intricacies of securing such a complicated landscape and the key is understanding the role of identity.

  • How to protect against unauthorized spying

    In this podcast recorded at RSA Conference 2014, Wayne Thayer, the General Manager of Security Products at GoDaddy and a member of the CA Security Council, discusses how Edward Snowden exposed intelligence operations that have performed unauthorized spying. His revelations have raised a number of concerns about SSL and wether it really protects people from unauthorized spying.

    Cryptography works if it's implemented properly. Listen to the podcast to learn what you can do to protect yourself from spying.

  • Two-factor authentication with Duo Security

    In this podcast recorded at RSA Conference 2014, Zach Lanier, Senior Security Researcher at Duo Security, talks about two-factor authentication with Duo Security.

    The Duo Security solution is cloud-based, which means there's no software to install, and no server to set up. Their technology and drop-in integrations enable you to seamlessly integrate Duo into your existing application login workflow. They even offer a robust Developer API to integrate Duo even more seamlessly with your product.

  • Protecting data against unwanted surveillance

    In this podcast recorded at RSA Conference 2014, Jason Sabin, VP of Research & Development at DigiCert, discusses how SSL is the most important defense against unwanted surveillance, but it must be properly implemented.

    The truth is that, many professionals do not deal with SSL certificates on a regular basis, and not all are up to date on the latest best practices. These pros usually wear many hats, and installing SSL is just one of them. SSL is more than procurement and installation – configuration matters, and if not done right, can open up vulnerabilities.

  • Understanding the top 20 Critical Security Controls

    In this podcast recorded at RSA Conference 2014, Wolfgang Kandek, CTO at Qualys, talks about the 20 Critical Security Controls, which outline a practical approach to implementing security technologies by providing proven guidelines for protecting IT environments.

    The 20 Critical Controls for Effective Cyber Defense (the Controls) are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive attacks. They were developed and are maintained by a consortium of hundreds of security experts from across the public and private sectors. An underlying theme of the Controls is support for large-scale, standards-based security automation for the management of cyber defenses.

Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //