1. Protecting Patient Health Information - Time To Ramp Up Your Cyber Security

    03:21

    from ICE Technologies / Added

    The Medical industry today faces more breaches than the military and banking sectors combined. Are you doing everything you can to ensure your patient health information is secure? Not sure if you have the proper security measures in place? Wondering if you comply with the HIPAA Security rule? These worries and statistics don’t have to keep you up at night. ICE has your back.

    + More details
    • Darktrace Corporate Overview

      03:25

      from Darktrace / Added

      4 Plays / / 0 Comments

      Darktrace's Enterprise Immune System uniquely detects evolving threats, without knowing in advance what it is looking for.

      + More details
      • WhiteHat Security Top Security Stories of the Week: December 29, 2014 to January 2, 2015

        26:49

        from WhiteHat Security / Added

        111 Plays / / 0 Comments

        In this week's #HackerKast, Jeremiah Grossman, Matt Johansen and Robert Hansen recap the some of the top InfoSec stories that caught their attention this week. High-res photos beats biometric 2fa http://gizmodo.com/chaos-computer-club-says-they-can-hack-your-fingerprint-1675845311 China blocked all of gmail - breaks all kinds of stuff http://gizmodo.com/gmail-has-been-blocked-in-china-1675957919 LizardMafia launched a Sybil attack on Tor and failed http://gizmodo.com/hackers-who-shut-down-psn-and-xbox-live-now-attacking-t-1675331908 Minor Logic flaw related to conference pricing allows people to save $200/night http://blog.localfu.com/post/105466825757/how-we-hacked-the-hotel-industry-to-save-200-per Instagram nuked millions of sockpuppets and some users went to practically no followers as a result http://elitedaily.com/humor/someone-went-million-instagram-followers-eight/888194/ ISC.org website hacked: Scan your PC for malware if you stopped by http://www.theregister.co.uk/2014/12/26/isc_org_hacked/?mt=1419953417852 The World's Biggest Data Breaches, In One Incredible Infographic http://www.businessinsider.com/data-breaches-infographic-2014-12

        + More details
        • IP Viking Recording

          00:30

          from so nihal / Added

          9 Plays / / 0 Comments

          Real-time capture of Cyber Attacks from around the world. Very useful to display, especially in a Network Operations Center. map.ipviking.com

          + More details
          • Sony Hackers, Cyber Attackers, Data Breaches of 2014 and Sentiment Analysis Code To Let Us Know How Everyone Else Feels About It

            01:05:56

            from TheAverageGuy / Added

            13 Plays / / 0 Comments

            This week on Cyber Frontiers Ashton, Christian, and Jim have the conversation everyone else has been - Sony! We talk about what the Sony breach means for the cybersecurity field, and how it compares and contrasts to breaches of the past. We have some great conversation around what constitutes "damage" in a cyber breach, how it impacts people short term and long term, and what technology and attitudes need to change to prevent the Sony incident from repeating itself elsewhere. Combined with Christian's after-action poly-sci analysis, Ashton's sentiment Analysis code, and Jim's arsenal of questions for what this means for the average guy, we packed in a hour-filled holiday special that you won't want to miss. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective! Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: http://theAverageGuy.tv/amazon WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe You can contact us via email at jim@theaverageguy.tv or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at http://theAverageGuy.tv/cf015

            + More details
            • Tech Talk: Common crypto mistakes in Android

              48:44

              from Galois Video / Added

              120 Plays / / 0 Comments

              abstract: If you do a web search for “encrypting Strings in Android”, you’ll find a lot of example code, and they all look pretty similar. They definitely input a String and output gibberish that looks like encrypted text, but they are often incorrect. Crypto is tricky: it’s hard to tell that the gibberish that’s being printed is not good crypto, and it’s hard to tell that the code example you picked up from Stack Overflow has serious flaws. The problem here is that sites like Google and Stack Overflow rank results based on popularity, but the correctness of crypto isn’t something we can vote about. It’s not a popularity contest. To use it correctly, you have to understand the properties of the algorithm and the security goals of your code. Maybe the bad crypto someone pasted up on the Internet was acceptable for their needs, but there’s a good chance it’s completely unacceptable for yours. In this talk, we’ll discuss the use of a very common crypto algorithm, AES, and show how code examples on the Internet usually make serious mistakes in how they use AES libraries. What are the consequences of these mistakes and what are more reasonable defaults. We’ll also talk a bit about our simple Android library that tries to do AES right. More information on the Tozny blog: http://tozny.com/blog/encrypting-strings-in-android-lets-make-better-mistakes/ bio: Isaac is a security researcher at Galois where he has lead authentication and collaboration projects for the DoD and IC. Isaac earned his master’s degree in Cybersecurity from the University of Maryland, University College, and his B.S. in Computer Science from Ohio State University. In 2013, Isaac founded Tozny, a Galois spin-off company aimed at solving the password conundrum. Easier and more secure than passwords, Tozny replaces passwords with an easy-to-use cryptographic key on a user’s mobile phone.

              + More details
              • Kampf ums Vertrauen

                07:40

                from KPMG in Deutschland / Added

                9 Plays / / 0 Comments

                In der vernetzten Welt sind zunehmend Systeme verbunden, die früher getrennt waren. Immer mehr Kunden vertrauen nur Unternehmen, die für die Sicherheit der Daten sorgen können. Diese Sicherheit kann nur dann gewährleistet werden, wenn sie bereits in der Planung und Entwicklung von Infrastrukturen und Systemen mitberücksichtigt wird.

                + More details
                • Vendor Management Demo

                  47:22

                  from Safe Systems / Added

                  15 Plays / / 0 Comments

                  Take a look into Safe Systems' new Vendor Management app in this webinar hosted by Tom Hinkel, Safe Systems' vice president of compliance. Tom also runs a compliance guidance website as The Compliance Guru. http://www.safesystems.com/ http://www.complianceguru.com/

                  + More details
                  • Vinny Troia - Cyber Security Media Highlights

                    08:36

                    from Night Lion Security / Added

                    5 Plays / / 0 Comments

                    TV Media Highlight reel of Vinny Troia, Cyber Security Expert, Ethical Hacker, and CEO of Night Lion Security.

                    + More details

                    What are Tags?

                    Tags

                    Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."