1. SQL Injection Abridged

    11:31

    from Bryce Haviland Added 25 0 0

    This video covers some advanced SQL Injection methods in addition to why SQL Injection should be a concern to anybody running a database.

    + More details
    • Club Database - Applications Services Commercial

      01:36

      from Matt Jared Added 2 0 0

      Co Creation Productions produced this commercial for Application Security, Inc, for their Database Security Video Smackdown, taking 2nd place in the competition.

      + More details
      • Managing Users and Security

        02:48

        from TACTIC Added 4,035 6 0

        Add new users, configure groups and set up basic security

        + More details
        • It’s time to take action! Learn how to protect your most sensitive information

          50:44

          from greensql Added 48 0 0

          In the past few years, hackers, hacktivists and criminals have targeted millions of databases. Any information you own is at risk. Watch GreenSQL's webinar and learn what are the actions required…

          + More details
          • Tips and Tricks for Improving your Solaris Security Audit

            33:54

            from ObserveIT Amy Added 22 2 0

            Unix expert Cyril Plisko of the The Grigale Group hosts this webinar in which he dives into the wide variety of system auditing options available to security managers today. He focuses on how to audit…

            + More details
            • ObserveIT Feature Demo - Shared User and Privileged Identity Managment

              02:13

              from ObserveIT Amy Added 16 1 0

              ObserveIT's User Identity mechanism allows you to managed shared-user access without requiring the overhead of password rotation. Password rotation is an extremely effective solution for high-volume…

              + More details
              • How to Generate Logs for Apps that Don't Product Apps

                48:13

                from ObserveIT Amy Added 23 1 0

                ObserveIT tracks user activity using in-depth application tracking and screen scraping. This provides a precise trail of exactly what the user did: The files opened, the applications launched, the…

                + More details
                • Valuable Tricks for improving your Linux security audit

                  46:19

                  from ObserveIT Amy Added 64 3 0

                  In this one-hour webinar, UNIX expert Cyril Plisko gives tips and tricks for meeting the complex requirements laid out by security regulations such as PCI. He covers a variety of distro capabilities,…

                  + More details

                  What are Tags?

                  Tags

                  Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."