1. SQL Injection Abridged


    from Bryce Haviland Added 25 0 0

    This video covers some advanced SQL Injection methods in addition to why SQL Injection should be a concern to anybody running a database.

    + More details
    • Club Database - Applications Services Commercial


      from Matt Jared Added 2 0 0

      Co Creation Productions produced this commercial for Application Security, Inc, for their Database Security Video Smackdown, taking 2nd place in the competition.

      + More details
      • Managing Users and Security


        from TACTIC Added 4,035 6 0

        Add new users, configure groups and set up basic security

        + More details
        • It’s time to take action! Learn how to protect your most sensitive information


          from greensql Added 48 0 0

          In the past few years, hackers, hacktivists and criminals have targeted millions of databases. Any information you own is at risk. Watch GreenSQL's webinar and learn what are the actions required…

          + More details
          • Tips and Tricks for Improving your Solaris Security Audit


            from ObserveIT Amy Added 22 2 0

            Unix expert Cyril Plisko of the The Grigale Group hosts this webinar in which he dives into the wide variety of system auditing options available to security managers today. He focuses on how to audit…

            + More details
            • ObserveIT Feature Demo - Shared User and Privileged Identity Managment


              from ObserveIT Amy Added 16 1 0

              ObserveIT's User Identity mechanism allows you to managed shared-user access without requiring the overhead of password rotation. Password rotation is an extremely effective solution for high-volume…

              + More details
              • How to Generate Logs for Apps that Don't Product Apps


                from ObserveIT Amy Added 23 1 0

                ObserveIT tracks user activity using in-depth application tracking and screen scraping. This provides a precise trail of exactly what the user did: The files opened, the applications launched, the…

                + More details
                • Valuable Tricks for improving your Linux security audit


                  from ObserveIT Amy Added 64 3 0

                  In this one-hour webinar, UNIX expert Cyril Plisko gives tips and tricks for meeting the complex requirements laid out by security regulations such as PCI. He covers a variety of distro capabilities,…

                  + More details

                  What are Tags?


                  Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."