1. What is dynamic endpoint modeling? See how it works

    01:44

    from Observable Networks / Added

    36 Plays / / 0 Comments

    Observable Networks offers a monthly or annual Network Security-as-a-Service which uses their revolutionary dynamic endpoint modeling. See how endpoint modeling works in this short video or learn more at http://observable.net/

    + More details
    • Lab Video Summary: ProtectWise - Shifting Network Security to the Cloud

      04:13

      from ESG Video / Added

      8 Plays / / 0 Comments

      ESG Lab Analyst Aviv Kaufmann reviews the results from a recently completed ESG Lab Spotlight Review of ProtectWise's network security solution.

      + More details
      • PHP-LFI Practical Example 2

        03:02

        from jmp-esp / Added

        5 Plays / / 0 Comments

        This video is to be used with the Jmp-Esp wiki page: wiki.jmp-esp.com/wikka.php?wakka=PHP-LFI

        + More details
        • PHP-LFI Practical Example 1

          01:23

          from jmp-esp / Added

          7 Plays / / 0 Comments

          This video is to be used with the Jmp-Esp wiki page: https://www.wiki.jmp-esp.com/wikka.php?wakka=PHP-LFI

          + More details
          • OpenNSM (Reverse Engineering Cryptolocker - Brandon Tansey)

            01:18:00

            from Jon Schipp / Added

            10 Plays / / 0 Comments

            Brandon discusses the basics of reverse engineering malware by investigating Cryptolocker. Detailed meeting notes: https://github.com/ACMLug/meetings/blob/master/03-02-2015/notes.yml

            + More details
            • OpenNSM (GRR Rapid Response - Greg Castle)

              01:03:53

              from Jon Schipp / Added

              15 Plays / / 0 Comments

              OpenNSM meeting: GRR Rapid Response is an incident response framework focused on remote live forensics. Greg will be introducing us to GRR and how to use it. Detailed meeting notes: https://github.com/open-nsm/meetings/blob/master/02-23-2015/notes.yml

              + More details
              • Streamlining Operations for Vulnerability Management

                02:04

                from Skybox Security / Added

                Skybox provides the comprehensive solutions network security teams need in order to tackle the rising mountain of vulnerability and threat management challenges. Using Skybox's analytics-driven platform and panoramic network modeling, teams not only have the resources they need, but they also have the consistent and trackable processes necessary to keep large enterprise networks running smoothly.

                + More details
                • Why Customers Choose Skybox for Vulnerability Management

                  02:02

                  from Skybox Security / Added

                  See how Skybox's vulnerability and threat management solutions enable enterprise networks to better assess and remediate vulnerabilities and focus on threats that pose the greatest risk to their organization.

                  + More details
                  • OpenNSM (Critical Stack Intel - Dustin Webber)

                    59:00

                    from Jon Schipp / Added

                    3 Plays / / 0 Comments

                    Today at OpenNSM Dustin is here to talk about Critical Stack's free Intel Marketplace for the Bro Platform available at https://intel.criticalstack.com. He will also be demonstrating Bro Top (https://github.com/mephux/brotop ) which allows you to stream your bro logs to the browser for easy debugging and a real-time glimpse into whats being processed. Detailed meeting notes: https://github.com/open-nsm/meetings/blob/master/02-16-2015/notes.yml

                    + More details
                    • PacketViper Geo-IP Network Filter

                      03:58

                      from PacketViper / Added

                      88 Plays / / 0 Comments

                      PacketViper's simple explanation on how Geo-IP filtering improves everything through-out the security environment. PacketViper's patented Geo-IP filtering is a game changer in today's network security paradigm.

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."