1. Day 2 | Leveraging the Wisdom of the White Hat Community (Preview)

    02:11

    from Data Privacy Asia Added 0 0 0

    ** Get the full video at http://video.dataprivacyasia.com ** Speaker: Wei Chieh Lim Job Title: CEO Organization: SWARMNETICS (www.swarmnetics.com) Profile: https://www.dataprivacyasia.com/agenda/speakers/124044 Enterprises…

    + More details
    • It’s 10 O’clock, Do You Know Where Your Assets Are?

      31:38

      from BeyondTrust Added 23 0 0

      Can you guarantee that your virtual and cloud-based systems are online during a network-based scan? What about the growing population of remote employee laptops that randomly pop on and off the network?…

      + More details
      • How TransUnion Moved to a Risk-Based View of Vulnerability Management

        43:08

        from Kenna Added 137 0 0

        TransUnion CISO Jasper Ossentjuk believes that with the increased pace of automated and targeted attacks, InfoSec teams have to work smarter—not harder. That means the old methods of vulnerability…

        + More details
        • #DataScientistsAgainstPieChartsMostly

          17:03

          from Panaseer Added 52 0 0

          In this vlog, Chief Scientist Mike MacIntyre and Security Insight Strategist Jon Hawes - talk through the challenges that are common across the security team when asking questions of raw data -…

          + More details
          • MSS Vulnerability Management System (VMS): Managing Permissions

            02:51

            from IBM Security Learning Services Added 15 0 0

            A short instructional video highlighting how a VMS Admin or Client Admin can create, edit, or remove VMS users. Also includes instructions regarding how a VMS Admin can adjust Regular and Subordinate…

            + More details
            • Are You Connecting Your Security Dots?

              25:45

              from BeyondTrust Added 10 0 0

              Do you suffer from gaps in your security created by cloud and virtual blind spots? Are you looking to get more actionable intelligence from your SIEM? And are you worried that you may not be enumerating…

              + More details
              • The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk

                01:00:03

                from BeyondTrust Added 2,908 1 0

                Successful attack prevention strategies consist of a couple of factors that are very often not implemented properly in organizations. These are: identifying, classifying, remediating, and mitigating…

                + More details
                • Vulnerability Management with Qualys

                  24:19

                  from Qualys, Inc. Added 165 0 0

                  Qualys Vulnerability Management presentation at Black Hat 2016 conference by Martin Walker, Security Solutions Architect, Qualys. Get a free vulnerability scan of your network, servers, desktops,…

                  + More details
                  • Retina CS 6.0: Assess Cloud and Virtual Platforms and Consolidate Vulnerability Data

                    04:00

                    from BeyondTrust Added 79 0 0

                    Identifying and scanning cloud and virtual environments is becoming more difficult and stopping modern-day threats takes a village. Watch this short video and discover how Retina CS enables you to…

                    + More details

                    What are Tags?

                    Tags

                    Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."