video
State of the Hack: One Year after the APT1 Report
Published on Feb 25, 2014 Nawaf Bitar Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are…
Read More »RSA 2014 Keynote – Philippe Courtot, Qualys
Published on Feb 28, 2014 Security professionals in general distrust the cloud—losing control, fly-by-night third party solutions, privacy and surveillance. However,…
Read More »The Cryptographers’ Panel
Published on Feb 25, 2014 Paul Kocher, Ron Rivest, Adi Shamir, Whitfield Diffie, Brian LaMacchia Join the founders and leaders of…
Read More »Excellence in the Field of Mathematics Award
Published on Feb 25, 2014 Prof. Bart Preneel, COSIC, University of Leuven This year’s recipient was selected amongst a list of…
Read More »The Next World War Will be Fought in Silicon Valley
Senior Vice President and General Manager, Security Business Unit, Juniper Networks, Inc. We are under attack, and we are not…
Read More »Why encryption can be a pain and how we’re fixing that
Encryption often seems not worth the trouble – performance impact on users is just too great for many businesses. But…
Read More »Critical Infrastructure Protection: The Movie
The short video clip on critical infrastructure protection prepared for Kaspersky Security Analyst Summit 2014 #TheSAS2014
Read More »[Presentation] Smarter, shadier, stealthier malware: The latest on today’s threats
Security experts Maxim Weinstein and John Shier discuss the malware behind some of the biggest security threats of 2013, including…
Read More »Wireshark Network Forensics
This session was recorded at Sharkfest 2013, UC Berkeley, CA Join Laura Chappell in this session as she examines a…
Read More »Advanced Digital Forensics (Open Source Forensics)
This presentation outlines the usage of open source forensics. http://asecuritysite.com/forensics/advf
Read More »Network security threats explained: WiFi
James Lyne explains how hackers can take advantage of the mistakes that are commonly made when setting up wireless networks.
Read More »Cyber Defense – Military Training for Cyber Warfare, Full Length Documentary
Documentary on the annual cyber warfare competition between military schools for the trophy of the best cyber defense team. The…
Read More »Understanding Botnet in Details
Blackhat 2012 EUROPE – Workshop: Understanding Botnets By Building One Financial botnets are a major threat to the global Financial…
Read More »