Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

program dirty 2018.01.25 11.10.07.00 00 15 31.still002
video

Tech Talk: IT trends for 2018 – passwords on the way out, blockchain evolves

Our tech panel envisions the end of passwords, looks at how blockchain is evolving, details why 'serverless' computing is a boon to devs and wonders why Apple's HomePod seems late to the game.

program dirty 2018.01.25 11.10.07.00 01 18 51.still001
video

Tech Talk: The beginning of the end of the password in 2018

Hackers can crack them, and users are careless with them. Passwords have long been problematic, but they are getting renewed attention after a series of major breaches. Our panelists look at the coming technology to help with password...

program dirty 2018.01.23 12.03.01.00 00 36 44.still001
video

Mingis on Tech: 2018 – the year blockchain breaks out

Blockchain continues to evolve and grow, as more companies test it out. It's now seen as the heart of a new global shipping platform that could save companies billions of dollars and as the underpinning for a P2P cloud storage...

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Salted Hash Ep 10 Steve Ragan
video

Office 365 phishing examples | Salted Hash Ep 10

Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.

title image 0 00 16 06
video

Tech Talk: Uber hack, Google tracks, AWS packs (in China) ... and Firefox is back

Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla...

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

sh ep7
video

Matrix Banker malware spreads to multiple industries | Salted Hash Ep 7

The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

Can your employer spy on your iPhone or Android phone?

Google can read your corporate data. Are you OK with that?

Some cloud providers reserve the right to scan your data for various violations, but few enterprises know if they or their employees have agreed to such terms of service

shipping containers

4 extra-strength container security tools for Docker and Kubernetes

These third-party offerings bring enterprise monitoring, policy-based controls, in-container auditing, and hardened Linux kernels to container-based applications

Information Security
video

What is blockchain? Get up to speed with this video primer

Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare.

orange and white life preserver on white background

How containers and microservices change security

Cloud-native applications and infrastructure require a radically different approach to security. Keep these best practices in mind

Hacker
video

4 old malware threats still haunting business today

From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.

face superimposed on keyboard privacy hacker

Devsecops: Add security to complete your devops process

New data shows that enterprises are moving to devops with integrated security teams, processes, and tools. That should be standard practice

Info_sec
video

Learn the ins and outs of Europe's General Data Protection Regulation (GDPR)

Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at...

Load More