Security

Security | News, how-tos, features, reviews, and videos

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Salted Hash Ep 10 Steve Ragan
video

Office 365 phishing examples | Salted Hash Ep 10

Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.

title image 0 00 16 06
video

Tech Talk: Uber hack, Google tracks, AWS packs (in China) ... and Firefox is back

Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla...

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

sh ep7
video

Matrix Banker malware spreads to multiple industries | Salted Hash Ep 7

The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

Information Security
video

What is blockchain? Get up to speed with this video primer

Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare.

Hacker
video

4 old malware threats still haunting business today

From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.

Info_sec
video

Learn the ins and outs of Europe's General Data Protection Regulation (GDPR)

Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at...

pt 4 image 2
video

Ransomware: What you need to know now | Salted Hash Ep 1, Pt 4

Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

pt 3 image
video

Hollywood's hacking woes | Salted Hash Ep 1, Pt 3

Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.

pt 1 image 3
video

Kaspersky Lab and the Russia connection | Salted Hash Ep 1, Pt 1

Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?

cwtt 002 ep1
video

Tech Talk: Pricey iPhones, intent-based networks, GPS spoofing and smartwatches

Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.

cwtt 002 ep2 pt4 img
video

Will the new iPhone break the $1,000 barrier? | Tech Talk Ep 1, Pt 4

The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?

cwtt 002 ep2 pt2 img
video

Why should enterprises care about intent-based networking? | Tech Talk Ep 1, Pt 2

The panelists break down Cisco's intent-based networking strategy, which brings machine learning to the networking realm. Plus, they hash out the ramifications for the security industry.

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

cwtt 002 ep2 pt1 img 2
video

Is the smartwatch market dead? | Tech Talk Ep 1, Pt 1

Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.

VMware CEO Pat Gelsinger
video

VMware CEO Pat Gelsinger on building better app defense

VMware CEO Pat Gelsinger talks about distributed encryption between virtual machines and the concept of app defense.

Load More