Videos in category Security





Consumerization of enterprises: A Security Conundrum

Consumerization of enterprises: A Security Conundrum

Posted in Conferences, Companies, Web Technologies, Security

No one can argue that consumerization is happening within today's enterprises. This is the first time in the computing history that consumer technologies are driving innovation and technology adoption, rather than taking a back seat to enterprise and military technologies. Consumer technologies bring a rich, interactive user experience, which is a powerful draw for workplace adoption. Businesse...

Tags: Techtalks, Google, Business, Web 2.0, Conferences, Security, engEDU, Education, Google Tech Talks, Companies


The Xbox 360 Security System and its Weaknesses

The Xbox 360 Security System and its Weaknesses

Posted in Conferences, Companies, Security

After the disaster of the original Xbox, Microsoft put a lot of effort in designing what is probably the most sophisticated consumer hardware security system to date. We present its design, its implementation, its weaknesses, how it was hacked, and how to do it better next time. Speaker: Michael Steil Michael Steil has been involved with various embedded systems hacking projects, like the Xbox,...

Tags: Techtalks, Google, Conferences, Technologies, Microsoft, XBox, Security, engEDU, Education, Google Tech Talks, Companies, ...


Love and Authentication - Addressing the problem of password reset

Love and Authentication - Addressing the problem of password reset

Posted in Conferences, Companies, Security

One of the most commonly neglected security vulnerabilities associated with typical online service providers lies in the password reset process. By being based on a small number of questions whose answers often can be derived using data-mining techniques, or even guessed, many sites are open to attack. To exacerbate the problem, many sites pose the very same questions to users wishing to reset ...

Tags: Techtalks, Google, Conferences, Security, engEDU, Education, Authentication, Google Tech Talks, Companies



Are Internet users at risk?

Are Internet users at risk?

Posted in Conferences, Companies, Security, Web Technologies

In a perfect world, Software would be secure and we would not have to care about vulnerabilites that can get exploited while surfing the Internet.However, given that Google found more than 3 million malicious web addresses that try a drive-by download infection on the visitor's web browser, it's better to have a close look at the risk that our users are exposed to when surfing the web. This tal...

Tags: Techtalks, Google, Apple, Conferences, OS, Microsoft, Security, engEDU, Education, Google Tech Talks, Web, ...


Advanced Threat Modeling

Advanced Threat Modeling

Posted in Conferences, Security

Summary In this presentation, John Steven talks about modeling security threats as a way to discover, understand and counteract threats while designing the system architecture. John presents threat modeling through examples focusing on authentication, authorization and session management. Bio John Steven is a Technical Director with Cigital, Inc. and a founding member of the company's Office of...

Tags: Conferences, Security, InfoQ, Architecture, Modeling, QCon, Authentication, Authorization, Sessions, Threats


Google I/O 2008: Authenticating to Google Data Services

Google I/O 2008: Authenticating to Google Data Services

Posted in Conferences, Companies, Security, Development

Get over that first hurdle in your prototype! Authenticating a user is a tricky, but necessary step for most applications that interact with Google services. This session will discuss the available authentication options, their limitations, and some advanced use cases such as Google Apps domains and signed requests. Participants should be familiar with at least one GData API. Familiarity with p...

Tags: Techtalks, Google, Conferences, Technologies, Security, IO2008, Authentication, Google Data API, Development, Companies


Google I/O 2008: Secure Collaboration - How Web Applications can Share and Still Be Paranoid

Google I/O 2008: Secure Collaboration - How Web Applications can Share and Still Be Paranoid

Posted in Conferences, Companies, Development, Web Technologies, Graphics, Security

Google's Caja project allows mutually untrusting and untrusted web applications to run in the same context and allows them to safely communicate by regular JS function calls and reference passing. It provides tools that rewrite JS/HTML/CSS web applications to enable a wide range of security policies, allowing untrusted third party code to run in environments as dissimilar as social networks and...

Tags: Techtalks, Google, Conferences, Javascript, Design, Security, HTML, CSS, IO2008, Caja, Development, ...


Google I/O 2008: URLs are People Too - Using the Social Graph API to Build a Social Web

Google I/O 2008: URLs are People Too - Using the Social Graph API to Build a Social Web

Posted in Conferences, Companies, Security, Development

Using email addresses to identify people has a problem - email addresses can be used to send, not receive. With the rise of blogs and social networks, millions of people are using URLs to refer to themselves and others. The Social Graph API indexes these sites and their connections, enabling this web-wide distributed social network to be used to make your sites better. Learn how XFN and FOAF ex...

Tags: Techtalks, Google, Conferences, Technologies, OpenID, API, IO2008, Social Networks, Graph, Social Graph API, Development, ...