ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

201 results

The Linux Foundation
Provenance-Aware Integrity Monitoring with Linux Security Identifiers - Fred Araujo & Teryl Taylor

Provenance-Aware Integrity Monitoring with Linux Security Identifiers - Fred Araujo, IBM & Teryl Taylor, IBM Research This talk ...

47:39
Provenance-Aware Integrity Monitoring with Linux Security Identifiers - Fred Araujo & Teryl Taylor

126 views

1 year ago

Z. Cliffe Schreuders
Monitoring Integrity

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

21:44
Monitoring Integrity

640 views

5 years ago

SUSE Labs
SUSE Labs Conference 2019 - File system integrity verification in BTRFS

None Integrity verification of a computer's file-system has recently become more important as it is not always possible to ensure a ...

21:09
SUSE Labs Conference 2019 - File system integrity verification in BTRFS

434 views

6 years ago

The Linux Foundation
Network File System Security Overview: Securing SMB3 - Steven French, Microsoft

Network File System Security Overview: Securing SMB3 - Steven French, Microsoft.

41:13
Network File System Security Overview: Securing SMB3 - Steven French, Microsoft

246 views

5 years ago

The Linux Foundation
Virtual Disk Integrity in Real Time - J.P. Blake, AIS _ C. Rogers, Student, SUNY Binghamton

vDIRT is an improvement over traditional methods for auditing file integrity which rely on a service in a potentially compromised ...

26:44
Virtual Disk Integrity in Real Time - J.P. Blake, AIS _ C. Rogers, Student, SUNY Binghamton

228 views

12 years ago

DEFCONConference
DEFE CON 33 - Deploying Deception in Depth for ICS - Brent Muir

This session will introduce the strategy of designing and deploying deception strategies across ICS environments, by leveraging ...

22:19
DEFE CON 33 - Deploying Deception in Depth for ICS - Brent Muir

137 views

4 months ago

Z. Cliffe Schreuders
Integrity Management: Computer Security Lectures 2014/15 S1

... in the database (rpm -V : verify) rpm -Va Limitations Limitations of integrity checking Other monitoring to consider Conclusion.

32:37
Integrity Management: Computer Security Lectures 2014/15 S1

1,004 views

11 years ago

The Linux Foundation
Integrity Policy Enforcement: Full System Integrity Verification - Deven Bowers, Microsoft

Integrity Policy Enforcement: Full System Integrity Verification - Deven Bowers, Microsoft.

42:30
Integrity Policy Enforcement: Full System Integrity Verification - Deven Bowers, Microsoft

536 views

5 years ago

OpenShift
Ask an OpenShift Admin (Ep 40): Compliance and security

... in conjunction with the file integrity Operator, lets OpenShift Container Platform admins describe the desired compliance state of ...

1:00:59
Ask an OpenShift Admin (Ep 40): Compliance and security

1,674 views

Streamed 4 years ago

The Linux Foundation
Overview and Recent Developments: Linux Integrity - Mimi Zohar, IBM

... and locally, appraise a file's measurement against a "good" value stored as an extended attribute, and enforce local file integrity ...

35:39
Overview and Recent Developments: Linux Integrity - Mimi Zohar, IBM

956 views

7 years ago

Red Hat Enterprise Linux
How to Achieve CIS Benchmark Compliance to Harden Linux Systems | Into the Terminal 120

Starting your cybersecurity or Linux security practices? In cooperation with Red Hat, the Center for Internet Security (CIS) ...

40:13
How to Achieve CIS Benchmark Compliance to Harden Linux Systems | Into the Terminal 120

5,990 views

Streamed 1 year ago

The Linux Foundation
Conducting Defensive Information Warfare on Open Platforms - Ben Tullis, LinuxIT (Europe) Ltd.

The modern information security landscape is highly complex, multi-faceted and it evolves rapidly. It is therefore crucial for any ...

57:45
Conducting Defensive Information Warfare on Open Platforms - Ben Tullis, LinuxIT (Europe) Ltd.

463 views

12 years ago

CNCF [Cloud Native Computing Foundation]
Paint the Picture! - Detecting Suspicious Data Patterns in E... Natalia Reka Ivanko & John Fastabend

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.

28:25
Paint the Picture! - Detecting Suspicious Data Patterns in E... Natalia Reka Ivanko & John Fastabend

169 views

2 years ago

BSidesLV
GF - Open Source GitOps for Detection Engineering

Ground Floor, 11:30 Wednesday Detection engineering is a key aspect of modern security operations, but implementing effective ...

47:23
GF - Open Source GitOps for Detection Engineering

272 views

2 years ago

bostonlinuxandunix
[BLU] Security with Snort and OSSEC

It performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.

56:02
[BLU] Security with Snort and OSSEC

12,873 views

13 years ago

FIRST
The Intelligent Process Lifecycle of Active Defenders

... monitoring use cases has been adopted to compliance configuration monitoring, integrity monitoring and vulnerability scanning ...

28:55
The Intelligent Process Lifecycle of Active Defenders

199 views

5 years ago

Lawrence Systems
Take Control of Your Security: Free, Self-Hosted SIEM & Logs with Graylog, Wazuh, & Security Onion

https://lawrence.video/ Let's dive into these free, self-hosted security solutions! This video explores the powerful trio of Graylog, ...

27:14
Take Control of Your Security: Free, Self-Hosted SIEM & Logs with Graylog, Wazuh, & Security Onion

70,394 views

1 year ago

Red Hat Enterprise Linux
Regulatory Compliance | Modernizing RHEL Management 06

In this sixth of a ten episode mini series we will cover how to use Insights to create, configure, and manage SCAP security policies ...

45:03
Regulatory Compliance | Modernizing RHEL Management 06

592 views

Streamed 2 years ago

Red Hat Enterprise Linux
5 Security technologies in Linux you should be using NOW! | Into the Terminal 127

In this episode we cover five(5) security technologies you should be using NOW! Things like fapolicyd, tlog, aide, and systemwide ...

56:47
5 Security technologies in Linux you should be using NOW! | Into the Terminal 127

1,790 views

Streamed 1 year ago

Cooper
Incident Response When Hackers Try To Steal Your Spotlight - Melina Phillips

... or that resolve.com file that would pretty much mean that they're able to map an IP address to a host that they could have control ...

27:32
Incident Response When Hackers Try To Steal Your Spotlight - Melina Phillips

104 views

4 months ago