Strengthening Crypto Through Quantum Randomness

Random numbers and the entropy they contain is the foundation of secure cryptography. Yet, providing sufficient random numbers and entropy with assurances that it cannot be known, monitored, controlled or manipulated by others has proven to be remarkably difficult. How do you know if your random numbers are truly random, and how can you insure that your security system is secure?
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Fine-Tuning ICS Threat Models to Prioritize Mitigations of the Most Vulnerable Devices

Radiflow

Of course, this cannot be further from the truth: ensuring security and safety of industrial control systems has always been the most important job for OT experts. However, after decades of dealing with unique technologies and regulations and with a traditionally strong focus on human and process safety, securing IT assets was by far not their top priority. As industrial networks are becoming increasingly complex, geographically dispersed and interconnected, however, both impact and probability of numerous cybersecurity risks are growing, and the biggest challenge for CISOs nowadays is no longer how to persuade OT people to take notice, but how to evaluate a vast number of potential threats and to prioritize the actions needed to protect their networks.
Watch Now

Could it be easier to manage O365 and remote users?

Digital transformation is here and is now a hot topic due to the increase in remote work. How do IT pros continue to support the workforce while everyone is working remotely? Register now to learn: What free tools you can utilize to improve productivity of Microsoft Teams How you can monitor Teams adoption, and easily triage que
Watch Now

Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

CompTIA

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.
Watch Now

Tracking attackers. Why attribution matters and how to do it

Black Hills Information Security

In this BHIS webcast we cover some new techniques and tactics on how to track attackers via various honey tokens. We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. We also cover some of the legal ramifications involved in do this. I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat.
Watch Now