Videos

Proxied Access

2 days ago
Suppose I have a multi-tenant cloud application. Suppose you are one of my users. Suppose I need to login as you for support. What are some ways I can setup security so you know I’m me?

Securing SOAP and REST

2 days ago
A quick run down of security options for SOAP and REST Web services and APIs.

Android Security: 2016 Year in Review

3 days ago
Adrian Ludwig, Director Android Security, presents the third annual Android Security Year In Review, a comprehensive look at our work to protect more than 1.4 billion Android users and their data. Chapters: – Intro 0:00-3:50 – Summary 3:51-6:40 – Robust Platform 6:41-9:50 – Comprehensive Services 9:51-22:30 – Ecosystem Updates 22:31 – 26:24 – Noteworthy PHAs […]

Enhancing security and reliability with Exchange Online Protection

2 weeks ago
Join Shad Morris, IT Service Engineer for the Discovery and Collaboration team, as he shares best practices for increasing email security using Exchange Online Protection. He will discuss how Microsoft IT uses both proactive configuration and reactive policies to block threats at the connection, content, and user levels. You will have opportunities to ask questions […]

Secure Coding Guidelines

3 weeks ago
The how and the why of creating documented guidelines for secure code.

Forging Cookies

3 weeks ago
When leaked source code plus authentication flaws combines with cookie and user-agent forging, back things happen. Like, billions of user accounts stolen.

SIGNING UP WITH VUE.JS | Laravel + Angular 2 / Vue.js 2

3 weeks ago
Learn how to use Laravel and Angular 2 or Vue.js 2 together. This videos explains how to create a signup page and send signup information using Vue.js. The full source code can be found in the following Github repo (choose the right branch!): github.com/mschwarzmueller/laravel-ng2-vue Want to dive deeper into Laravel, Angular 2 or Vue.js 2? […]

Brad Smith at RSA 2017: The Need for a Digital Geneva Convention

3 weeks ago
At the 2017 RSA Conference, Microsoft President, Brad Smith calls for governments to work together on a Digital Geneva Convention to protect civilians on the internet in times of peace. He also emphasized the critical need for tech companies to commit to never assisting in offensive actions anywhere, and to focus 100 percent on defending […]

Mitigating Security Issues using Azure Security Center

4 weeks ago
In this video, Yuri Diogenes demonstrates how you can use Azure Security Center to mitigate security issues discovered in your Azure deployments.

IBM Security Trusteer Pinpoint Criminal Detection Scenario 2 Demo (Fraudster)

1 month ago
In this video, Anthony Johnson details suspicious access from a medium risk IP address. Acting as the fraudster, Anthony will demonstrate how criminal detection works. IBM Trusteer Pinpoint Malware Detection Advanced Edition accurately detects malware-infected devices and determines both the nature of the threat and the potential risk. Organizations receive alerts when malware-infected devices are […]

IBM Security Trusteer Pinpoint Criminal Detection Scenario 4 Demo

1 month ago
In this video, Anthony Johnson highlights how Trusteer Pinpoint examines activity from a new device using a new browser language. Detecting and analyzing uncharacteristic device attributes is one way Trusteer Pinpoint helps protect the user. IBM Security Trusteer Pinpoint Malware Detection Advanced Edition accurately detects malware-infected devices and determines both the nature of the threat […]

IBM Security Trusteer Pinpoint Criminal Detection Scenario 2 Demo (Victim)

1 month ago
In this video, Anthony Johnson profiles a victim’s legitimate device and suspicious access following contact with a malware-infected device. The video will show how Trusteer Pinpoint will attempt to prevent the fraud. IBM Security Trusteer Pinpoint Malware Detection Advanced Edition accurately detects malware-infected devices and determines both the nature of the threat and the potential […]